Overview
overview
10Static
static
10The-MALWAR...ot.exe
windows7-x64
10The-MALWAR...ot.exe
windows10-2004-x64
10The-MALWAR...ll.exe
windows7-x64
10The-MALWAR...ll.exe
windows10-2004-x64
10The-MALWAR...BS.exe
windows7-x64
10The-MALWAR...BS.exe
windows10-2004-x64
10The-MALWAR...in.exe
windows7-x64
7The-MALWAR...in.exe
windows10-2004-x64
7The-MALWAR....A.exe
windows7-x64
7The-MALWAR....A.exe
windows10-2004-x64
7The-MALWAR....A.exe
windows7-x64
10The-MALWAR....A.exe
windows10-2004-x64
10The-MALWAR....A.dll
windows7-x64
7The-MALWAR....A.dll
windows10-2004-x64
6The-MALWAR...r.xlsm
windows7-x64
10The-MALWAR...r.xlsm
windows10-2004-x64
10The-MALWAR...658754
ubuntu-18.04-amd64
8The-MALWAR...e3c0f1
ubuntu-18.04-amd64
8The-MALWAR...b16793
ubuntu-18.04-amd64
8The-MALWAR...9fd013
ubuntu-18.04-amd64
8The-MALWAR...17bf0d
ubuntu-18.04-amd64
8The-MALWAR...11b2b2
ubuntu-18.04-amd64
8The-MALWAR...18cd3a
ubuntu-18.04-amd64
8The-MALWAR...c0b6aa
ubuntu-18.04-amd64
8The-MALWAR...cec74a
ubuntu-18.04-amd64
8The-MALWAR...5211bb
ubuntu-18.04-amd64
8The-MALWAR...b7a014
ubuntu-18.04-amd64
8The-MALWAR...dafcbf
ubuntu-18.04-amd64
8The-MALWAR...ecdf6f
ubuntu-18.04-amd64
8The-MALWAR...ace289
ubuntu-18.04-amd64
8The-MALWAR...8ea4f5
ubuntu-18.04-amd64
8The-MALWAR...c6d281
ubuntu-18.04-amd64
8Analysis
-
max time kernel
157s -
max time network
165s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231215-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
27-01-2024 14:19
Static task
static1
Behavioral task
behavioral1
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Banking-Malware/DanaBot.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Banking-Malware/DanaBot.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Banking-Malware/Dridex/Dridex.JhiSharp.dll.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Banking-Malware/Dridex/Dridex.JhiSharp.dll.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexDroppedVBS.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexDroppedVBS.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexLoader.bin.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexLoader.bin.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Banking-Malware/Zloader.xlsm
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Banking-Malware/Zloader.xlsm
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Botnets/FritzFrog/001eb377f0452060012124cb214f658754
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral18
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Botnets/FritzFrog/041bc20ca8ac3161098cbc976e67e3c0f1
Resource
ubuntu1804-amd64-20231222-en
Behavioral task
behavioral19
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Botnets/FritzFrog/0ab8836efcaa62c7daac314e0b7ab16793
Resource
ubuntu1804-amd64-20231221-en
Behavioral task
behavioral20
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Botnets/FritzFrog/103b8404dc64c9a44511675981a09fd013
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral21
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Botnets/FritzFrog/2378e76aba1ad6e0c937fb39989217bf0d
Resource
ubuntu1804-amd64-20231222-en
Behavioral task
behavioral22
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Botnets/FritzFrog/30c150419000d27dafcd5d00702411b2b2
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral23
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Botnets/FritzFrog/3205603282a636979a55aa1e1be518cd3a
Resource
ubuntu1804-amd64-20231221-en
