Overview
overview
10Static
static
10The-MALWAR...ot.exe
windows7-x64
10The-MALWAR...ot.exe
windows10-2004-x64
10The-MALWAR...ll.exe
windows7-x64
10The-MALWAR...ll.exe
windows10-2004-x64
10The-MALWAR...BS.exe
windows7-x64
10The-MALWAR...BS.exe
windows10-2004-x64
10The-MALWAR...in.exe
windows7-x64
7The-MALWAR...in.exe
windows10-2004-x64
7The-MALWAR....A.exe
windows7-x64
7The-MALWAR....A.exe
windows10-2004-x64
7The-MALWAR....A.exe
windows7-x64
10The-MALWAR....A.exe
windows10-2004-x64
10The-MALWAR....A.dll
windows7-x64
7The-MALWAR....A.dll
windows10-2004-x64
6The-MALWAR...r.xlsm
windows7-x64
10The-MALWAR...r.xlsm
windows10-2004-x64
10The-MALWAR...36c859
ubuntu-18.04-amd64
8The-MALWAR...caa742
ubuntu-18.04-amd64
1The-MALWAR...c1a732
ubuntu-18.04-amd64
1The-MALWAR...57c046
ubuntu-18.04-amd64
8The-MALWAR...4cde86
ubuntu-18.04-amd64
1The-MALWAR...460a01
ubuntu-18.04-amd64
1The-MALWAR...ece0c5
ubuntu-18.04-amd64
8The-MALWAR...257619
ubuntu-18.04-amd64
8The-MALWAR...fbcc59
ubuntu-18.04-amd64
1The-MALWAR...54f69c
ubuntu-18.04-amd64
8The-MALWAR...d539a6
ubuntu-18.04-amd64
8The-MALWAR...4996dd
ubuntu-18.04-amd64
1The-MALWAR...8232d5
ubuntu-18.04-amd64
8The-MALWAR...66b948
ubuntu-18.04-amd64
8The-MALWAR...f9db86
ubuntu-18.04-amd64
8The-MALWAR...ea2485
ubuntu-18.04-amd64
8Analysis
-
max time kernel
156s -
max time network
168s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231026-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231026-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
11-11-2023 13:40
Static task
static1
Behavioral task
behavioral1
Sample
The-MALWARE-Repo-master/Banking-Malware/DanaBot.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
The-MALWARE-Repo-master/Banking-Malware/DanaBot.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Dridex.JhiSharp.dll.exe
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Dridex.JhiSharp.dll.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexDroppedVBS.exe
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexDroppedVBS.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral7
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexLoader.bin.exe
Resource
win7-20231020-en
Behavioral task
behavioral8
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexLoader.bin.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win7-20231023-en
Behavioral task
behavioral10
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win7-20231020-en
Behavioral task
behavioral12
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral13
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.dll
Resource
win7-20231025-en
Behavioral task
behavioral14
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral15
Sample
The-MALWARE-Repo-master/Banking-Malware/Zloader.xlsm
Resource
win7-20231023-en
Behavioral task
behavioral16
Sample
The-MALWARE-Repo-master/Banking-Malware/Zloader.xlsm
Resource
win10v2004-20231023-en
Behavioral task
behavioral17
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/001eb377f0452060012124cb214f658754c7488ccb82e23ec56b2f45a636c859
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral18
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/041bc20ca8ac3161098cbc976e67e3c0f1b672ad36ecbe22fd21cbd53bcaa742
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral19
