<\/a><\/figure><\/div>\n\n\n<\/gwmw><\/gwmw><\/p>\n\n\n\n
Once compromised a WebLogic server, threat actors used a shell script and a Python script, respectively called \u2018c\u2019\u00a0and \u2018y\u2019,\u00a0to download and execute the Hadooken malware. Both scripts are used for malware deployment by downloading it to a temporary folder. This Python\u00a0code tries to download and run the\u00a0Hadooken\u00a0malware by iterating over several paths and then\u00a0deleting\u00a0the file.\u00a0 The shell script also targeted directories containing SSH data to allow lateral movement within the organization and compromise additional servers. Then the malicious code clears the log to hide the activity.<\/p>\n\n\n\n