Behavioral task
behavioral24
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Botnets/FritzFrog/453468b86856665f2cc0e0e71668c0b6aa
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral25
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Botnets/FritzFrog/5fb29fb0136978b9ccf60750af09cec74a
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral26
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Botnets/FritzFrog/6fe6808b9cfe654f526108ec61cb5211bb
Resource
ubuntu1804-amd64-20231221-en
Behavioral task
behavioral27
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Botnets/FritzFrog/7745b070943e910e8807e3521ac7b7a014
Resource
ubuntu1804-amd64-20231222-en
Behavioral task
behavioral28
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Botnets/FritzFrog/7f18e5b5b7645a80a0d44adf3fecdafcbf
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral29
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Botnets/FritzFrog/90b61cc77bb2d726219fd00ae2d0ecdf6f
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral30
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Botnets/FritzFrog/9384b9e39334479194aacb53cb25ace289
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral31
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Botnets/FritzFrog/985ffee662969825146d1b465d068ea4f5
Resource
ubuntu1804-amd64-20231221-en
Behavioral task
behavioral32
Sample
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Botnets/FritzFrog/d1e82d4a37959a9e6b661e31b8c8c6d281
Resource
ubuntu1804-amd64-20231222-en
General
-
Target
The-MALWARE-Repo-master/The-MALWARE-Repo-master/Botnets/FritzFrog/103b8404dc64c9a44511675981a09fd013
-
Size
8.6MB
-
MD5
ae747bc7fff9bc23f06635ef60ea0e8d
-
SHA1
64315e834f67905ed4e47f36155362a78ac23462
-
SHA256
103b8404dc64c9a44511675981a09fd01395ee837452d114f1350c295357c046
-
SHA512
e24914a58565a43883c27ae4a41061e8edd3d5eef7b86c1c0e9910d9fbe0eef3e78ed49136ac0c9378311e99901b1847bcfd926aa9a3ea44149a7478480f82b2
-
SSDEEP
98304:rDSceJ/GqDu6P0ypQ0Qv5knSTH20ejwBcHjI7Xk:rDSceJ/GqD18RZv5knS720e7s
Malware Config
Signatures
-
Adds new SSH keys 1 IoCs
Linux special file to hold SSH keys. The threat actor may add new keys for further remote access.
Processes:
description ioc File opened for modification /root/.ssh/authorized_keys -
Deletes itself 1 IoCs
Processes:
pid 1598 -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
catdescription ioc process File opened for reading /proc/cpuinfo cat -
Deletes log files 1 TTPs 1 IoCs
Deletes log files on the system.
Processes:
description ioc File deleted /var/log/tmp/The-MALWARE-Repo-master/The-MALWARE-Repo-master/Botnets/FritzFrog/103b8404dc64c9a44511675981a09fd013 -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads CPU attributes 1 TTPs 21 IoCs
Processes:
pkillpspkillfreeuptimepsuptimefreepkillpspsfreepkillpkillpspspsuptimepkillpkillpsdescription ioc process File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online free File opened for reading /sys/devices/system/cpu/online uptime File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online uptime File opened for reading /sys/devices/system/cpu/online free File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online free File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online uptime File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online ps -
Reads runtime system information 64 IoCs
Reads data from /proc virtual filesystem.
