Overview
overview
10Static
static
10ampscripts.tar.gz
windows7-x64
3ampscripts.tar.gz
windows10-2004-x64
3sample.tar
windows7-x64
3sample.tar
windows10-2004-x64
3ICMP
ubuntu-22.04-amd64
7arma
ubuntu-24.04-amd64
7fivem.txt
windows7-x64
1fivem.txt
windows10-2004-x64
1fn-lag.txt
windows7-x64
1fn-lag.txt
windows10-2004-x64
1frantech.txt
windows7-x64
1frantech.txt
windows10-2004-x64
1game-clap.txt
windows7-x64
1game-clap.txt
windows10-2004-x64
1game-lag.txt
windows7-x64
1game-lag.txt
windows10-2004-x64
1game.txt
windows7-x64
1game.txt
windows10-2004-x64
1gamev2.txt
windows7-x64
1gamev2.txt
windows10-2004-x64
1gamev3.txt
windows7-x64
1gamev3.txt
windows10-2004-x64
1killall.txt
windows7-x64
1killall.txt
windows10-2004-x64
1killall1.txt
windows7-x64
1killall1.txt
windows10-2004-x64
1ldap.txt
windows7-x64
1ldap.txt
windows10-2004-x64
1ldapv2.txt
windows7-x64
1ldapv2.txt
windows10-2004-x64
1mdns.txt
windows7-x64
1mdns.txt
windows10-2004-x64
1Analysis
-
max time kernel
19s -
max time network
129s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20240523-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
11-07-2024 08:06
Behavioral task
behavioral1
Sample
ampscripts.tar.gz
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ampscripts.tar.gz
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
sample.tar
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
sample.tar
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
ICMP
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral6
Sample
arma
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral7
Sample
fivem.txt
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
fivem.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
fn-lag.txt
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
fn-lag.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
frantech.txt
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
frantech.txt
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
game-clap.txt
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
game-clap.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
game-lag.txt
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
game-lag.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
game.txt
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
game.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
gamev2.txt
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
gamev2.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
gamev3.txt
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
gamev3.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
killall.txt
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
killall.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
killall1.txt
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
killall1.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
ldap.txt
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
ldap.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
ldapv2.txt
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
ldapv2.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
mdns.txt
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
mdns.txt
Resource
win10v2004-20240709-en
General
-
Target
arma
-
Size
20KB
-
MD5
879172c625566d9b39bc0381393e7474
-
SHA1
d4c52ba0983856bb1b1e5e5962bc7781d924d784
-
SHA256
4620566578ca146aa8bd214f18ac56ebb6a5cd95e946dfb75fa4d71be1733053
-
SHA512
51c361b781602d2af89aa66d99706f5b8d1dc60be288225a405f62ec961008c44b48af04b5d23c464976ca7e260e35550d3f6c3cab454ef9d9ac454b1c38da5c
-
SSDEEP
192:RnxzjwsWskaDanX6JENuZYhz0h+fcfLBj4dr4NwNsexpPgmd5u275H2O7Sve6/Ji:BWskamFsqGhR9jpNwN9xp4jS36/Or
Malware Config
Signatures
-
Executes dropped EXE 44 IoCs
ioc pid Process /tmp/fileTjMfGD 2772 fileTjMfGD /tmp/fileLkw2l1 2773 fileLkw2l1 /tmp/file1Bu2Il 2774 file1Bu2Il /tmp/filehOER1c 2775 filehOER1c /tmp/fileeJAzOx 2788 fileeJAzOx /tmp/fileNFfCeG 2789 fileNFfCeG /tmp/filebEGSPb 2790 filebEGSPb /tmp/filelMb3VN 2797 filelMb3VN /tmp/fileXH9j9k 2798 fileXH9j9k /tmp/filequWqAh 2799 filequWqAh /tmp/filey7IjqP 2800 filey7IjqP /tmp/filePmRvG2 2801 filePmRvG2 /tmp/fileCBm972 2802 fileCBm972 /tmp/file7kAIhO 2803 file7kAIhO /tmp/fileGi0e1S 2804 fileGi0e1S /tmp/fileA6eUhc 2805 fileA6eUhc /tmp/fileupmo6n 2806 fileupmo6n /tmp/fileY1QBdH 2807 fileY1QBdH /tmp/fileMwRtif 2808 fileMwRtif /tmp/fileZxiHwx 2809 fileZxiHwx /tmp/fileXas4nK 2810 fileXas4nK /tmp/filenRxGZA 2811 filenRxGZA /tmp/fileflKc6Y 