General
-
Target
hnap.sh
-
Size
2KB
-
Sample
250408-lb1z6ssn13
-
MD5
7f7f5f81539a7abbf579e8720f527c86
-
SHA1
2323a22a0199a048f7db8c237c90e1da39f66264
-
SHA256
2b7d3d1e1c6589f9c02b479e04bd9af07c899f53306d762c564570f6aadf6424
-
SHA512
8db3f52ef6de158fc29c02850c14a9514d1fc42ac27b0a2d4ee6587f3861f3d0b683d04789344712d19faeea7de64547096ab43f211a026fe21a5ff6da19cefb
Static task
static1
Behavioral task
behavioral1
Sample
hnap.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
hnap.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
hnap.sh
Resource
debian9-mipsbe-20240418-en
Malware Config
Extracted
mirai
SORA
Extracted
mirai
SORA
Extracted
mirai
SORA
Extracted
mirai
SORA
Targets
-
-
Target
hnap.sh
-
Size
2KB
-
MD5
7f7f5f81539a7abbf579e8720f527c86
-
SHA1
2323a22a0199a048f7db8c237c90e1da39f66264
-
SHA256
2b7d3d1e1c6589f9c02b479e04bd9af07c899f53306d762c564570f6aadf6424
-
SHA512
8db3f52ef6de158fc29c02850c14a9514d1fc42ac27b0a2d4ee6587f3861f3d0b683d04789344712d19faeea7de64547096ab43f211a026fe21a5ff6da19cefb
-
Mirai family
-
Contacts a large (46628) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1