General

  • Target

    linuxkiller.sh

  • Size

    303B

  • Sample

    240327-swwdraac8w

  • MD5

    0ac2a952c6cb167a68904bf9f21b11c8

  • SHA1

    c455038493c2c234384435af128e21418d584a0f

  • SHA256

    5b18e6fb2d34c9cbdaa7d75c89d3fd884468f783dc0c811b27e839af40ee6c84

  • SHA512

    ab1e6dd2a062307166cdaff39fdea43e7fb27a3d403df4ec4cd2b53674ba4b255667adc2c3a062c742981d94c23b98b63773975e8f7b8c21be0152725757a3be

Malware Config

Targets

    • Target

      linuxkiller.sh

    • Size

      303B

    • MD5

      0ac2a952c6cb167a68904bf9f21b11c8

    • SHA1

      c455038493c2c234384435af128e21418d584a0f

    • SHA256

      5b18e6fb2d34c9cbdaa7d75c89d3fd884468f783dc0c811b27e839af40ee6c84

    • SHA512

      ab1e6dd2a062307166cdaff39fdea43e7fb27a3d403df4ec4cd2b53674ba4b255667adc2c3a062c742981d94c23b98b63773975e8f7b8c21be0152725757a3be

    Score
    7/10
    • Executes dropped EXE

    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Deletes log files

      Deletes log files on the system.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Reads CPU attributes

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

2
T1574

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Indicator Removal

1
T1070

Hijack Execution Flow

2
T1574

Discovery

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks