Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
1.kde/a
ubuntu-18.04-amd64
1.kde/a
debian-9-armhf
.kde/a
debian-9-mips
.kde/a
debian-9-mipsel
.kde/a1
ubuntu-22.04-amd64
.kde/auto.js
windows7-x64
3.kde/auto.js
windows10-2004-x64
3.kde/gen-pass.sh
ubuntu-18.04-amd64
1.kde/gen-pass.sh
debian-9-armhf
.kde/gen-pass.sh
debian-9-mips
.kde/gen-pass.sh
debian-9-mipsel
.kde/go.sh
windows7-x64
3.kde/go.sh
windows10-2004-x64
3.kde/pscan2
ubuntu-22.04-amd64
.kde/ss
ubuntu-22.04-amd64
1.kde/ssh-scan
ubuntu-20.04-amd64
1.kde/start
ubuntu-18.04-amd64
6.kde/start
debian-9-armhf
.kde/start
debian-9-mips
.kde/start
debian-9-mipsel
Analysis
-
max time kernel
0s -
max time network
128s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240729-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
23/10/2024, 21:44
Static task
static1
Behavioral task
behavioral1
Sample
.kde/a
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
.kde/a
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
.kde/a
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
.kde/a
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral5
Sample
.kde/a1
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral6
Sample
.kde/auto.js
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
.kde/auto.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
.kde/gen-pass.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral9
Sample
.kde/gen-pass.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral10
Sample
.kde/gen-pass.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral11
Sample
.kde/gen-pass.sh
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral12
Sample
.kde/go.sh
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
.kde/go.sh
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
.kde/pscan2
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral15
Sample
.kde/ss
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral16
Sample
.kde/ssh-scan
Resource
ubuntu2004-amd64-20240508-en
Behavioral task
behavioral17
Sample
.kde/start
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral18
Sample
.kde/start
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral19
Sample
.kde/start
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral20
Sample
.kde/start
Resource
debian9-mipsel-20240611-en
General
-
Target
.kde/start
-
Size
5KB
-
MD5
bc7c80bf1fa56259a6c8969c563518ab
-
SHA1
130c897ecbc3955ad9a998e1f146dbfb1f21713f
-
SHA256
62270b2e715152a37dd72455d3bdf374c214c8a7cfc8f391cfafa2d65d1646a5
-
SHA512
4fc6724575496160e1a4948f137a7133ffe6fea7761155faebaff8ecb7056fe3dc310fa9e6807881569e144fa530347ea7c4851864b6949ba5b8697313efdb4b