2812 fileflKc6Y /tmp/filey4mX0k 2813 filey4mX0k /tmp/file1WuyK4 2814 file1WuyK4 /tmp/filezMxu2w 2815 filezMxu2w /tmp/fileyU8GBR 2816 fileyU8GBR /tmp/fileSpYodA 2817 fileSpYodA /tmp/fileAAJxHd 2818 fileAAJxHd /tmp/fileqGzrFn 2819 fileqGzrFn /tmp/fileaaATap 2820 fileaaATap /tmp/filebgoSV4 2821 filebgoSV4 /tmp/fileYG59oz 2822 fileYG59oz /tmp/fileuDrBQu 2823 fileuDrBQu /tmp/file5wuYBa 2824 file5wuYBa /tmp/filetHRBHb 2825 filetHRBHb /tmp/filevdusNM 2826 filevdusNM /tmp/filen9DFos 2827 filen9DFos /tmp/fileGU9drN 2828 fileGU9drN /tmp/filei9AAdG 2829 filei9AAdG /tmp/fileDuUMt3 2830 fileDuUMt3 /tmp/fileBhLXNt 2831 fileBhLXNt /tmp/fileWs3r98 2832 fileWs3r98 /tmp/filece6b8A 2833 filece6b8A -
Creates/modifies Cron job 1 TTPs 44 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /etc/cron.hourly/0 filelMb3VN File opened for modification /etc/cron.hourly/0 filebgoSV4 File opened for modification /etc/cron.hourly/0 filetHRBHb File opened for modification /etc/cron.hourly/0 filequWqAh File opened for modification /etc/cron.hourly/0 fileupmo6n File opened for modification /etc/cron.hourly/0 fileflKc6Y File opened for modification /etc/cron.hourly/0 filey4mX0k File opened for modification /etc/cron.hourly/0 fileYG59oz File opened for modification /etc/cron.hourly/0 filei9AAdG File opened for modification /etc/cron.hourly/0 file1Bu2Il File opened for modification /etc/cron.hourly/0 fileXH9j9k File opened for modification /etc/cron.hourly/0 fileA6eUhc File opened for modification /etc/cron.hourly/0 fileMwRtif File opened for modification /etc/cron.hourly/0 file1WuyK4 File opened for modification /etc/cron.hourly/0 fileyU8GBR File opened for modification /etc/cron.hourly/0 arma File opened for modification /etc/cron.hourly/0 fileNFfCeG File opened for modification /etc/cron.hourly/0 filePmRvG2 File opened for modification /etc/cron.hourly/0 filezMxu2w File opened for modification /etc/cron.hourly/0 filebEGSPb File opened for modification /etc/cron.hourly/0 fileY1QBdH File opened for modification /etc/cron.hourly/0 filenRxGZA File opened for modification /etc/cron.hourly/0 file5wuYBa File opened for modification /etc/cron.hourly/0 fileBhLXNt File opened for modification /etc/cron.hourly/0 fileLkw2l1 File opened for modification /etc/cron.hourly/0 fileeJAzOx File opened for modification /etc/cron.hourly/0 fileXas4nK File opened for modification /etc/cron.hourly/0 fileaaATap File opened for modification /etc/cron.hourly/0 fileuDrBQu File opened for modification /etc/cron.hourly/0 filehOER1c File opened for modification /etc/cron.hourly/0 file7kAIhO File opened for modification /etc/cron.hourly/0 fileGU9drN File opened for modification /etc/cron.hourly/0 fileAAJxHd File opened for modification /etc/cron.hourly/0 fileqGzrFn File opened for modification /etc/cron.hourly/0 fileTjMfGD File opened for modification /etc/cron.hourly/0 filey7IjqP File opened for modification /etc/cron.hourly/0 fileCBm972 File opened for modification /etc/cron.hourly/0 fileGi0e1S File opened for modification /etc/cron.hourly/0 fileZxiHwx File opened for modification /etc/cron.hourly/0 fileSpYodA File opened for modification /etc/cron.hourly/0 filevdusNM File opened for modification /etc/cron.hourly/0 filen9DFos File opened for modification /etc/cron.hourly/0 fileDuUMt3 File opened for modification /etc/cron.hourly/0 fileWs3r98 -
Writes file to system bin folder 1 TTPs 1 IoCs
description ioc Process File opened for modification /bin/ls arma -
Reads runtime system information 45 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/self/exe fileeJAzOx File opened for reading /proc/self/exe fileSpYodA File opened for reading /proc/self/exe fileBhLXNt File opened for reading /proc/self/exe fileCBm972 File opened for reading /proc/self/exe fileupmo6n File opened for reading /proc/self/exe fileXas4nK File opened for reading /proc/self/exe fileaaATap File opened for reading /proc/self/exe filetHRBHb File opened for reading /proc/self/exe fileNFfCeG File opened for reading /proc/self/exe filePmRvG2 File opened for reading /proc/self/exe fileyU8GBR File opened for reading /proc/self/exe fileWs3r98 File opened for reading /proc/self/exe filece6b8A File opened for reading /proc/self/exe fileZxiHwx File opened for reading /proc/self/exe filenRxGZA File opened for reading /proc/self/exe file1WuyK4 File opened for reading /proc/self/exe filebEGSPb File opened for reading /proc/self/exe filequWqAh File opened