General

  • Target

    2b8fd747fdb8b64016eb540afd2c9dbd

  • Size

    2.7MB

  • Sample

    231219-2rz1taddhn

  • MD5

    2b8fd747fdb8b64016eb540afd2c9dbd

  • SHA1

    37ca39eded79971d54ec1ceb525547dfbc279fca

  • SHA256

    0ac2267d20d8e1546a80c62779077b6088f25b9a9fa03bc4eae474b14b1c81f4

  • SHA512

    dfb642fb8fbf503e5b3184a5fd92f84674dd439b69eb30f43df6860e53ad741fee7c52046864947944f0f73b20ccd25146600324c3319832e22147a8ca43869f

  • SSDEEP

    49152:Y94hMZ52uByNpwoecmyQC3Ln7b7TeMtHzQJYAVve5buIiiOhx3XBxSXZB1wDCMNX:s4q5yvwoec1R3Tf7TeMQYAJwutfXBxys

Malware Config

Targets

    • Target

      2b8fd747fdb8b64016eb540afd2c9dbd

    • Size

      2.7MB

    • MD5

      2b8fd747fdb8b64016eb540afd2c9dbd

    • SHA1

      37ca39eded79971d54ec1ceb525547dfbc279fca

    • SHA256

      0ac2267d20d8e1546a80c62779077b6088f25b9a9fa03bc4eae474b14b1c81f4

    • SHA512

      dfb642fb8fbf503e5b3184a5fd92f84674dd439b69eb30f43df6860e53ad741fee7c52046864947944f0f73b20ccd25146600324c3319832e22147a8ca43869f

    • SSDEEP

      49152:Y94hMZ52uByNpwoecmyQC3Ln7b7TeMtHzQJYAVve5buIiiOhx3XBxSXZB1wDCMNX:s4q5yvwoec1R3Tf7TeMQYAJwutfXBxys

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Modifies the dynamic linker configuration file

      Malware can modify the configuration file of the dynamic linker to preload malicous libraries with every executed process.

    • XMRig Miner payload

    • Changes its process name

    • Executes dropped EXE

    • Modifies hosts file

      Adds to hosts file used for mapping hosts to IP addresses.

    • Attempts to change immutable files

      Modifies inode attributes on the filesystem to allow changing of immutable files.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Modifies systemd

      Adds/ modifies systemd service files. Likely to achieve persistence.

    • Reads CPU attributes

    • Write file to user bin folder

MITRE ATT&CK Enterprise v15

Tasks