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/0ab8836efcaa62c7daac314e0b7ab1679319b2901578fd9e95ec3476b4c1a732
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral20
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/103b8404dc64c9a44511675981a09fd01395ee837452d114f1350c295357c046
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral21
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/2378e76aba1ad6e0c937fb39989217bf0de616fdad4726c0f4233bf5414cde86
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral22
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral23
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/3205603282a636979a55aa1e1be518cd3adcbbe491745d996ceb4b5a4dece0c5
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral24
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/453468b86856665f2cc0e0e71668c0b6aac8b14326c623995ba5963f22257619
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral25
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/5fb29fb0136978b9ccf60750af09cec74a257a0ca9c47159ca74dbba21fbcc59
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral26
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/6fe6808b9cfe654f526108ec61cb5211bb6601d28e192cadf06102073b54f69c
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral27
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/7745b070943e910e8807e3521ac7b7a01401d131bf6c18a63433f8177ed539a6
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral28
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/7f18e5b5b7645a80a0d44adf3fecdafcbf937bfe30a4cfb965a1421e034996dd
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral29
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/90b61cc77bb2d726219fd00ae2d0ecdf6f0fe7078529e87b7ec8e603008232d5
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral30
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral31
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/985ffee662969825146d1b465d068ea4f5f01990d13827511415fd497cf9db86
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral32
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/d1e82d4a37959a9e6b661e31b8c8c6d2813c93ac92508a2771b2491b04ea2485
Resource
ubuntu1804-amd64-20231026-en
General
-
Target
The-MALWARE-Repo-master/Botnets/FritzFrog/103b8404dc64c9a44511675981a09fd01395ee837452d114f1350c295357c046
-
Size
8.6MB
-
MD5
ae747bc7fff9bc23f06635ef60ea0e8d
-
SHA1
64315e834f67905ed4e47f36155362a78ac23462
-
SHA256
103b8404dc64c9a44511675981a09fd01395ee837452d114f1350c295357c046
-
SHA512
e24914a58565a43883c27ae4a41061e8edd3d5eef7b86c1c0e9910d9fbe0eef3e78ed49136ac0c9378311e99901b1847bcfd926aa9a3ea44149a7478480f82b2
-
SSDEEP
98304:rDSceJ/GqDu6P0ypQ0Qv5knSTH20ejwBcHjI7Xk:rDSceJ/GqD18RZv5knS720e7s
Malware Config
Signatures
-
Adds new SSH keys 2 IoCs
Linux special file to hold SSH keys. The threat actor may add new keys for further remote access.
description ioc Process File opened for modification /root/.ssh/authorized_keys Process not Found File opened for modification /root/.ssh/authorized_keys 103b8404dc64c9a44511675981a09fd01395ee837452d114f1350c295357c046 -
Deletes itself 1 IoCs
pid 1532 -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo cat -
Deletes log files 1 TTPs 2 IoCs
Deletes log files on the system.
