Analysis
-
max time kernel
66s -
max time network
129s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20240523-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
27/02/2025, 04:14
Behavioral task
behavioral1
Sample
c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf
-
Size
98KB
-
MD5
85f9548e1bd7afd130a1e2b851b41da8
-
SHA1
75c285684ec3964eb9bf3f4122e48c38f0ae11b8
-
SHA256
c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9
-
SHA512
3f072cbf2ce940eecccb22eecfded787fd29f7a0828c6732c679a1769399ca7611d2ea201cbf37994efa40b0a2136aba50c8d760ed1e4f283a64f173ba23a576
-
SSDEEP
3072:62RuRkQT3v9EbYBo7sphanvn00Cmr5um2XFYZA0e:6ISVv9cgphanvn00Cmr5um2XFYZA0e
Malware Config
Extracted
gafgyt
185.224.0.18:1111
Signatures
-
Detected Gafgyt variant 2 IoCs
resource yara_rule behavioral1/files/fstream-1.dat family_gafgyt behavioral1/files/fstream-4.dat family_gafgyt -
Gafgyt family
-
Executes dropped EXE 44 IoCs
ioc pid Process /tmp/fileX7UzYz 2480 c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf /tmp/filelLMFWi 2487 fileX7UzYz /tmp/fileqJM7fS 2488 filelLMFWi /tmp/filee6xJYm 2489 fileqJM7fS /tmp/file87P8DF 2490 filee6xJYm /tmp/filev4XNKm 2491 file87P8DF /tmp/filekFEaLf 2492 filev4XNKm /tmp/fileheTOQv 2493 filekFEaLf /tmp/file0yY6a7 2494 fileheTOQv /tmp/filenop69F 2495 file0yY6a7 /tmp/file0NGIQL 2496 filenop69F /tmp/filekNo7SJ 2497 file0NGIQL /tmp/fileYaBQPs 2498 filekNo7SJ /tmp/fileLb0kLu 2499 fileYaBQPs /tmp/fileAXjp0l 2500 fileLb0kLu /tmp/filejkivVD 2501 fileAXjp0l /tmp/fileAtLFPj 2502 filejkivVD /tmp/fileVVmQAj 2503 fileAtLFPj /tmp/fileGgt6Mf 2507 fileVVmQAj /tmp/fileo8pfiC 2508 fileGgt6Mf /tmp/fileolkmbf 2509 fileo8pfiC /tmp/fileiiNdT0 2510 fileolkmbf /tmp/fileaFLRaS 2511 fileiiNdT0 /tmp/filepB8YaB 2512 fileaFLRaS /tmp/filejuBJqJ 2513 filepB8YaB /tmp/file7DcHwJ 2514 filejuBJqJ /tmp/filecsMZ64 2515 file7DcHwJ /tmp/filejq0KQr 2516 filecsMZ64 /tmp/file7uEvpS 2517 filejq0KQr /tmp/filextZpm7 2518 file7uEvpS /tmp/filePFHrtq 2519 filextZpm7 /tmp/fileTZfTOj 2520 filePFHrtq /tmp/fileDyBFkx 2521 fileTZfTOj /tmp/fileg7Dr0r 2522 fileDyBFkx /tmp/fileGqWqoN 2523 fileg7Dr0r /tmp/fileIWvv9u 2524 fileGqWqoN /tmp/filez60v1F 2525 fileIWvv9u /tmp/fileEdx69D 2526 filez60v1F /tmp/fileTnqHBR 2527 fileEdx69D /tmp/file6TFpDx 2528 fileTnqHBR /tmp/fileKCmbYY 2529 file6TFpDx /tmp/fileR9Vs44 2530 fileKCmbYY /tmp/filetJYamo 2531 fileR9Vs44 /tmp/file5As9Zv 2532 filetJYamo -
Creates/modifies Cron job 1 TTPs 44 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /etc/cron.hourly/0 fileTZfTOj File opened for modification /etc/cron.hourly/0 fileGqWqoN File opened for modification /etc/cron.hourly/0 file6TFpDx File opened for modification /etc/cron.hourly/0 fileAXjp0l File opened for modification /etc/cron.hourly/0 fileIWvv9u File opened for modification /etc/cron.hourly/0 fileEdx69D File opened for modification /etc/cron.hourly/0 fileR9Vs44 File opened for modification /etc/cron.hourly/0 filenop69F File opened for modification /etc/cron.hourly/0 fileGgt6Mf File opened for modification /etc/cron.hourly/0 fileiiNdT0 File opened for modification /etc/cron.hourly/0 filecsMZ64 File opened for modification /etc/cron.hourly/0 fileDyBFkx File opened for modification /etc/cron.hourly/0 fileg7Dr0r File opened for modification /etc/cron.hourly/0 filelLMFWi File opened for modification /etc/cron.hourly/0 file87P8DF File opened for modification /etc/cron.hourly/0 filev4XNKm File opened for modification /etc/cron.hourly/0 fileheTOQv File opened for modification /etc/cron.hourly/0 filejkivVD File opened for modification /etc/cron.hourly/0 file7uEvpS File opened for modification /etc/cron.hourly/0 filee6xJYm File opened for modification /etc/cron.hourly/0 filekFEaLf File opened for modification /etc/cron.hourly/0 file0yY6a7 File opened for modification /etc/cron.hourly/0 fileAtLFPj File opened for modification /etc/cron.hourly/0 filepB8YaB File opened for modification /etc/cron.hourly/0 file0NGIQL File opened for modification /etc/cron.hourly/0 fileVVmQAj File opened for modification /etc/cron.hourly/0 fileLb0kLu File opened for modification /etc/cron.hourly/0 filejq0KQr File opened for modification /etc/cron.hourly/0 filextZpm7 File opened for modification /etc/cron.hourly/0 fileTnqHBR File opened for modification /etc/cron.hourly/0 fileKCmbYY File opened for modification /etc/cron.hourly/0 filejuBJqJ File opened for modification /etc/cron.hourly/0 fileYaBQPs File opened for modification /etc/cron.hourly/0 c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf File opened for modification /etc/cron.hourly/0 fileqJM7fS File opened for modification /etc/cron.hourly/0 filekNo7SJ File opened for modification /etc/cron.hourly/0 fileolkmbf File opened for modification /etc/cron.hourly/0 filez60v1F File opened for modification /etc/cron.hourly/0 filetJYamo File opened for modification /etc/cron.hourly/0 fileX7UzYz File opened for modification /etc/cron.hourly/0 fileo8pfiC File opened for modification /etc/cron.hourly/0 fileaFLRaS File opened for modification /etc/cron.hourly/0 file7DcHwJ File opened for modification /etc/cron.hourly/0 filePFHrtq -
Writes file to system bin folder 1 IoCs
description ioc Process File opened for modification /bin/ls c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf -
description ioc Process File opened for reading /proc/self/exe file5As9Zv File opened for reading /proc/self/exe filekFEaLf File opened for reading /proc/self/exe fileYaBQPs File opened for reading /proc/self/exe fileiiNdT0 File opened for reading /proc/self/exe fileaFLRaS File opened for reading /proc/self/exe file7uEvpS File opened for reading /proc/self/exe fileTZfTOj File opened for reading /proc/self/exe file6TFpDx File opened for reading /proc/self/exe c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf File opened for reading /proc/self/exe fileqJM7fS File opened for reading /proc/self/exe file87P8DF File opened for reading /proc/self/exe filenop69F File opened for reading /proc/self/exe filejkivVD File opened for reading /proc/self/exe filextZpm7 File opened for reading /proc/self/exe fileIWvv9u File opened for reading /proc/self/exe filetJYamo File opened for reading /proc/self/exe filejuBJqJ File opened for reading /proc/self/exe fileDyBFkx File opened for reading /proc/self/exe fileR9Vs44 File opened for reading /proc/self/exe file0yY6a7 File opened for reading /proc/self/exe fileLb0kLu File opened for reading /proc/self/exe fileAXjp0l File opened for reading /proc/self/exe filejq0KQr File opened for reading /proc/self/exe fileg7Dr0r File opened for reading /proc/self/exe filez60v1F File opened for reading /proc/self/exe filekNo7SJ File opened for reading /proc/self/exe fileo8pfiC File opened for reading /proc/self/exe file7DcHwJ File opened for reading /proc/self/exe fileEdx69D File opened for reading /proc/self/exe fileX7UzYz File opened for reading /proc/self/exe file0NGIQL File opened for reading /proc/self/exe fileAtLFPj File opened for reading /proc/self/exe fileVVmQAj File opened for reading /proc/self/exe fileGgt6Mf File opened for reading /proc/self/exe fileolkmbf File opened for reading /proc/self/exe fileGqWqoN File opened for reading /proc/self/exe fileKCmbYY File opened for reading /proc/self/exe filelLMFWi File opened for reading /proc/self/exe filev4XNKm File opened for reading /proc/self/exe fileheTOQv File opened for reading /proc/self/exe filecsMZ64 File opened for reading /proc/self/exe filePFHrtq File opened for reading /proc/self/exe filee6xJYm File opened for reading /proc/self/exe filepB8YaB File opened for reading /proc/self/exe fileTnqHBR -
Writes file to tmp directory 45 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/fileolkmbf fileo8pfiC File opened for modification /tmp/fileqJM7fS filelLMFWi File opened for modification /tmp/filee6xJYm fileqJM7fS File opened for modification /tmp/fileheTOQv filekFEaLf File opened for modification /tmp/fileAtLFPj filejkivVD File opened for modification /tmp/filejkivVD fileAXjp0l File opened for modification /tmp/filepB8YaB fileaFLRaS File opened for modification /tmp/file7uEvpS filejq0KQr File opened for modification /tmp/fileTZfTOj filePFHrtq File opened for modification /tmp/fileKCmbYY file6TFpDx File opened for modification /tmp/fileAXjp0l fileLb0kLu File opened for modification /tmp/fileiiNdT0 fileolkmbf File opened for modification /tmp/fileDyBFkx fileTZfTOj File opened for modification /tmp/filez60v1F fileIWvv9u File opened for modification /tmp/fileXPZS70 file5As9Zv File opened for modification /tmp/fileaFLRaS fileiiNdT0 File opened for modification /tmp/filecsMZ64 file7DcHwJ File opened for modification /tmp/filePFHrtq