-
SSDEEP
96:uyuYPRHzp8zW9wnqd+9I6bIVrKhI/uVcTa6bEkIev45Cj5MDmNA36anw9Wz8pyft:w9zbWm
Malware Config
Signatures
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Virtualization/Sandbox Evasion: Time Based Evasion 1 TTPs 1 IoCs
Adversaries may detect and evade virtualized environments and sandboxes.
pid Process 1553 uptime -
Reads CPU attributes 1 TTPs 1 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/online uptime -
description ioc Process File opened for reading /proc/1019/stat killall File opened for reading /proc/31/stat killall File opened for reading /proc/10/stat killall File opened for reading /proc/170/stat killall File opened for reading /proc/36/stat killall File opened for reading /proc/1176/stat killall File opened for reading /proc/filesystems mv File opened for reading /proc/1331/stat killall File opened for reading /proc/23/stat killall File opened for reading /proc/522/stat killall File opened for reading /proc/16/stat killall File opened for reading /proc/523/stat killall File opened for reading /proc/552/stat killall File opened for reading /proc/613/stat killall File opened for reading /proc/1156/stat killall File opened for reading /proc/1285/cmdline killall File opened for reading /proc/1076/cmdline killall File opened for reading /proc/1099/stat killall File opened for reading /proc/1316/stat killall File opened for reading /proc/36/cmdline killall File opened for reading /proc/83/stat killall File opened for reading /proc/650/stat killall File opened for reading /proc/674/cmdline killall File opened for reading /proc/1143/stat killall File opened for reading /proc/1189/stat killall File opened for reading /proc/1299/cmdline killall File opened for reading /proc/115/stat killall File opened for reading /proc/725/stat killall File opened for reading /proc/1090/stat killall File opened for reading /proc/filesystems killall File opened for reading /proc/1314/stat killall File opened for reading /proc/167/stat killall File opened for reading /proc/248/stat killall File opened for reading /proc/1154/cmdline killall File opened for reading /proc/162/stat killall File opened for reading /proc/1550/stat killall File opened for reading /proc/1546/stat killall File opened for reading /proc/1090/cmdline killall File opened for reading /proc/1148/stat killall File opened for reading /proc/34/stat killall File opened for reading /proc/89/stat killall File opened for reading /proc/428/stat killall File opened for reading /proc/443/stat killall File opened for reading /proc/457/stat killall File opened for reading /proc/955/cmdline killall File