Processes:
pspskillallpskillallpskillallpkillpskillallkillallpkillkillallpspkillpidofkillallkillallpssudokillallsudopkillpkillpkillpskillallsudodescription ioc process File opened for reading /proc/stat ps File opened for reading /proc/334/status ps File opened for reading /proc/186/stat killall File opened for reading /proc/957/cmdline ps File opened for reading /proc/1375/status ps File opened for reading /proc/1351/cmdline killall File opened for reading /proc/334/stat ps File opened for reading /proc/34/stat ps File opened for reading /proc/1458/cmdline ps File opened for reading /proc/682/cmdline killall File opened for reading /proc/1111/cmdline pkill File opened for reading /proc/1589/cmdline ps File opened for reading /proc/1174/status ps File opened for reading /proc/83/stat killall File opened for reading /proc/546/cmdline killall File opened for reading /proc/1210/stat killall File opened for reading /proc/1152/cmdline pkill File opened for reading /proc/1188/cmdline ps File opened for reading /proc/173/cmdline ps File opened for reading /proc/989/stat killall File opened for reading /proc/1093/cmdline ps File opened for reading /proc/79/stat ps File opened for reading /proc/2/status ps File opened for reading /proc/1278/stat ps File opened for reading /proc/184/status ps File opened for reading /proc/481/stat killall File opened for reading /proc/1401/cmdline ps File opened for reading /proc/577/cmdline pkill File opened for reading /proc/1124/status ps File opened for reading /proc/189/stat pidof File opened for reading /proc/188/stat killall File opened for reading /proc/98/stat killall File opened for reading /proc/178/cmdline pkill File opened for reading /proc/129/cmdline ps File opened for reading /proc/sys/kernel/ngroups_max sudo File opened for reading /proc/17/cmdline pkill File opened for reading /proc/self/stat ps File opened for reading /proc/1111/cmdline killall File opened for reading /proc/82/cmdline pkill File opened for reading /proc/218/cmdline ps File opened for reading /proc/19/stat killall File opened for reading /proc/32/status ps File opened for reading /proc/1458/status ps File opened for reading /proc/184/status ps File opened for reading /proc/682/stat killall File opened for reading /proc/1111/cmdline killall File opened for reading /proc/1124/stat killall File opened for reading /proc/13/stat killall File opened for reading /proc/sys/kernel/ngroups_max sudo File opened for reading /proc/78/status pkill File opened for reading /proc/1068/cmdline ps File opened for reading /proc/1111/stat killall File opened for reading /proc/89/stat ps File opened for reading /proc/173/status ps File opened for reading /proc/8/status pkill File opened for reading /proc/492/cmdline ps File opened for reading /proc/1062/cmdline ps File opened for reading /proc/190/cmdline pkill File opened for reading /proc/1591/status pkill File opened for reading /proc/1602/stat ps File opened for reading /proc/1615/stat killall File opened for reading /proc/1361/cmdline killall File opened for reading /proc/sys/kernel/ngroups_max sudo File opened for reading /proc/1361/stat killall -
