General
-
Target
phantom.sh
-
Size
1KB
-
Sample
250323-dcrtwsxvct
-
MD5
b25643d9ed071bba8af0ef060b5180bf
-
SHA1
12c13e5c16cabcd24f9c38b750acd5be92df73ec
-
SHA256
2e22b8d097eed40f8fd2c985b0a6fb31ed2f6ed8a022cc707ebbf9fc7be549cf
-
SHA512
5eac9707aa2c220394b2d2be4737451e8b1cba8fe86611656c3ac599ffc6c1b24f4a30e4a40122f57bda4a0ad7d5dc5862cdf779e7f481c7f396bd757fe016c9
Static task
static1
Behavioral task
behavioral1
Sample
phantom.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
phantom.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
phantom.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
phantom.sh
Resource
debian9-mipsel-20240611-en
Malware Config
Extracted
mirai
WICKED
Extracted
mirai
WICKED
Extracted
mirai
WICKED
Extracted
mirai
WICKED
Extracted
mirai
WICKED
Extracted
mirai
WICKED
Targets
-
-
Target
phantom.sh
-
Size
1KB
-
MD5
b25643d9ed071bba8af0ef060b5180bf
-
SHA1
12c13e5c16cabcd24f9c38b750acd5be92df73ec
-
SHA256
2e22b8d097eed40f8fd2c985b0a6fb31ed2f6ed8a022cc707ebbf9fc7be549cf
-
SHA512
5eac9707aa2c220394b2d2be4737451e8b1cba8fe86611656c3ac599ffc6c1b24f4a30e4a40122f57bda4a0ad7d5dc5862cdf779e7f481c7f396bd757fe016c9
-
Mirai family
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1