filextZpm7 File opened for modification /tmp/fileg7Dr0r fileDyBFkx File opened for modification /tmp/fileR9Vs44 fileKCmbYY File opened for modification /tmp/fileVVmQAj fileAtLFPj File opened for modification /tmp/filejuBJqJ filepB8YaB File opened for modification /tmp/filejq0KQr filecsMZ64 File opened for modification /tmp/filekNo7SJ file0NGIQL File opened for modification /tmp/fileX7UzYz c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf File opened for modification /tmp/file87P8DF filee6xJYm File opened for modification /tmp/filenop69F file0yY6a7 File opened for modification /tmp/fileIWvv9u fileGqWqoN File opened for modification /tmp/filekFEaLf filev4XNKm File opened for modification /tmp/file0yY6a7 fileheTOQv File opened for modification /tmp/fileYaBQPs filekNo7SJ File opened for modification /tmp/fileLb0kLu fileYaBQPs File opened for modification /tmp/fileEdx69D filez60v1F File opened for modification /tmp/fileTnqHBR fileEdx69D File opened for modification /tmp/file5As9Zv filetJYamo File opened for modification /tmp/filev4XNKm file87P8DF File opened for modification /tmp/file0NGIQL filenop69F File opened for modification /tmp/fileGgt6Mf fileVVmQAj File opened for modification /tmp/fileo8pfiC fileGgt6Mf File opened for modification /tmp/fileGqWqoN fileg7Dr0r File opened for modification /tmp/filetJYamo fileR9Vs44 File opened for modification /tmp/filelLMFWi fileX7UzYz File opened for modification /tmp/file7DcHwJ filejuBJqJ File opened for modification /tmp/filextZpm7 file7uEvpS File opened for modification /tmp/file6TFpDx fileTnqHBR
Processes
-
/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf1⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Writes file to system bin folder
- Reads runtime system information
- Writes file to tmp directory
PID:2463 -
/tmp/fileX7UzYz/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf2⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2480 -
/tmp/filelLMFWi/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf3⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2487 -
/tmp/fileqJM7fS/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf4⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2488 -
/tmp/filee6xJYm/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf5⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2489 -
/tmp/file87P8DF/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf6⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2490 -
/tmp/filev4XNKm/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf7⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2491 -
/tmp/filekFEaLf/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf8⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2492 -
/tmp/fileheTOQv/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf9⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2493 -
/tmp/file0yY6a7/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf10⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2494 -
/tmp/filenop69F/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf11⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2495 -
/tmp/file0NGIQL/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf12⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2496 -
/tmp/filekNo7SJ/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf13⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2497 -
/tmp/fileYaBQPs/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf14⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2498 -
/tmp/fileLb0kLu/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf15⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2499 -
/tmp/fileAXjp0l/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf16⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2500 -
/tmp/filejkivVD/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf17⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2501 -
/tmp/fileAtLFPj/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf18⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2502 -
/tmp/fileVVmQAj/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf19⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2503 -
/tmp/fileGgt6Mf/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf20⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2507 -