Writes file to tmp directory 2 IoCs
Malware often drops required files in the /tmp directory.
Processes:
touchtouchdescription ioc process File opened for modification /tmp/The-MALWARE-Repo-master/The-MALWARE-Repo-master/Botnets/FritzFrog/.local_24468 touch File opened for modification /tmp/The-MALWARE-Repo-master/The-MALWARE-Repo-master/Botnets/FritzFrog/.local_8899 touch
Processes
-
/tmp/The-MALWARE-Repo-master/The-MALWARE-Repo-master/Botnets/FritzFrog/103b8404dc64c9a44511675981a09fd013/tmp/The-MALWARE-Repo-master/The-MALWARE-Repo-master/Botnets/FritzFrog/103b8404dc64c9a44511675981a09fd0131⤵PID:1595
-
/bin/unameuname -a1⤵PID:1607
-
/bin/catcat /proc/cpuinfo1⤵
- Checks CPU configuration
PID:1608
-
/bin/catcat /etc/issue1⤵PID:1609
-
/usr/bin/freefree -m1⤵
- Reads CPU attributes
PID:1610
-
/usr/bin/uptimeuptime1⤵
- Reads CPU attributes
PID:1611
-
/bin/journalctljournalctl -S "@0" -u sshd1⤵PID:1612
-
/bin/catcat "/var/log/auth*"1⤵PID:1613
-
/bin/zcatzcat "/var/log/auth*"1⤵PID:1614
-
/bin/gzipgzip -cd "/var/log/auth*"1⤵PID:1614
-
/bin/bash/bin/bash -1⤵PID:1615
-
/usr/bin/sudosudo -S touch .local_244682⤵PID:1620
-
/usr/bin/touchtouch .local_244683⤵
- Writes file to tmp directory
PID:1621
-
-
-
/usr/bin/sudosudo rm .local_244682⤵PID:1625
-
/bin/rmrm .local_244683⤵PID:1626
-
-
-
/usr/bin/sudosudo killall -9 bssh2⤵PID:1633
-
/usr/bin/killallkillall -9 bssh3⤵
- Reads runtime system information
PID:1634
-
-
-
/usr/bin/sudosudo rm -rf /tmp/.an2⤵PID:1635
-
/bin/rmrm -rf /tmp/.an3⤵PID:1636
-
-
-
/usr/bin/sudosudo killall -9 xm642⤵PID:1637
-
/usr/bin/killallkillall -9 xm643⤵PID:1638
-
-
-
/usr/bin/sudosudo killall -9 rpc.idmapd2⤵PID:1639
-
/usr/bin/killallkillall -9 rpc.idmapd3⤵
- Reads runtime system information
PID:1640
-
-
-
/usr/bin/sudosudo rm -rf /tmp/.m22⤵PID:1641
-
/bin/rmrm -rf /tmp/.m23⤵PID:1642
-
-
-
/usr/bin/sudosudo killall -9 xorgg2⤵PID:1643
-
/usr/bin/killallkillall -9 xorgg3⤵
- Reads runtime system information
PID:1644
-
-
-
/usr/bin/sudosudo rm -rf /tmp/seconfig2⤵PID:1645
-
/bin/rmrm -rf /tmp/seconfig3⤵PID:1646
-
-
-
/usr/bin/sudosudo killall -9 crond642⤵PID:1647
-
/usr/bin/killallkillall -9 crond643⤵
- Reads runtime system information
PID:1648
-
-
-
/usr/bin/sudosudo killall -9 tsm2⤵PID:1649
-
/usr/bin/killallkillall -9 tsm3⤵PID:1650
-
-
-
/usr/bin/sudosudo rm -rf /tmp/.ssh2⤵PID:1651
-
/bin/rmrm -rf /tmp/.ssh3⤵PID:1652
-
-
-
/usr/bin/sudosudo rm -rf /tmp/.java2⤵PID:1653
-
/bin/rmrm -rf /tmp/.java3⤵PID:1654
-
-
-
/usr/bin/sudosudo rm -rf /tmp/.iolanda2⤵
- Reads runtime system information
PID:1655 -
/bin/rmrm -rf /tmp/.iolanda3⤵PID:1656
-
-
-
/usr/bin/sudosudo pkill test.mod2⤵PID:1657
-
/usr/bin/pkillpkill test.mod3⤵
- Reads CPU attributes
- Reads runtime system information
PID:1658
-
-
-
/usr/bin/sudosudo pkill daemon.i686.mod2⤵PID:1659
-
/usr/bin/pkillpkill daemon.i686.mod3⤵
- Reads CPU attributes
- Reads runtime system information