description ioc Process File deleted /var/log/tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/103b8404dc64c9a44511675981a09fd01395ee837452d114f1350c295357c046 Process not Found File deleted /var/log/tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/103b8404dc64c9a44511675981a09fd01395ee837452d114f1350c295357c046 103b8404dc64c9a44511675981a09fd01395ee837452d114f1350c295357c046 -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads CPU attributes 1 TTPs 25 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online uptime File opened for reading /sys/devices/system/cpu/online uptime File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online free File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online uptime File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online free File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online free File opened for reading /sys/devices/system/cpu/online uptime File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online free File opened for reading /sys/devices/system/cpu/online uptime File opened for reading /sys/devices/system/cpu/online free File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online free -
Reads runtime system information 64 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/311/stat killall File opened for reading /proc/1164/cmdline pkill File opened for reading /proc/172/status pkill File opened for reading /proc/6/cmdline pkill File opened for reading /proc/1139/cmdline ps File opened for reading /proc/21/cmdline pidof File opened for reading /proc/1067/stat killall File opened for reading /proc/1175/stat killall File opened for reading /proc/158/cmdline pkill File opened for reading /proc/446/cmdline ps File opened for reading /proc/432/status ps File opened for reading /proc/662/stat ps File opened for reading /proc/1249/stat ps File opened for reading /proc/1162/stat killall File opened for reading /proc/432/stat killall File opened for reading /proc/34/stat killall File opened for reading /proc/197/status pkill File opened for reading /proc/self/maps awk File opened for reading /proc/311/status ps File opened for reading /proc/463/cmdline pidof File opened for reading /proc/162/cmdline ps File opened for reading /proc/16/cmdline ps File opened for reading /proc/98/status ps File opened for reading /proc/1530/cmdline ps File opened for reading /proc/23/stat killall File opened for reading /proc/83/stat ps File opened for reading /proc/428/stat killall File opened for reading /proc/1250/stat killall File opened for reading /proc/1118/cmdline killall File opened for reading /proc/18/cmdline pkill File opened for reading /proc/1350/cmdline ps File opened for reading /proc/20/stat ps File opened for reading /proc/1122/stat ps File opened for reading /proc/889/stat killall File opened for reading /proc/1350/cmdline killall File opened for reading /proc/1067/stat killall File opened for reading /proc/17/cmdline pkill File opened for reading /proc/168/status pkill File opened for reading /proc/83/status ps File opened for reading /proc/4/status ps File opened for reading /proc/31/stat ps File opened for reading /proc/loadavg uptime File opened for reading /proc/1179/stat killall File opened for reading /proc/17/status ps File opened for reading /proc/1660/status