Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10ampscripts.tar.gz
windows7-x64
3ampscripts.tar.gz
windows10-2004-x64
3sample.tar
windows7-x64
3sample.tar
windows10-2004-x64
3ICMP
ubuntu-22.04-amd64
7arma
ubuntu-24.04-amd64
7fivem.txt
windows7-x64
1fivem.txt
windows10-2004-x64
1fn-lag.txt
windows7-x64
1fn-lag.txt
windows10-2004-x64
1frantech.txt
windows7-x64
1frantech.txt
windows10-2004-x64
1game-clap.txt
windows7-x64
1game-clap.txt
windows10-2004-x64
1game-lag.txt
windows7-x64
1game-lag.txt
windows10-2004-x64
1game.txt
windows7-x64
1game.txt
windows10-2004-x64
1gamev2.txt
windows7-x64
1gamev2.txt
windows10-2004-x64
1gamev3.txt
windows7-x64
1gamev3.txt
windows10-2004-x64
1killall.txt
windows7-x64
1killall.txt
windows10-2004-x64
1killall1.txt
windows7-x64
1killall1.txt
windows10-2004-x64
1ldap.txt
windows7-x64
1ldap.txt
windows10-2004-x64
1ldapv2.txt
windows7-x64
1ldapv2.txt
windows10-2004-x64
1mdns.txt
windows7-x64
1mdns.txt
windows10-2004-x64
1Analysis
-
max time kernel
36s -
max time network
133s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240611-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
11/07/2024, 08:06
Behavioral task
behavioral1
Sample
ampscripts.tar.gz
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ampscripts.tar.gz
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
sample.tar
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
sample.tar
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
ICMP
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral6
Sample
arma
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral7
Sample
fivem.txt
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
fivem.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
fn-lag.txt
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
fn-lag.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
frantech.txt
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
frantech.txt
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
game-clap.txt
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
game-clap.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
game-lag.txt
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
game-lag.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
game.txt
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
game.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
gamev2.txt
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
gamev2.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
gamev3.txt
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
gamev3.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
killall.txt
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
killall.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
killall1.txt
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
killall1.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
ldap.txt
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
ldap.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
ldapv2.txt
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
ldapv2.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
mdns.txt
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
mdns.txt
Resource
win10v2004-20240709-en
General
-
Target
ICMP
-
Size
26KB
-
MD5
d25194077c66aa30beebe70f2ac5c6bd
-
SHA1
51305e4815e5594196137232ef13613c1e82c8b9
-
SHA256
c716cf2edc465e86105e644b6c61b6c26b96b529e4afbd29d4f42c9ea21eab7e
-
SHA512
8fb5c0d7d1e970b7ffaac4162a704ddf1129efa1c7981daa79f80d8b38550b774e3d0b584dbf604d1d5f860ec93255c57f7706e01bee89cabc63af2fa1417e6c
-
SSDEEP
384:BWskamFsqGhR9jyi1jwn+SQDnTmkEWaRe7+IC9fu:AFTaLRRlhw+SQ7TmkE5M7+tf
Malware Config
Signatures
-
Executes dropped EXE 44 IoCs
ioc pid Process /tmp/fileu3SuDW 1613 fileu3SuDW /tmp/filenNKmWY 1614 filenNKmWY /tmp/file7l1lco 1615 file7l1lco /tmp/fileUTvzFH 1616 fileUTvzFH /tmp/fileNzGW4E 1617 fileNzGW4E /tmp/filegk0lGz 1618 filegk0lGz /tmp/fileaYhF4d 1619 fileaYhF4d /tmp/fileVEi0ac 1620 fileVEi0ac /tmp/fileNd6qwb 1621 fileNd6qwb /tmp/filebbkyki 1622 filebbkyki /tmp/fileVDsMJG 1623 fileVDsMJG /tmp/filev9DExB 1624 filev9DExB /tmp/fileWBdcQz 1625 fileWBdcQz /tmp/fileLbS1z0 1626 fileLbS1z0 /tmp/file5JM2pV 1627 file5JM2pV /tmp/filee8gGz0 1628 filee8gGz0 /tmp/file3BDDtu 1629 file3BDDtu /tmp/file7SkusE 1630 file7SkusE /tmp/fileHnr5Cn 1631 fileHnr5Cn /tmp/fileZFfzPR 1632 fileZFfzPR /tmp/filelsQLQR 1633 filelsQLQR /tmp/fileetSdjF 1634 fileetSdjF /tmp/filenv4CPi 1635 filenv4CPi /tmp/fileOSEZgy 1636 fileOSEZgy /tmp/fileHeWeXJ 1637 fileHeWeXJ /tmp/fileN5Ek8R 1638 fileN5Ek8R /tmp/fileiAByiC 1639 fileiAByiC /tmp/fileolu50k 1640 fileolu50k /tmp/filesKFg8O 1641 filesKFg8O /tmp/fileOFP0Gb 1642 fileOFP0Gb /tmp/filev3kvVr 1643 filev3kvVr /tmp/file3QmGcJ 1644 file3QmGcJ /tmp/filedzfZPQ 1645 filedzfZPQ /tmp/filez4Cyei 1648 filez4Cyei /tmp/filewl2nXr 1649 filewl2nXr /tmp/filehCdoLC 1650 filehCdoLC /tmp/fileYZ8fjv 1651 fileYZ8fjv /tmp/fileFL3gVu 1652 fileFL3gVu /tmp/fileB9vhFq 1653 fileB9vhFq /tmp/filedEtmVS 1654 filedEtmVS /tmp/fileoCwzyj 1655 fileoCwzyj /tmp/filegJiNTJ 1656 filegJiNTJ /tmp/filel600Lg 1657 filel600Lg /tmp/fileYqobmc 1658 fileYqobmc -
Creates/modifies Cron job 1 TTPs 44 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /etc/cron.hourly/0 filee8gGz0 File opened for modification /etc/cron.hourly/0 filewl2nXr File opened for modification /etc/cron.hourly/0 filegJiNTJ File opened for modification /etc/cron.hourly/0 filenNKmWY File opened for modification /etc/cron.hourly/0 file7l1lco File opened for modification /etc/cron.hourly/0 filegk0lGz File opened for modification /etc/cron.hourly/0 fileVDsMJG File opened for modification /etc/cron.hourly/0 file7SkusE File opened for modification /etc/cron.hourly/0 filenv4CPi File opened for modification /etc/cron.hourly/0 filez4Cyei File opened for modification /etc/cron.hourly/0 fileaYhF4d File opened for modification /etc/cron.hourly/0 filebbkyki File opened for modification /etc/cron.hourly/0 filev9DExB File opened for modification /etc/cron.hourly/0 fileWBdcQz File opened for modification /etc/cron.hourly/0 fileNzGW4E File opened for modification /etc/cron.hourly/0 fileZFfzPR File opened for modification /etc/cron.hourly/0 fileFL3gVu File opened for modification /etc/cron.hourly/0 fileoCwzyj File opened for modification /etc/cron.hourly/0 ICMP File opened for modification /etc/cron.hourly/0 fileiAByiC File opened for modification /etc/cron.hourly/0 fileolu50k File opened for modification /etc/cron.hourly/0 fileYZ8fjv File opened for modification /etc/cron.hourly/0 fileB9vhFq File opened for modification /etc/cron.hourly/0 filel600Lg File opened for modification /etc/cron.hourly/0 fileUTvzFH File opened for modification /etc/cron.hourly/0 file5JM2pV File opened for modification /etc/cron.hourly/0 fileOFP0Gb File opened for modification /etc/cron.hourly/0 filedzfZPQ File opened for modification /etc/cron.hourly/0 file3QmGcJ File opened for modification /etc/cron.hourly/0 filehCdoLC File opened for modification /etc/cron.hourly/0 fileVEi0ac File opened for modification /etc/cron.hourly/0 fileLbS1z0 File opened for modification /etc/cron.hourly/0 fileOSEZgy File opened for modification /etc/cron.hourly/0 filev3kvVr File opened for modification /etc/cron.hourly/0 fileNd6qwb File opened for modification /etc/cron.hourly/0 file3BDDtu File opened for modification /etc/cron.hourly/0 fileN5Ek8R File opened for modification /etc/cron.hourly/0 fileHeWeXJ File opened for modification /etc/cron.hourly/0 filesKFg8O File opened for modification /etc/cron.hourly/0 filedEtmVS File opened for modification /etc/cron.hourly/0 fileu3SuDW File opened for modification /etc/cron.hourly/0 fileHnr5Cn File opened for modification /etc/cron.hourly/0 filelsQLQR File opened for modification /etc/cron.hourly/0 fileetSdjF -
Writes file to system bin folder 1 TTPs 1 IoCs
description ioc Process File opened for modification /bin/ls ICMP -
Reads runtime system information 44 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/self/exe filenNKmWY File opened for reading /proc/self/exe fileNd6qwb File opened for reading /proc/self/exe fileVDsMJG File opened for reading /proc/self/exe fileLbS1z0 File opened for reading /proc/self/exe file7SkusE File opened for reading /proc/self/exe fileiAByiC File opened for reading /proc/self/exe filedzfZPQ File opened for reading /proc/self/exe filewl2nXr File opened for reading /proc/self/exe file3BDDtu File opened for reading /proc/self/exe filelsQLQR File opened for reading /proc/self/exe fileHeWeXJ File opened for reading /proc/self/exe filegJiNTJ File opened for reading /proc/self/exe fileNzGW4E File opened for reading /proc/self/exe filebbkyki File opened for reading /proc/self/exe fileN5Ek8R File opened for reading /proc/self/exe fileOFP0Gb File opened for reading /proc/self/exe