for reading /proc/self/exe filey7IjqP File opened for reading /proc/self/exe fileGi0e1S File opened for reading /proc/self/exe fileY1QBdH File opened for reading /proc/self/exe fileqGzrFn File opened for reading /proc/self/exe filen9DFos File opened for reading /proc/self/exe fileGU9drN File opened for reading /proc/self/exe filehOER1c File opened for reading /proc/self/exe fileMwRtif File opened for reading /proc/self/exe fileflKc6Y File opened for reading /proc/self/exe fileYG59oz File opened for reading /proc/self/exe filevdusNM File opened for reading /proc/self/exe file7kAIhO File opened for reading /proc/self/exe filezMxu2w File opened for reading /proc/self/exe fileAAJxHd File opened for reading /proc/self/exe fileuDrBQu File opened for reading /proc/self/exe fileA6eUhc File opened for reading /proc/self/exe filey4mX0k File opened for reading /proc/self/exe filei9AAdG File opened for reading /proc/self/exe arma File opened for reading /proc/self/exe fileLkw2l1 File opened for reading /proc/self/exe file1Bu2Il File opened for reading /proc/self/exe filelMb3VN File opened for reading /proc/self/exe fileXH9j9k File opened for reading /proc/self/exe fileDuUMt3 File opened for reading /proc/self/exe fileTjMfGD File opened for reading /proc/self/exe filebgoSV4 File opened for reading /proc/self/exe file5wuYBa -
Writes file to tmp directory 45 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/file5wuYBa fileuDrBQu File opened for modification /tmp/fileLkw2l1 fileTjMfGD File opened for modification /tmp/fileNFfCeG fileeJAzOx File opened for modification /tmp/filequWqAh fileXH9j9k File opened for modification /tmp/fileGi0e1S file7kAIhO File opened for modification /tmp/fileupmo6n fileA6eUhc File opened for modification /tmp/fileXas4nK fileZxiHwx File opened for modification /tmp/filenRxGZA fileXas4nK File opened for modification /tmp/fileflKc6Y filenRxGZA File opened for modification /tmp/filey4mX0k fileflKc6Y File opened for modification /tmp/fileqGzrFn fileAAJxHd File opened for modification /tmp/filebgoSV4 fileaaATap File opened for modification /tmp/fileDuUMt3 filei9AAdG File opened for modification /tmp/filelMb3VN filebEGSPb File opened for modification /tmp/fileCBm972 filePmRvG2 File opened for modification /tmp/fileY1QBdH fileupmo6n File opened for modification /tmp/fileSpYodA fileyU8GBR File opened for modification /tmp/fileBhLXNt fileDuUMt3 File opened for modification /tmp/fileWs3r98 fileBhLXNt File opened for modification /tmp/filece6b8A fileWs3r98 File opened for modification /tmp/fileyU8GBR filezMxu2w File opened for modification /tmp/fileTjMfGD arma File opened for modification /tmp/filehOER1c file1Bu2Il File opened for modification /tmp/filePmRvG2 filey7IjqP File opened for modification /tmp/file7kAIhO fileCBm972 File opened for modification /tmp/fileaaATap fileqGzrFn File opened for modification /tmp/fileYG59oz filebgoSV4 File opened for modification /tmp/filei9AAdG fileGU9drN File opened for modification /tmp/file1Bu2Il fileLkw2l1 File opened for modification /tmp/filey7IjqP filequWqAh File opened for modification /tmp/fileA6eUhc fileGi0e1S File opened for modification /tmp/fileMwRtif fileY1QBdH File opened for modification /tmp/file1WuyK4 filey4mX0k File opened for modification /tmp/filezMxu2w file1WuyK4 File opened for modification /tmp/fileuDrBQu fileYG59oz File opened for modification /tmp/filevdusNM filetHRBHb File opened for modification /tmp/fileBcGOW0 filece6b8A File opened for modification /tmp/fileeJAzOx filehOER1c File opened for modification /tmp/fileXH9j9k filelMb3VN File opened for modification /tmp/fileAAJxHd fileSpYodA File opened for modification /tmp/filen9DFos filevdusNM File opened for modification /tmp/filebEGSPb fileNFfCeG File opened for modification /tmp/fileZxiHwx fileMwRtif File opened for modification /tmp/filetHRBHb file5wuYBa File opened for modification /tmp/fileGU9drN filen9DFos
Processes
-
/tmp/arma/tmp/arma1⤵
- Creates/modifies Cron job
- Writes file to system bin folder
- Reads runtime system information
- Writes file to tmp directory
PID:2767 -
/tmp/fileTjMfGD/tmp/arma2⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2772 -
/tmp/fileLkw2l1/tmp/arma3⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2773 -
/tmp/file1Bu2Il/tmp/arma4⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2774 -
/tmp/filehOER1c/tmp/arma5⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2775 -