opened for reading /proc/1331/cmdline killall File opened for reading /proc/5/stat killall File opened for reading /proc/1548/stat killall File opened for reading /proc/705/stat killall File opened for reading /proc/82/stat killall File opened for reading /proc/137/stat killall File opened for reading /proc/1189/cmdline killall File opened for reading /proc/1244/stat killall File opened for reading /proc/1350/stat killall File opened for reading /proc/sys/kernel/ngroups_max id File opened for reading /proc/18/stat killall File opened for reading /proc/15/cmdline killall File opened for reading /proc/25/stat killall File opened for reading /proc/1147/stat killall File opened for reading /proc/160/stat killall File opened for reading /proc/1170/stat killall File opened for reading /proc/203/stat killall File opened for reading /proc/317/cmdline killall File opened for reading /proc/485/cmdline killall -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/.kde/info2 start
Processes
-
/tmp/.kde/start/tmp/.kde/start1⤵
- Writes file to tmp directory
PID:1550 -
/tmp/.kde/a1./a12⤵PID:1551
-
-
/sbin/ifconfig/sbin/ifconfig -a2⤵PID:1552
-
-
/usr/bin/uptimeuptime2⤵
- Virtualization/Sandbox Evasion: Time Based Evasion
- Reads CPU attributes
PID:1553
-
-
/bin/unameuname -a2⤵PID:1554
-
-
/bin/catcat /etc/issue2⤵PID:1555
-
-
/bin/catcat /etc/passwd2⤵PID:1556
-
-
/usr/bin/idid2⤵
- Reads runtime system information
PID:1557
-
-
/bin/dfdf -h2⤵PID:1558
-
-
/bin/catcat info22⤵PID:1559
-
-
/bin/rmrm -rf info22⤵PID:1561
-
-
/bin/mvmv a1 .a12⤵
- Reads runtime system information
PID:1562
-
-
/usr/bin/clearclear2⤵PID:1563
-
-
/bin/catcat vuln.txt2⤵PID:1564
-
-
/tmp/.kde/a./a .02⤵PID:1566
-
-
/tmp/.kde/a./a .12⤵PID:1567
-
-
/tmp/.kde/a./a .22⤵PID:1568
-
-
/tmp/.kde/a./a .32⤵PID:1569
-
-
/tmp/.kde/a./a .42⤵PID:1570
-
-
/tmp/.kde/a./a .52⤵PID:1571
-
-
/tmp/.kde/a./a .62⤵PID:1572
-
-
/tmp/.kde/a./a .72⤵PID:1573
-
-
/tmp/.kde/a./a .82⤵PID:1574
-
-
/tmp/.kde/a./a .92⤵PID:1575
-
-
/tmp/.kde/a./a .102⤵PID:1576
-
-
/bin/catcat vuln.txt2⤵PID:1577
-
-
/tmp/.kde/a./a .112⤵PID:1579
-
-
/tmp/.kde/a./a .122⤵PID:1580
-
-
/tmp/.kde/a./a .132⤵PID:1581
-
-
/tmp/.kde/a./a .142⤵PID:1582
-
-
/tmp/.kde/a./a .152⤵PID:1583
-
-
/tmp/.kde/a./a .162⤵PID:1584
-
-
/tmp/.kde/a./a .172⤵PID:1585
-
-
/tmp/.kde/a./a .182⤵PID:1586
-
-
/tmp/.kde/a./a .192⤵PID:1587
-
-
/tmp/.kde/a./a .202⤵PID:1588
-
-
/bin/catcat vuln.txt2⤵PID:1589
-
-
/tmp/.kde/a./a .212⤵PID:1591
-
-
/tmp/.kde/a./a .222⤵PID:1592
-
-
/tmp/.kde/a./a .232⤵PID:1593
-
-
/tmp/.kde/a./a .242⤵PID:1594
-
-
/tmp/.kde/a./a .252⤵PID:1595
-
-
/tmp/.kde/a./a .262⤵PID:1596
-
-