filev3kvVr File opened for reading /proc/self/exe filel600Lg File opened for reading /proc/self/exe file7l1lco File opened for reading /proc/self/exe fileaYhF4d File opened for reading /proc/self/exe fileetSdjF File opened for reading /proc/self/exe filesKFg8O File opened for reading /proc/self/exe filegk0lGz File opened for reading /proc/self/exe fileolu50k File opened for reading /proc/self/exe file3QmGcJ File opened for reading /proc/self/exe fileVEi0ac File opened for reading /proc/self/exe file5JM2pV File opened for reading /proc/self/exe fileHnr5Cn File opened for reading /proc/self/exe fileZFfzPR File opened for reading /proc/self/exe fileOSEZgy File opened for reading /proc/self/exe ICMP File opened for reading /proc/self/exe fileu3SuDW File opened for reading /proc/self/exe filev9DExB File opened for reading /proc/self/exe fileWBdcQz File opened for reading /proc/self/exe filenv4CPi File opened for reading /proc/self/exe filehCdoLC File opened for reading /proc/self/exe filedEtmVS File opened for reading /proc/self/exe fileUTvzFH File opened for reading /proc/self/exe filee8gGz0 File opened for reading /proc/self/exe filez4Cyei File opened for reading /proc/self/exe fileYZ8fjv File opened for reading /proc/self/exe fileFL3gVu File opened for reading /proc/self/exe fileB9vhFq File opened for reading /proc/self/exe fileoCwzyj -
Writes file to tmp directory 44 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/fileUTvzFH file7l1lco File opened for modification /tmp/fileaYhF4d filegk0lGz File opened for modification /tmp/file5JM2pV fileLbS1z0 File opened for modification /tmp/filewl2nXr filez4Cyei File opened for modification /tmp/fileNzGW4E fileUTvzFH File opened for modification /tmp/filebbkyki fileNd6qwb File opened for modification /tmp/fileB9vhFq fileFL3gVu File opened for modification /tmp/filenNKmWY fileu3SuDW File opened for modification /tmp/fileVEi0ac fileaYhF4d File opened for modification /tmp/fileNd6qwb fileVEi0ac File opened for modification /tmp/fileWBdcQz filev9DExB File opened for modification /tmp/fileZFfzPR fileHnr5Cn File opened for modification /tmp/filev3kvVr fileOFP0Gb File opened for modification /tmp/fileOSEZgy filenv4CPi File opened for modification /tmp/fileOFP0Gb filesKFg8O File opened for modification /tmp/file7l1lco filenNKmWY File opened for modification /tmp/file3BDDtu filee8gGz0 File opened for modification /tmp/fileHnr5Cn file7SkusE File opened for modification /tmp/fileHeWeXJ fileOSEZgy File opened for modification /tmp/fileolu50k fileiAByiC File opened for modification /tmp/filez4Cyei filedzfZPQ File opened for modification /tmp/fileoCwzyj filedEtmVS File opened for modification /tmp/filee8gGz0 file5JM2pV File opened for modification /tmp/file7SkusE file3BDDtu File opened for modification /tmp/file3QmGcJ filev3kvVr File opened for modification /tmp/fileFL3gVu fileYZ8fjv File opened for modification /tmp/filegJiNTJ fileoCwzyj File opened for modification /tmp/fileu3SuDW ICMP File opened for modification /tmp/filegk0lGz fileNzGW4E File opened for modification /tmp/fileLbS1z0 fileWBdcQz File opened for modification /tmp/filelsQLQR fileZFfzPR File opened for modification /tmp/fileetSdjF filelsQLQR File opened for modification /tmp/fileN5Ek8R fileHeWeXJ File opened for modification /tmp/fileiAByiC fileN5Ek8R File opened for modification /tmp/filesKFg8O fileolu50k File opened for modification /tmp/fileYZ8fjv filehCdoLC File opened for modification /tmp/filedEtmVS fileB9vhFq File opened for modification /tmp/fileVDsMJG filebbkyki File opened for modification /tmp/filev9DExB fileVDsMJG File opened for modification /tmp/filenv4CPi fileetSdjF File opened for modification /tmp/filedzfZPQ file3QmGcJ File opened for modification /tmp/filehCdoLC filewl2nXr File opened for modification /tmp/filel600Lg filegJiNTJ File opened for modification /tmp/fileYqobmc filel600Lg
Processes
-
/tmp/ICMP/tmp/ICMP1⤵
- Creates/modifies Cron job
- Writes file to system bin folder
- Reads runtime system information
- Writes file to tmp directory
PID:1603 -
/tmp/fileu3SuDW/tmp/ICMP2⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1613 -
/tmp/filenNKmWY/tmp/ICMP3⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1614 -
/tmp/file7l1lco/tmp/ICMP4⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1615 -
/tmp/fileUTvzFH/tmp/ICMP5⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1616 -