ps File opened for reading /proc/1177/stat killall File opened for reading /proc/79/cmdline killall File opened for reading /proc/1177/cmdline pkill File opened for reading /proc/2/status pkill File opened for reading /proc/1051/stat ps File opened for reading /proc/577/stat killall File opened for reading /proc/1167/stat killall File opened for reading /proc/79/stat killall File opened for reading /proc/7/cmdline pkill File opened for reading /proc/1605/status pkill File opened for reading /proc/filesystems sudo File opened for reading /proc/959/stat killall File opened for reading /proc/24/status pkill File opened for reading /proc/940/stat ps File opened for reading /proc/1094/status ps File opened for reading /proc/674/stat ps File opened for reading /proc/filesystems sudo File opened for reading /proc/85/stat killall File opened for reading /proc/167/stat killall -
Writes file to tmp directory 2 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/.local_8243 touch File opened for modification /tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/.local_28522 touch
Processes
-
/tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/103b8404dc64c9a44511675981a09fd01395ee837452d114f1350c295357c046/tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/103b8404dc64c9a44511675981a09fd01395ee837452d114f1350c295357c0461⤵
- Adds new SSH keys
- Deletes log files
PID:1530 -
/bin/bash/bin/bash -2⤵PID:1550
-
/usr/bin/sudosudo -S touch .local_82433⤵PID:1555
-
/usr/bin/touchtouch .local_82434⤵
- Writes file to tmp directory
PID:1556
-
-
-
/usr/bin/sudosudo rm .local_82433⤵PID:1560
-
/bin/rmrm .local_82434⤵PID:1561
-
-
-
/usr/bin/sudosudo killall -9 bssh3⤵PID:1568
-
/usr/bin/killallkillall -9 bssh4⤵
- Reads runtime system information
PID:1569
-
-
-
/usr/bin/sudosudo rm -rf /tmp/.an3⤵PID:1570
-
/bin/rmrm -rf /tmp/.an4⤵PID:1571
-
-
-
/usr/bin/sudosudo killall -9 xm643⤵PID:1572
-
/usr/bin/killallkillall -9 xm644⤵
- Reads runtime system information
PID:1573
-
-
-
/usr/bin/sudosudo killall -9 rpc.idmapd3⤵PID:1574
-
/usr/bin/killallkillall -9 rpc.idmapd4⤵
- Reads runtime system information
PID:1575
-
-
-
/usr/bin/sudosudo rm -rf /tmp/.m23⤵PID:1576
-
/bin/rmrm -rf /tmp/.m24⤵PID:1577
-
-
-
/usr/bin/sudosudo killall -9 xorgg3⤵PID:1578
-
/usr/bin/killallkillall -9 xorgg4⤵
- Reads runtime system information
PID:1579
-
-
-
/usr/bin/sudosudo rm -rf /tmp/seconfig3⤵PID:1580
-
/bin/rmrm -rf /tmp/seconfig4⤵PID:1581
-
-
-
/usr/bin/sudosudo killall -9 crond643⤵PID:1582
-
/usr/bin/killallkillall -9 crond644⤵
- Reads runtime system information
PID:1583
-
-
-
/usr/bin/sudosudo killall -9 tsm3⤵PID:1584
-
/usr/bin/killallkillall -9 tsm4⤵
- Reads runtime system information
PID:1585
-
-
-
/usr/bin/sudosudo rm -rf /tmp/.ssh3⤵PID:1586
-
/bin/rmrm -rf /tmp/.ssh4⤵PID:1587
-
-
-
/usr/bin/sudosudo rm -rf /tmp/.java3⤵PID:1588
-
/bin/rmrm -rf /tmp/.java4⤵PID:1589
-
-
-
/usr/bin/sudosudo rm -rf /tmp/.iolanda3⤵PID:1590
-
/bin/rmrm -rf /tmp/.iolanda4⤵PID:1591
-
-
-
/usr/bin/sudosudo pkill test.mod3⤵PID:1592
-
/usr/bin/pkillpkill test.mod4⤵
- Reads CPU attributes
- Reads runtime system information
PID:1593
-
-
-
/usr/bin/sudosudo pkill daemon.i686.mod3⤵PID:1594
-
/usr/bin/pkillpkill daemon.i686.mod4⤵
- Reads CPU attributes
PID:1595
-
-
-
/usr/bin/sudosudo pkill daemon.armv4l.mod3⤵PID:1596