PID:1660
-
-
-
/usr/bin/sudosudo pkill daemon.armv4l.mod2⤵PID:1661
-
/usr/bin/pkillpkill daemon.armv4l.mod3⤵
- Reads CPU attributes
- Reads runtime system information
PID:1662
-
-
-
/usr/bin/sudosudo pkill daemon.mips.mod2⤵PID:1663
-
/usr/bin/pkillpkill daemon.mips.mod3⤵
- Reads CPU attributes
PID:1664
-
-
-
/usr/bin/sudosudo pkill daemon.mipsel.mod2⤵PID:1665
-
/usr/bin/pkillpkill daemon.mipsel.mod3⤵
- Reads CPU attributes
- Reads runtime system information
PID:1666
-
-
-
/usr/bin/sudosudo rm -rf /tmp/.xs2⤵
- Reads runtime system information
PID:1667 -
/bin/rmrm -rf /tmp/.xs3⤵PID:1668
-
-
-
/usr/bin/sudosudo pkill ld-linux-x86-642⤵PID:1669
-
/usr/bin/pkillpkill ld-linux-x86-643⤵
- Reads CPU attributes
- Reads runtime system information
PID:1670
-
-
-
/bin/rmrm -rf "/var/tmp/. *"2⤵PID:1671
-
-
/usr/bin/sudosudo killall -9 "[atd]"2⤵PID:1708
-
/usr/bin/killallkillall -9 "[atd]"3⤵
- Reads runtime system information
PID:1711
-
-
-
/usr/bin/sudosudo rm -rf /tmp/.jk2⤵PID:1712
-
/bin/rmrm -rf /tmp/.jk3⤵PID:1713
-
-
-
/usr/bin/sudosudo killall -9 "[ntpd]"2⤵PID:1714
-
/usr/bin/killallkillall -9 "[ntpd]"3⤵
- Reads runtime system information
PID:1715
-
-
-
/usr/bin/sudosudo killall -9 "[rpciod]"2⤵PID:1716
-
/usr/bin/killallkillall -9 "[rpciod]"3⤵
- Reads runtime system information
PID:1717
-
-
-
/usr/bin/sudosudo killall -9 "[ext4-dio-unwrit]"2⤵PID:1718
-
/usr/bin/killallkillall -9 "[ext4-dio-unwrit]"3⤵PID:1719
-
-
-
/usr/bin/sudosudo rm -rf "/tmp/.xm*"2⤵PID:1720
-
/bin/rmrm -rf "/tmp/.xm*"3⤵PID:1721
-
-
-
/bin/pidofpidof libexec2⤵
- Reads runtime system information
PID:1722
-
-
/usr/bin/whichwhich sudo1⤵PID:1617
-
/usr/bin/wcwc -l1⤵PID:1618
-
/bin/lsls -l .local_244681⤵PID:1623
-
/bin/grepgrep -c root1⤵PID:1624
-
/usr/bin/sudosudo ps auxff1⤵PID:1628
-
/bin/psps auxff2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1632
-
-
/bin/grepgrep "./crond -t=all"1⤵PID:1629
-
/bin/grepgrep -v grep1⤵PID:1630
-
/usr/bin/awkawk "{ print \$2 }"1⤵PID:1631
-
/usr/bin/sudosudo ps auxf1⤵PID:1673
-
/bin/psps auxf2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1677
-
-
/bin/grepgrep xmr1⤵PID:1674
-
/bin/grepgrep -v grep1⤵PID:1675
-
/usr/bin/awkawk "{ print \$2 }"1⤵PID:1676
-
/usr/bin/sudosudo ps auxf1⤵PID:1679
-
/bin/psps auxf2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1683
-
-
/bin/grepgrep cryptonight1⤵PID:1680
-
/bin/grepgrep -v grep1⤵PID:1681
-
/usr/bin/awkawk "{ print \$2 }"1⤵PID:1682
-
/usr/bin/sudosudo ps auxf1⤵PID:1685
-
/bin/psps auxf2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1689
-
-
/bin/grepgrep stratum1⤵PID:1686
-
/bin/grepgrep -v grep1⤵PID:1687
-
/usr/bin/awkawk "{ print \$2 }"1⤵PID:1688
-
/usr/bin/sudosudo ps auxf1⤵PID:1691
-
/bin/psps auxf2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1695
-
-
/bin/grepgrep dbus-daemon--system1⤵PID:1692
-
/bin/grepgrep -v grep1⤵PID:1693
-
/usr/bin/awkawk "{ print \$2 }"1⤵PID:1694
-
/usr/bin/sudosudo ps auxf1⤵PID:1697
-
/bin/psps auxf2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1701
-
-