/tmp/fileo8pfiC/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf21⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2508 -
/tmp/fileolkmbf/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf22⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2509 -
/tmp/fileiiNdT0/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf23⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2510 -
/tmp/fileaFLRaS/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf24⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2511 -
/tmp/filepB8YaB/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf25⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2512 -
/tmp/filejuBJqJ/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf26⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2513 -
/tmp/file7DcHwJ/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf27⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2514 -
/tmp/filecsMZ64/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf28⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2515 -
/tmp/filejq0KQr/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf29⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2516 -
/tmp/file7uEvpS/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf30⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2517 -
/tmp/filextZpm7/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf31⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2518 -
/tmp/filePFHrtq/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf32⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2519 -
/tmp/fileTZfTOj/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf33⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2520 -
/tmp/fileDyBFkx/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf34⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2521 -
/tmp/fileg7Dr0r/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf35⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2522 -
/tmp/fileGqWqoN/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf36⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2523 -
/tmp/fileIWvv9u/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf37⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2524 -
/tmp/filez60v1F/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf38⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2525 -
/tmp/fileEdx69D/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf39⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2526 -
/tmp/fileTnqHBR/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf40⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2527 -
/tmp/file6TFpDx/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf41⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2528 -
/tmp/fileKCmbYY/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf42⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2529 -
/tmp/fileR9Vs44/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf43⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2530 -
/tmp/filetJYamo/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf44⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:2531 -
/tmp/file5As9Zv/tmp/c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9.elf45⤵
- Reads runtime system information
- Writes file to tmp directory
PID:2532
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD53f006f7f81fc17be7f4a0d3da0fad5de
SHA197a94d3d0654c6551057af3809b52572bd7f9f5d
SHA256982f9e0f089b91ba79df723435099df15c72e1201a45010ee60226ab136c93bf
SHA51297d2ac0057427b940ada7c0fc805c1966e2535c3c3767ca85fef4a7e0fdc9d4ef9eb133530408b1e439df067881cb317e948ad9bfd487e958a04c97d9db978e0
-
Filesize
90KB
MD54bc8168b8c378af3bfae2f24d97b9b6c
SHA1fd44443b2cd003a2f730f1dc7a9d6fb0e5839eab
SHA2566a55b599795d69cb14091be61447efef93b8b809904a2955f893c4424158b74e
SHA5121c69ba6d6f12cf52bcfa0e2df1845a4ef29a5cb488e56869350ef78ad3b18cd7ac2a3dce6c7701c03d7a2aebb3f59a1977b8191fe655db847d831b160b6338bf
-
Filesize
98KB
MD585f9548e1bd7afd130a1e2b851b41da8
SHA175c285684ec3964eb9bf3f4122e48c38f0ae11b8
SHA256c8e23dad72cec959fc3a9fd530bf839ca04bb3f7e433364e5aabf62160ee4da9
SHA5123f072cbf2ce940eecccb22eecfded787fd29f7a0828c6732c679a1769399ca7611d2ea201cbf37994efa40b0a2136aba50c8d760ed1e4f283a64f173ba23a576