-
/usr/bin/pkillpkill daemon.armv4l.mod4⤵
- Reads CPU attributes
- Reads runtime system information
PID:1597
-
-
-
/usr/bin/sudosudo pkill daemon.mips.mod3⤵PID:1598
-
/usr/bin/pkillpkill daemon.mips.mod4⤵
- Reads CPU attributes
- Reads runtime system information
PID:1599
-
-
-
/usr/bin/sudosudo pkill daemon.mipsel.mod3⤵PID:1600
-
/usr/bin/pkillpkill daemon.mipsel.mod4⤵
- Reads CPU attributes
- Reads runtime system information
PID:1601
-
-
-
/usr/bin/sudosudo rm -rf /tmp/.xs3⤵PID:1602
-
/bin/rmrm -rf /tmp/.xs4⤵PID:1603
-
-
-
/usr/bin/sudosudo pkill ld-linux-x86-643⤵PID:1604
-
/usr/bin/pkillpkill ld-linux-x86-644⤵
- Reads CPU attributes
- Reads runtime system information
PID:1605
-
-
-
/bin/rmrm -rf "/var/tmp/. *"3⤵PID:1606
-
-
/usr/bin/sudosudo killall -9 "[atd]"3⤵PID:1643
-
/usr/bin/killallkillall -9 "[atd]"4⤵PID:1646
-
-
-
/usr/bin/sudosudo rm -rf /tmp/.jk3⤵PID:1647
-
/bin/rmrm -rf /tmp/.jk4⤵PID:1648
-
-
-
/usr/bin/sudosudo killall -9 "[ntpd]"3⤵PID:1649
-
/usr/bin/killallkillall -9 "[ntpd]"4⤵PID:1650
-
-
-
/usr/bin/sudosudo killall -9 "[rpciod]"3⤵
- Reads runtime system information
PID:1651 -
/usr/bin/killallkillall -9 "[rpciod]"4⤵PID:1652
-
-
-
/usr/bin/sudosudo killall -9 "[ext4-dio-unwrit]"3⤵PID:1653
-
/usr/bin/killallkillall -9 "[ext4-dio-unwrit]"4⤵
- Reads runtime system information
PID:1654
-
-
-
/usr/bin/sudosudo rm -rf "/tmp/.xm*"3⤵PID:1655
-
/bin/rmrm -rf "/tmp/.xm*"4⤵PID:1656
-
-
-
/bin/pidofpidof libexec3⤵
- Reads runtime system information
PID:1657
-
-
-
/usr/bin/freefree -m2⤵
- Reads CPU attributes
PID:1644
-
-
/usr/bin/uptimeuptime2⤵
- Reads CPU attributes
PID:1645
-
-
/bin/bash/bin/bash -2⤵PID:1660
-
/usr/bin/sudosudo -S touch .local_285223⤵PID:1665
-
/usr/bin/touchtouch .local_285224⤵
- Writes file to tmp directory
PID:1666
-
-
-
/usr/bin/sudosudo rm .local_285223⤵PID:1670
-
/bin/rmrm .local_285224⤵PID:1671
-
-
-
/usr/bin/sudosudo killall -9 bssh3⤵PID:1678
-
/usr/bin/killallkillall -9 bssh4⤵
- Reads runtime system information
PID:1679
-
-
-
/usr/bin/sudosudo rm -rf /tmp/.an3⤵PID:1680
-
/bin/rmrm -rf /tmp/.an4⤵PID:1681
-
-
-
/usr/bin/sudosudo killall -9 xm643⤵PID:1682
-
/usr/bin/killallkillall -9 xm644⤵
- Reads runtime system information
PID:1683
-
-
-
/usr/bin/sudosudo killall -9 rpc.idmapd3⤵PID:1684
-
/usr/bin/killallkillall -9 rpc.idmapd4⤵
- Reads runtime system information
PID:1685
-
-
-
/usr/bin/sudosudo rm -rf /tmp/.m23⤵PID:1686
-
/bin/rmrm -rf /tmp/.m24⤵PID:1687
-
-
-
/usr/bin/sudosudo killall -9 xorgg3⤵PID:1688
-
/usr/bin/killallkillall -9 xorgg4⤵
- Reads runtime system information
PID:1689
-
-
-
/usr/bin/sudosudo rm -rf /tmp/seconfig3⤵PID:1690
-
/bin/rmrm -rf /tmp/seconfig4⤵PID:1691
-
-
-
/usr/bin/sudosudo killall -9 crond643⤵PID:1692
-
/usr/bin/killallkillall -9 crond644⤵PID:1693
-
-
-
/usr/bin/sudosudo killall -9 tsm3⤵
- Reads runtime system information
PID:1694 -
/usr/bin/killallkillall -9 tsm4⤵PID:1695
-
-
-
/usr/bin/sudosudo rm -rf /tmp/.ssh3⤵PID:1696
-
/bin/rmrm -rf /tmp/.ssh4⤵PID:1697
-
-
-
/usr/bin/sudosudo rm -rf /tmp/.java3⤵PID:1698
-
/bin/rmrm -rf /tmp/.java4⤵PID:1702
-
-
-
/usr/bin/sudosudo rm -rf /tmp/.iolanda3⤵PID:1705
-
/bin/rmrm -rf /tmp/.iolanda4⤵PID:1706
-
-
-
/usr/bin/sudosudo pkill test.mod3⤵PID:1709
-
-
-
/usr/bin/freefree -m2⤵
- Reads CPU attributes
PID:1699
-
-