/tmp/.kde/a./a .272⤵PID:1597
-
-
/tmp/.kde/a./a .282⤵PID:1598
-
-
/tmp/.kde/a./a .292⤵PID:1599
-
-
/tmp/.kde/a./a .302⤵PID:1600
-
-
/bin/catcat vuln.txt2⤵PID:1601
-
-
/tmp/.kde/a./a .312⤵PID:1603
-
-
/tmp/.kde/a./a .322⤵PID:1604
-
-
/tmp/.kde/a./a .332⤵PID:1605
-
-
/tmp/.kde/a./a .342⤵PID:1606
-
-
/tmp/.kde/a./a .352⤵PID:1607
-
-
/tmp/.kde/a./a .362⤵PID:1608
-
-
/tmp/.kde/a./a .372⤵PID:1609
-
-
/tmp/.kde/a./a .382⤵PID:1610
-
-
/tmp/.kde/a./a .392⤵PID:1611
-
-
/tmp/.kde/a./a .402⤵PID:1612
-
-
/bin/catcat vuln.txt2⤵PID:1613
-
-
/tmp/.kde/a./a .412⤵PID:1615
-
-
/tmp/.kde/a./a .422⤵PID:1616
-
-
/tmp/.kde/a./a .432⤵PID:1617
-
-
/tmp/.kde/a./a .442⤵PID:1618
-
-
/tmp/.kde/a./a .452⤵PID:1619
-
-
/tmp/.kde/a./a .462⤵PID:1620
-
-
/tmp/.kde/a./a .472⤵PID:1621
-
-
/tmp/.kde/a./a .482⤵PID:1622
-
-
/tmp/.kde/a./a .492⤵PID:1623
-
-
/tmp/.kde/a./a .502⤵PID:1624
-
-
/bin/catcat vuln.txt2⤵PID:1625
-
-
/tmp/.kde/a./a .512⤵PID:1627
-
-
/tmp/.kde/a./a .522⤵PID:1628
-
-
/tmp/.kde/a./a .532⤵PID:1629
-
-
/tmp/.kde/a./a .542⤵PID:1630
-
-
/tmp/.kde/a./a .552⤵PID:1631
-
-
/tmp/.kde/a./a .562⤵PID:1632
-
-
/tmp/.kde/a./a .572⤵PID:1633
-
-
/tmp/.kde/a./a .582⤵PID:1634
-
-
/tmp/.kde/a./a .592⤵PID:1635
-
-
/tmp/.kde/a./a .602⤵PID:1636
-
-
/bin/catcat vuln.txt2⤵PID:1637
-
-
/tmp/.kde/a./a .612⤵PID:1639
-
-
/tmp/.kde/a./a .622⤵PID:1640
-
-
/tmp/.kde/a./a .632⤵PID:1641
-
-
/tmp/.kde/a./a .642⤵PID:1642
-
-
/tmp/.kde/a./a .652⤵PID:1643
-
-
/tmp/.kde/a./a .662⤵PID:1644
-
-
/tmp/.kde/a./a .672⤵PID:1645
-
-
/tmp/.kde/a./a .682⤵PID:1646
-
-
/tmp/.kde/a./a .692⤵PID:1647
-
-
/tmp/.kde/a./a .702⤵PID:1648
-
-
/bin/catcat vuln.txt2⤵PID:1649
-
-
/tmp/.kde/a./a .712⤵PID:1651
-
-
/tmp/.kde/a./a .722⤵PID:1652
-
-
/tmp/.kde/a./a .732⤵PID:1653
-
-
/tmp/.kde/a./a .742⤵PID:1654
-
-
/tmp/.kde/a./a .752⤵PID:1655
-
-
/tmp/.kde/a./a .762⤵PID:1656
-
-
/tmp/.kde/a./a .772⤵PID:1657
-
-
/tmp/.kde/a./a .782⤵PID:1658
-
-
/tmp/.kde/a./a .792⤵PID:1659
-
-
/tmp/.kde/a./a .802⤵PID:1660
-
-
/bin/catcat vuln.txt2⤵PID:1661
-
-
/tmp/.kde/a./a .812⤵PID:1663
-
-
/tmp/.kde/a./a .822⤵PID:1664
-
-
/tmp/.kde/a./a .832⤵PID:1665
-
-
/tmp/.kde/a./a .842⤵PID:1666
-
-
/tmp/.kde/a./a .852⤵PID:1667
-
-
/tmp/.kde/a./a .862⤵PID:1668
-
-
/tmp/.kde/a./a .872⤵PID:1669
-
-
/tmp/.kde/a./a .882⤵PID:1670
-
-
/tmp/.kde/a./a .892⤵PID:1671
-
-
/tmp/.kde/a./a .902⤵PID:1672
-
-
/bin/catcat vuln.txt2⤵PID:1673
-
-
/tmp/.kde/a./a .912⤵PID:1675
-
-
/tmp/.kde/a./a .922⤵PID:1676
-
-
/tmp/.kde/a./a .932⤵PID:1677
-
-
/tmp/.kde/a./a .942⤵PID:1678
-
-
/tmp/.kde/a./a .952⤵PID:1679
-
-
/tmp/.kde/a./a .962⤵PID:1680
-
-
/tmp/.kde/a./a .972⤵PID:1681
-
-
/tmp/.kde/a./a .982⤵PID:1682
-
-
/tmp/.kde/a./a .992⤵PID:1683
-
-
/tmp/.kde/a./a .1002⤵PID:1684
-
-
/bin/catcat vuln.txt2⤵PID:1685
-
-
/tmp/.kde/a./a .1012⤵PID:1687
-
-
/tmp/.kde/a./a .1022⤵PID:1688
-
-
/tmp/.kde/a./a .1032⤵PID:1689
-
-
/tmp/.kde/a./a .1042⤵PID:1690
-
-
/tmp/.kde/a./a .1052⤵PID:1691
-
-
/tmp/.kde/a./a .1062⤵PID:1692
-
-
/tmp/.kde/a./a .1072⤵PID:1693
-
-
/tmp/.kde/a./a .1082⤵PID:1694
-
-
/tmp/.kde/a./a .1092⤵PID:1695
-
-
/tmp/.kde/a./a .1102⤵PID:1696
-
-
/bin/catcat vuln.txt2⤵PID:1697
-
-
/tmp/.kde/a./a .1112⤵PID:1699
-
-
/tmp/.kde/a./a .1122⤵PID:1700
-
-
/tmp/.kde/a./a .1132⤵PID:1701
-
-
/tmp/.kde/a./a .1142⤵PID:1702
-
-
/tmp/.kde/a./a .1152⤵PID:1703
-
-
/tmp/.kde/a./a .1162⤵PID:1704
-
-
/tmp/.kde/a./a .1172⤵PID:1705
-
-
/tmp/.kde/a./a .1182⤵PID:1706
-
-
/tmp/.kde/a./a .1192⤵PID:1707
-
-
/tmp/.kde/a./a .1202⤵PID:1708
-
-
/bin/catcat vuln.txt2⤵PID:1709
-
-
/tmp/.kde/a./a .1212⤵PID:1711
-
-
/tmp/.kde/a./a .1222⤵PID:1712
-
-
/tmp/.kde/a./a .1232⤵PID:1713
-
-
/tmp/.kde/a./a .1242⤵PID:1714
-
-
/tmp/.kde/a./a .1252⤵PID:1715
-
-
/tmp/.kde/a./a .1262⤵PID:1716
-
-
/tmp/.kde/a./a .1272⤵PID:1717
-
-
/tmp/.kde/a./a .1282⤵PID:1718
-
-
/tmp/.kde/a./a .1292⤵PID:1719
-
-
/tmp/.kde/a./a .132⤵PID:1720
-
-
/bin/catcat vuln.txt2⤵PID:1721
-
-
/tmp/.kde/a./a .1312⤵PID:1723
-
-
/tmp/.kde/a./a .1322⤵PID:1724
-
-
/tmp/.kde/a./a .1332⤵PID:1725
-
-
/tmp/.kde/a./a .1342⤵PID:1726
-
-
/tmp/.kde/a./a .1352⤵PID:1727
-
-
/tmp/.kde/a./a .1362⤵PID:1728
-
-
/tmp/.kde/a./a .1372⤵PID:1729
-
-
/tmp/.kde/a./a .1382⤵PID:1730
-
-
/tmp/.kde/a./a .1392⤵PID:1731
-
-
/tmp/.kde/a./a .1402⤵PID:1732
-
-
/bin/catcat vuln.txt2⤵PID:1733
-
-
/tmp/.kde/a./a .1412⤵PID:1735
-
-
/tmp/.kde/a./a .1422⤵PID:1736
-
-
/tmp/.kde/a./a .1432⤵PID:1737
-
-
/tmp/.kde/a./a .1442⤵PID:1738
-
-
/tmp/.kde/a./a .1452⤵PID:1739
-
-
/tmp/.kde/a./a .1462⤵PID:1740
-
-
/tmp/.kde/a./a .1472⤵PID:1741
-
-
/tmp/.kde/a./a .1482⤵PID:1742
-
-
/tmp/.kde/a./a .1492⤵PID:1743
-
-
/tmp/.kde/a./a .1502⤵PID:1744
-
-
/bin/catcat vuln.txt2⤵PID:1745
-
-
/tmp/.kde/a./a .1512⤵PID:1747
-
-
/tmp/.kde/a./a .1522⤵PID:1748
-
-
/tmp/.kde/a./a .1532⤵PID:1749
-
-
/tmp/.kde/a./a .1542⤵PID:1750
-
-
/tmp/.kde/a./a .1552⤵PID:1751
-
-
/tmp/.kde/a./a .1562⤵PID:1752
-
-
/tmp/.kde/a./a .1572⤵PID:1753
-
-
/tmp/.kde/a./a .1582⤵PID:1754
-
-
/tmp/.kde/a./a .1592⤵PID:1755
-
-
/tmp/.kde/a./a .1602⤵PID:1756
-
-
/bin/catcat vuln.txt2⤵PID:1757
-
-
/tmp/.kde/a./a .1612⤵PID:1759
-
-
/tmp/.kde/a./a .1622⤵PID:1760
-
-
/tmp/.kde/a./a .1632⤵PID:1761
-
-
/tmp/.kde/a./a .1642⤵PID:1762
-
-
/tmp/.kde/a./a .1652⤵PID:1763
-
-
/tmp/.kde/a./a .1662⤵PID:1764
-
-
/tmp/.kde/a./a .1672⤵PID:1765
-
-
/tmp/.kde/a./a .1682⤵PID:1766
-