/tmp/fileeJAzOx/tmp/arma6⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2788 -
/tmp/fileNFfCeG/tmp/arma7⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2789 -
/tmp/filebEGSPb/tmp/arma8⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2790 -
/tmp/filelMb3VN/tmp/arma9⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2797 -
/tmp/fileXH9j9k/tmp/arma10⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2798 -
/tmp/filequWqAh/tmp/arma11⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2799 -
/tmp/filey7IjqP/tmp/arma12⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2800 -
/tmp/filePmRvG2/tmp/arma13⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2801 -
/tmp/fileCBm972/tmp/arma14⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2802 -
/tmp/file7kAIhO/tmp/arma15⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2803 -
/tmp/fileGi0e1S/tmp/arma16⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2804 -
/tmp/fileA6eUhc/tmp/arma17⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2805 -
/tmp/fileupmo6n/tmp/arma18⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2806 -
/tmp/fileY1QBdH/tmp/arma19⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2807 -
/tmp/fileMwRtif/tmp/arma20⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2808 -
/tmp/fileZxiHwx/tmp/arma21⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2809 -
/tmp/fileXas4nK/tmp/arma22⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2810 -
/tmp/filenRxGZA/tmp/arma23⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2811 -
/tmp/fileflKc6Y/tmp/arma24⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2812 -
/tmp/filey4mX0k/tmp/arma25⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2813 -
/tmp/file1WuyK4/tmp/arma26⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2814 -
/tmp/filezMxu2w/tmp/arma27⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2815 -
/tmp/fileyU8GBR/tmp/arma28⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2816 -
/tmp/fileSpYodA/tmp/arma29⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2817 -
/tmp/fileAAJxHd/tmp/arma30⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2818 -
/tmp/fileqGzrFn/tmp/arma31⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2819 -
/tmp/fileaaATap/tmp/arma32⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2820 -
/tmp/filebgoSV4/tmp/arma33⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2821 -
/tmp/fileYG59oz/tmp/arma34⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2822 -
/tmp/fileuDrBQu/tmp/arma35⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2823 -
/tmp/file5wuYBa/tmp/arma36⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2824 -
/tmp/filetHRBHb/tmp/arma37⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2825 -
/tmp/filevdusNM/tmp/arma38⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2826 -
/tmp/filen9DFos/tmp/arma39⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2827 -
/tmp/fileGU9drN/tmp/arma40⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2828 -
/tmp/filei9AAdG/tmp/arma41⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2829 -
/tmp/fileDuUMt3/tmp/arma42⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2830 -
/tmp/fileBhLXNt/tmp/arma43⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2831 -
/tmp/fileWs3r98/tmp/arma44⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2832 -
/tmp/filece6b8A/tmp/arma45⤵
- Executes dropped EXE
- Reads runtime system information
- Writes file to tmp directory
PID:2833
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD53f006f7f81fc17be7f4a0d3da0fad5de
SHA197a94d3d0654c6551057af3809b52572bd7f9f5d
SHA256982f9e0f089b91ba79df723435099df15c72e1201a45010ee60226ab136c93bf
SHA51297d2ac0057427b940ada7c0fc805c1966e2535c3c3767ca85fef4a7e0fdc9d4ef9eb133530408b1e439df067881cb317e948ad9bfd487e958a04c97d9db978e0
-
Filesize
12KB
MD52ba8bf40c5bd55c1e62c25f29c5b45b5
SHA1da91e9feab5ba5dba905536ef2f8dd298423ee87
SHA25672c9601f7200df8eecc39fa232c96d4af35901b955ada85530fd2b712381423e
SHA512b7fd1ffc8dc67ce3766f046c67467d1993ae9216a83bf5f996577e634a48546cea9bc3753d28ec84f69afa2560922cac5f757a2fe331143e43c6b2fadf31107a
-
Filesize
20KB
MD5879172c625566d9b39bc0381393e7474
SHA1d4c52ba0983856bb1b1e5e5962bc7781d924d784
SHA2564620566578ca146aa8bd214f18ac56ebb6a5cd95e946dfb75fa4d71be1733053
SHA51251c361b781602d2af89aa66d99706f5b8d1dc60be288225a405f62ec961008c44b48af04b5d23c464976ca7e260e35550d3f6c3cab454ef9d9ac454b1c38da5c