/usr/bin/uptimeuptime2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1708
-
-
/bin/unameuname -a1⤵PID:1541
-
/bin/catcat /proc/cpuinfo1⤵
- Checks CPU configuration
PID:1543
-
/bin/catcat /etc/issue1⤵PID:1544
-
/usr/bin/freefree -m1⤵
- Reads CPU attributes
PID:1545
-
/usr/bin/uptimeuptime1⤵
- Reads CPU attributes
PID:1546
-
/bin/journalctljournalctl -S "@0" -u sshd1⤵PID:1547
-
/bin/catcat "/var/log/auth*"1⤵PID:1548
-
/bin/zcatzcat "/var/log/auth*"1⤵PID:1549
-
/bin/gzipgzip -cd "/var/log/auth*"1⤵PID:1549
-
/usr/bin/whichwhich sudo1⤵PID:1552
-
/usr/bin/wcwc -l1⤵PID:1553
-
/bin/lsls -l .local_82431⤵PID:1558
-
/bin/grepgrep -c root1⤵PID:1559
-
/usr/bin/sudosudo ps auxff1⤵PID:1563
-
/bin/psps auxff2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1567
-
-
/bin/grepgrep "./crond -t=all"1⤵PID:1564
-
/bin/grepgrep -v grep1⤵PID:1565
-
/usr/bin/awkawk "{ print \$2 }"1⤵PID:1566
-
/usr/bin/sudosudo ps auxf1⤵PID:1608
-
/bin/psps auxf2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1612
-
-
/bin/grepgrep xmr1⤵PID:1609
-
/bin/grepgrep -v grep1⤵PID:1610
-
/usr/bin/awkawk "{ print \$2 }"1⤵PID:1611
-
/usr/bin/sudosudo ps auxf1⤵PID:1614
-
/bin/psps auxf2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1618
-
-
/bin/grepgrep cryptonight1⤵PID:1615
-
/bin/grepgrep -v grep1⤵PID:1616
-
/usr/bin/awkawk "{ print \$2 }"1⤵PID:1617
-
/usr/bin/sudosudo ps auxf1⤵PID:1620
-
/bin/psps auxf2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1624
-
-
/bin/grepgrep stratum1⤵PID:1621
-
/bin/grepgrep -v grep1⤵PID:1622
-
/usr/bin/awkawk "{ print \$2 }"1⤵
- Reads runtime system information
PID:1623
-
/usr/bin/sudosudo ps auxf1⤵PID:1626
-
/bin/psps auxf2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1630
-
-
/bin/grepgrep dbus-daemon--system1⤵PID:1627
-
/bin/grepgrep -v grep1⤵PID:1628
-
/usr/bin/awkawk "{ print \$2 }"1⤵PID:1629
-
/usr/bin/sudosudo ps auxf1⤵PID:1632
-
/bin/psps auxf2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1636
-
-
/bin/grepgrep "\\[\\]"1⤵PID:1633
-
/bin/grepgrep -v grep1⤵PID:1634
-
/usr/bin/awkawk "{ print \$2 }"1⤵PID:1635
-
/usr/bin/sudosudo ps auxf1⤵PID:1638
-
/bin/psps auxf2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1642
-
-
/bin/grepgrep xm641⤵PID:1639
-
/bin/grepgrep -v grep1⤵PID:1640
-
/usr/bin/awkawk "{ print \$2 }"1⤵PID:1641
-
/usr/bin/whichwhich sudo1⤵PID:1662
-
/usr/bin/wcwc -l1⤵PID:1663
-
/bin/lsls -l .local_285221⤵PID:1668
-
/bin/grepgrep -c root1⤵PID:1669
-
/usr/bin/sudosudo ps auxff1⤵PID:1673
-
/bin/psps auxff2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1677
-
-
/bin/grepgrep "./crond -t=all"1⤵PID:1674
-
/bin/grepgrep -v grep1⤵PID:1675
-
/usr/bin/awkawk "{ print \$2 }"1⤵PID:1676
-
/usr/bin/uptimeuptime1⤵
- Reads CPU attributes
PID:1701
-
/usr/bin/freefree -m1⤵
- Reads CPU attributes
PID:1703
-
/usr/bin/uptimeuptime1⤵
- Reads CPU attributes
PID:1704
-
/usr/bin/freefree -m1⤵
- Reads CPU attributes
PID:1707
-
/usr/bin/freefree -m1⤵
- Reads CPU attributes
PID:1710
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381B
MD59da18d38b6dd4c4aa84642378d63fa89
SHA1c5a976691e4b5963b5e760044f22cc9685268db6
SHA25643062900b2539d8d1f67f30fa7042c56b53541f63875b5f0de5d8fbde0e0a8bf
SHA512222b20b5b2ff8956c13dbac1f8d3f81435613b751913d65f4c4082ea9c1a7c8ae91be17a24ef4ae0c708bfe09daab552bb209615714d70acfaaed89c536c71b3