/tmp/fileNzGW4E/tmp/ICMP6⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1617 -
/tmp/filegk0lGz/tmp/ICMP7⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1618 -
/tmp/fileaYhF4d/tmp/ICMP8⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1619 -
/tmp/fileVEi0ac/tmp/ICMP9⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1620 -
/tmp/fileNd6qwb/tmp/ICMP10⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1621 -
/tmp/filebbkyki/tmp/ICMP11⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1622 -
/tmp/fileVDsMJG/tmp/ICMP12⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1623 -
/tmp/filev9DExB/tmp/ICMP13⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1624 -
/tmp/fileWBdcQz/tmp/ICMP14⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1625 -
/tmp/fileLbS1z0/tmp/ICMP15⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1626 -
/tmp/file5JM2pV/tmp/ICMP16⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1627 -
/tmp/filee8gGz0/tmp/ICMP17⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1628 -
/tmp/file3BDDtu/tmp/ICMP18⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1629 -
/tmp/file7SkusE/tmp/ICMP19⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1630 -
/tmp/fileHnr5Cn/tmp/ICMP20⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1631 -
/tmp/fileZFfzPR/tmp/ICMP21⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1632 -
/tmp/filelsQLQR/tmp/ICMP22⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1633 -
/tmp/fileetSdjF/tmp/ICMP23⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1634 -
/tmp/filenv4CPi/tmp/ICMP24⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1635 -
/tmp/fileOSEZgy/tmp/ICMP25⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1636 -
/tmp/fileHeWeXJ/tmp/ICMP26⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1637 -
/tmp/fileN5Ek8R/tmp/ICMP27⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1638 -
/tmp/fileiAByiC/tmp/ICMP28⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1639 -
/tmp/fileolu50k/tmp/ICMP29⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1640 -
/tmp/filesKFg8O/tmp/ICMP30⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1641 -
/tmp/fileOFP0Gb/tmp/ICMP31⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1642 -
/tmp/filev3kvVr/tmp/ICMP32⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1643 -
/tmp/file3QmGcJ/tmp/ICMP33⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1644 -
/tmp/filedzfZPQ/tmp/ICMP34⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1645 -
/tmp/filez4Cyei/tmp/ICMP35⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1648 -
/tmp/filewl2nXr/tmp/ICMP36⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1649 -
/tmp/filehCdoLC/tmp/ICMP37⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1650 -
/tmp/fileYZ8fjv/tmp/ICMP38⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1651 -
/tmp/fileFL3gVu/tmp/ICMP39⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1652 -
/tmp/fileB9vhFq/tmp/ICMP40⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1653 -
/tmp/filedEtmVS/tmp/ICMP41⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1654 -
/tmp/fileoCwzyj/tmp/ICMP42⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1655 -
/tmp/filegJiNTJ/tmp/ICMP43⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1656 -
/tmp/filel600Lg/tmp/ICMP44⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:1657 -
/tmp/fileYqobmc/tmp/ICMP45⤵
- Executes dropped EXE
PID:1658
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD53f006f7f81fc17be7f4a0d3da0fad5de
SHA197a94d3d0654c6551057af3809b52572bd7f9f5d
SHA256982f9e0f089b91ba79df723435099df15c72e1201a45010ee60226ab136c93bf
SHA51297d2ac0057427b940ada7c0fc805c1966e2535c3c3767ca85fef4a7e0fdc9d4ef9eb133530408b1e439df067881cb317e948ad9bfd487e958a04c97d9db978e0
-
Filesize
18KB
MD5db8751f1f5e914f01db5b02a3acefc3e
SHA10093680257787599a144109cf823c37db147f8b8
SHA2569e33c85536eb3b6f86b076bc8a753da39beb66b63fa95db0761996456dd43841
SHA512a5f0e4c5e2af3870a67cc26aea3d864dfe0245809dbfcd64ae5105badb8ee6e222e693c09f3dcc8ad22bdc35a7012a2d2fded4ca3e71ff4a1ebbaf527d63e28e
-
Filesize
26KB
MD5d25194077c66aa30beebe70f2ac5c6bd
SHA151305e4815e5594196137232ef13613c1e82c8b9
SHA256c716cf2edc465e86105e644b6c61b6c26b96b529e4afbd29d4f42c9ea21eab7e
SHA5128fb5c0d7d1e970b7ffaac4162a704ddf1129efa1c7981daa79f80d8b38550b774e3d0b584dbf604d1d5f860ec93255c57f7706e01bee89cabc63af2fa1417e6c