General
-
Target
2b8fd747fdb8b64016eb540afd2c9dbd
-
Size
2.7MB
-
Sample
231219-2rz1taddhn
-
MD5
2b8fd747fdb8b64016eb540afd2c9dbd
-
SHA1
37ca39eded79971d54ec1ceb525547dfbc279fca
-
SHA256
0ac2267d20d8e1546a80c62779077b6088f25b9a9fa03bc4eae474b14b1c81f4
-
SHA512
dfb642fb8fbf503e5b3184a5fd92f84674dd439b69eb30f43df6860e53ad741fee7c52046864947944f0f73b20ccd25146600324c3319832e22147a8ca43869f
-
SSDEEP
49152:Y94hMZ52uByNpwoecmyQC3Ln7b7TeMtHzQJYAVve5buIiiOhx3XBxSXZB1wDCMNX:s4q5yvwoec1R3Tf7TeMQYAJwutfXBxys
Static task
static1
Behavioral task
behavioral1
Sample
2b8fd747fdb8b64016eb540afd2c9dbd
Resource
ubuntu1804-amd64-20231215-en
Malware Config
Targets
-
-
Target
2b8fd747fdb8b64016eb540afd2c9dbd
-
Size
2.7MB
-
MD5
2b8fd747fdb8b64016eb540afd2c9dbd
-
SHA1
37ca39eded79971d54ec1ceb525547dfbc279fca
-
SHA256
0ac2267d20d8e1546a80c62779077b6088f25b9a9fa03bc4eae474b14b1c81f4
-
SHA512
dfb642fb8fbf503e5b3184a5fd92f84674dd439b69eb30f43df6860e53ad741fee7c52046864947944f0f73b20ccd25146600324c3319832e22147a8ca43869f
-
SSDEEP
49152:Y94hMZ52uByNpwoecmyQC3Ln7b7TeMtHzQJYAVve5buIiiOhx3XBxSXZB1wDCMNX:s4q5yvwoec1R3Tf7TeMQYAJwutfXBxys
Score10/10-
Modifies the dynamic linker configuration file
Malware can modify the configuration file of the dynamic linker to preload malicous libraries with every executed process.
-
XMRig Miner payload
-
Changes its process name
-
Executes dropped EXE
-
Modifies hosts file
Adds to hosts file used for mapping hosts to IP addresses.
-
Attempts to change immutable files
Modifies inode attributes on the filesystem to allow changing of immutable files.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads CPU attributes
-
Write file to user bin folder
-