/bin/grepgrep "\\[\\]"1⤵PID:1698
-
/bin/grepgrep -v grep1⤵PID:1699
-
/usr/bin/awkawk "{ print \$2 }"1⤵PID:1700
-
/usr/bin/sudosudo ps auxf1⤵PID:1703
-
/bin/psps auxf2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1707
-
-
/bin/grepgrep xm641⤵PID:1704
-
/bin/grepgrep -v grep1⤵PID:1705
-
/usr/bin/awkawk "{ print \$2 }"1⤵PID:1706
-
/usr/bin/freefree -m1⤵
- Reads CPU attributes
PID:1709
-
/usr/bin/uptimeuptime1⤵
- Reads CPU attributes
PID:1710
-
/bin/bash/bin/bash -1⤵PID:1723
-
/usr/bin/sudosudo -S touch .local_88992⤵PID:1728
-
/usr/bin/touchtouch .local_88993⤵
- Writes file to tmp directory
PID:1729
-
-
-
/usr/bin/sudosudo rm .local_88992⤵PID:1733
-
/bin/rmrm .local_88993⤵PID:1734
-
-
-
/usr/bin/sudosudo killall -9 bssh2⤵PID:1741
-
/usr/bin/killallkillall -9 bssh3⤵PID:1742
-
-
-
/usr/bin/sudosudo rm -rf /tmp/.an2⤵PID:1743
-
/bin/rmrm -rf /tmp/.an3⤵PID:1744
-
-
-
/usr/bin/sudosudo killall -9 xm642⤵PID:1745
-
/usr/bin/killallkillall -9 xm643⤵
- Reads runtime system information
PID:1746
-
-
-
/usr/bin/sudosudo killall -9 rpc.idmapd2⤵PID:1747
-
/usr/bin/killallkillall -9 rpc.idmapd3⤵
- Reads runtime system information
PID:1748
-
-
-
/usr/bin/sudosudo rm -rf /tmp/.m22⤵PID:1749
-
/bin/rmrm -rf /tmp/.m23⤵PID:1750
-
-
-
/usr/bin/sudosudo killall -9 xorgg2⤵PID:1751
-
/usr/bin/killallkillall -9 xorgg3⤵PID:1752
-
-
-
/usr/bin/sudosudo rm -rf /tmp/seconfig2⤵PID:1753
-
/bin/rmrm -rf /tmp/seconfig3⤵PID:1754
-
-
-
/usr/bin/sudosudo killall -9 crond642⤵
- Reads runtime system information
PID:1755 -
/usr/bin/killallkillall -9 crond643⤵PID:1756
-
-
-
/usr/bin/sudosudo killall -9 tsm2⤵PID:1757
-
/usr/bin/killallkillall -9 tsm3⤵
- Reads runtime system information
PID:1758
-
-
-
/usr/bin/sudosudo rm -rf /tmp/.ssh2⤵PID:1759
-
/bin/rmrm -rf /tmp/.ssh3⤵PID:1760
-
-
-
/usr/bin/sudosudo rm -rf /tmp/.java2⤵PID:1761
-
/bin/rmrm -rf /tmp/.java3⤵PID:1766
-
-
-
/usr/bin/sudosudo rm -rf /tmp/.iolanda2⤵PID:1767
-
/bin/rmrm -rf /tmp/.iolanda3⤵PID:1768
-
-
-
/usr/bin/sudosudo pkill test.mod2⤵PID:1769
-
/usr/bin/pkillpkill test.mod3⤵
- Reads CPU attributes
- Reads runtime system information
PID:1770
-
-
-
/usr/bin/sudosudo pkill daemon.i686.mod2⤵PID:1771
-
-
/usr/bin/whichwhich sudo1⤵PID:1725
-
/usr/bin/wcwc -l1⤵PID:1726
-
/bin/lsls -l .local_88991⤵PID:1731
-
/bin/grepgrep -c root1⤵PID:1732
-
/usr/bin/sudosudo ps auxff1⤵PID:1736
-
/bin/psps auxff2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1740
-
-
/bin/grepgrep "./crond -t=all"1⤵PID:1737
-
/bin/grepgrep -v grep1⤵PID:1738
-
/usr/bin/awkawk "{ print \$2 }"1⤵PID:1739
-
/usr/bin/freefree -m1⤵
- Reads CPU attributes
PID:1762
-
/usr/bin/uptimeuptime1⤵
- Reads CPU attributes
PID:1765
-
/usr/bin/freefree -m1⤵PID:1772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381B
MD59da18d38b6dd4c4aa84642378d63fa89
SHA1c5a976691e4b5963b5e760044f22cc9685268db6
SHA25643062900b2539d8d1f67f30fa7042c56b53541f63875b5f0de5d8fbde0e0a8bf
SHA512222b20b5b2ff8956c13dbac1f8d3f81435613b751913d65f4c4082ea9c1a7c8ae91be17a24ef4ae0c708bfe09daab552bb209615714d70acfaaed89c536c71b3