-
/tmp/.kde/a./a .1692⤵PID:1767
-
-
/tmp/.kde/a./a .1702⤵PID:1768
-
-
/bin/catcat vuln.txt2⤵PID:1769
-
-
/tmp/.kde/a./a .1712⤵PID:1771
-
-
/tmp/.kde/a./a .1722⤵PID:1772
-
-
/tmp/.kde/a./a .1732⤵PID:1773
-
-
/tmp/.kde/a./a .1742⤵PID:1774
-
-
/tmp/.kde/a./a .1752⤵PID:1775
-
-
/tmp/.kde/a./a .1762⤵PID:1776
-
-
/tmp/.kde/a./a .1772⤵PID:1777
-
-
/tmp/.kde/a./a .1782⤵PID:1778
-
-
/tmp/.kde/a./a .1792⤵PID:1779
-
-
/tmp/.kde/a./a .1802⤵PID:1780
-
-
/bin/catcat vuln.txt2⤵PID:1781
-
-
/tmp/.kde/a./a .1812⤵PID:1783
-
-
/tmp/.kde/a./a .1822⤵PID:1784
-
-
/tmp/.kde/a./a .1832⤵PID:1785
-
-
/tmp/.kde/a./a .1842⤵PID:1786
-
-
/tmp/.kde/a./a .1852⤵PID:1787
-
-
/tmp/.kde/a./a .1862⤵PID:1788
-
-
/tmp/.kde/a./a .1872⤵PID:1789
-
-
/tmp/.kde/a./a .1882⤵PID:1790
-
-
/tmp/.kde/a./a .1892⤵PID:1791
-
-
/tmp/.kde/a./a .1902⤵PID:1792
-
-
/bin/catcat vuln.txt2⤵PID:1793
-
-
/tmp/.kde/a./a .1912⤵PID:1795
-
-
/tmp/.kde/a./a .1922⤵PID:1796
-
-
/tmp/.kde/a./a .1932⤵PID:1797
-
-
/tmp/.kde/a./a .1942⤵PID:1798
-
-
/tmp/.kde/a./a .1952⤵PID:1799
-
-
/tmp/.kde/a./a .1962⤵PID:1800
-
-
/tmp/.kde/a./a .1972⤵PID:1801
-
-
/tmp/.kde/a./a .1982⤵PID:1802
-
-
/tmp/.kde/a./a .1992⤵PID:1803
-
-
/tmp/.kde/a./a .2002⤵PID:1804
-
-
/bin/catcat vuln.txt2⤵PID:1805
-
-
/tmp/.kde/a./a .2012⤵PID:1807
-
-
/tmp/.kde/a./a .2022⤵PID:1808
-
-
/tmp/.kde/a./a .2032⤵PID:1809
-
-
/tmp/.kde/a./a .2042⤵PID:1810
-
-
/tmp/.kde/a./a .2052⤵PID:1811
-
-
/tmp/.kde/a./a .2062⤵PID:1812
-
-
/tmp/.kde/a./a .2072⤵PID:1813
-
-
/tmp/.kde/a./a .2082⤵PID:1814
-
-
/tmp/.kde/a./a .2092⤵PID:1815
-
-
/tmp/.kde/a./a .2102⤵PID:1816
-
-
/bin/catcat vuln.txt2⤵PID:1817
-
-
/tmp/.kde/a./a .2112⤵PID:1819
-
-
/tmp/.kde/a./a .2122⤵PID:1820
-
-
/tmp/.kde/a./a .2132⤵PID:1821
-
-
/tmp/.kde/a./a .2142⤵PID:1822
-
-
/tmp/.kde/a./a .2152⤵PID:1823
-
-
/tmp/.kde/a./a .2162⤵PID:1824
-
-
/tmp/.kde/a./a .2172⤵PID:1825
-
-
/tmp/.kde/a./a .2182⤵PID:1826
-
-
/tmp/.kde/a./a .2192⤵PID:1827
-
-
/tmp/.kde/a./a .2202⤵PID:1828
-
-
/bin/catcat vuln.txt2⤵PID:1829
-
-
/tmp/.kde/a./a .2212⤵PID:1831
-
-
/tmp/.kde/a./a .2222⤵PID:1832
-
-
/tmp/.kde/a./a .2232⤵PID:1833
-
-
/tmp/.kde/a./a .2242⤵PID:1834
-
-
/tmp/.kde/a./a .2252⤵PID:1835
-
-
/tmp/.kde/a./a .2262⤵PID:1836
-
-
/tmp/.kde/a./a .2272⤵PID:1837
-
-
/tmp/.kde/a./a .2282⤵PID:1838
-
-
/tmp/.kde/a./a .2292⤵PID:1839
-
-
/bin/catcat vuln.txt2⤵PID:1840
-
-
/tmp/.kde/a./a .2302⤵PID:1842
-
-
/tmp/.kde/a./a .2312⤵PID:1843
-
-
/tmp/.kde/a./a .2322⤵PID:1844
-
-
/tmp/.kde/a./a .2332⤵PID:1845
-
-
/tmp/.kde/a./a .2342⤵PID:1846
-
-
/tmp/.kde/a./a .2352⤵PID:1847
-
-
/tmp/.kde/a./a .2362⤵PID:1848
-
-
/tmp/.kde/a./a .2372⤵PID:1849
-
-
/tmp/.kde/a./a .2382⤵PID:1850
-
-
/tmp/.kde/a./a .2392⤵PID:1851
-
-
/bin/catcat vuln.txt2⤵PID:1852
-
-
/tmp/.kde/a./a .2402⤵PID:1854
-
-
/tmp/.kde/a./a .2412⤵PID:1855
-
-
/tmp/.kde/a./a .2422⤵PID:1856
-
-
/tmp/.kde/a./a .2432⤵PID:1857
-
-
/tmp/.kde/a./a .2442⤵PID:1858
-
-
/tmp/.kde/a./a .2452⤵PID:1859
-
-
/tmp/.kde/a./a .2462⤵PID:1860
-
-
/tmp/.kde/a./a .2472⤵PID:1861
-
-
/tmp/.kde/a./a .2482⤵PID:1862
-
-
/tmp/.kde/a./a .2492⤵PID:1863
-
-
/bin/catcat vuln.txt2⤵PID:1864
-
-
/tmp/.kde/a./a .2502⤵PID:1866
-
-
/tmp/.kde/a./a .2512⤵PID:1867
-
-
/tmp/.kde/a./a .2522⤵PID:1868
-
-
/tmp/.kde/a./a .2532⤵PID:1869
-
-
/tmp/.kde/a./a .2542⤵PID:1870
-
-
/tmp/.kde/a./a .2552⤵PID:1871
-
-
/usr/bin/killallkillall -9 a2⤵
- Reads runtime system information
PID:1872
-
-
/bin/rmrm -rf ./a12⤵PID:1873
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27B
MD5210e3691abde94aba36fd981c007118b
SHA1fbed82767e1e597632436aa2b4d5aed2c2585ac2
SHA256a9913f505a1275a5c00a630ae232b04a982bb19efa5b00d5e22ca14e414b84c9
SHA51265a8f42b99268ba4bc17f51f0e2e17d530b344c80bc483c510014bbf2920715517f5be0f770e30f55e1f2603f203fd4af9295bd979a82897e15b1593f08e1580
-
Filesize
54B
MD5a2709419d80ba6b7fb126a5ed3cbebf1
SHA12400112d846a896b8bfee9d8c1791718ef0695b8
SHA25624259785df747f8a38f250211b544b5885e937254a0a3d17658696f8515ca20a
SHA5122f897325d3791ab80619d52978907900e0431518ae44906d06ccfe0dcae412c3d46a034f40da724bd4045d9c33258478bb6c96d33ea0f6c649ac81b7d4a62e8d
-
Filesize
85B
MD568e6530a51c4c7bf17dcf7051a6be710
SHA181380900211b5eca427f5632ff97cfd91eaaf7eb
SHA2560b17dee730444d635adf2892a570927015e1bac71bf869df56bf25d104b1f529
SHA512a103bbcdee57bafed8aa53eb08723aa1653e6e426e66ab6a1aca2e43f94200a2efd9288b0f51f67cc350beb08eb9648432e05feaca95f80179d6701c95b577e0
-
Filesize
146B
MD5caf1040cd6acd26266899b47fabf6eb8
SHA14b6113b4951f044c9de28883907612335a07b88d
SHA256f5859b816fbf69a709a856cf29d592f908b884a0d88d2a94ac4e2d3d6466946e
SHA51244660a333217243db614206fc154b3d560a6e1c5b7dbcb604d49abb0be4ff46454a3f1d84483c9cd67666adecb242ec0c8e5eb3f72e08b4e56d19157ac6f7f82
-
Filesize
179B
MD5352d1b388dc810aff236e133338d75fd
SHA181a193e575b944b836eb41189286511af13a5d6a
SHA256a27a148fc90c8c6147b59603c4b0df46438dd53647a9d204b253aa1046474869
SHA512264f77d013afa5fb0a24b141facbec9a0a4e82977d8d812379edc9c2ae22db402f0f7470f7da28ba5c0a40e7c0ac693750bbe44975f6fc5a3dd2db09bad537bd
-
Filesize
3KB
MD560cd48c81bb014b37182c375b8889c3b
SHA19e85a1fe1b5b66e97d336a7442b9f285038db4b1
SHA2560b996c89695885f13bf0961fbd241866826cb641809b8de62d0278bb1a9d14ed
SHA512349c8a6edc76bbef86cedc63800f63d63a9dc969aec3d6f82368c9a2c65e832d7e841121a2c5f88c7ae2b684e796a01b9172a9333166b7085d7ef7b33e8ce5bd