Analysis
-
max time kernel
0s -
max time network
128s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240418-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240418-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
29/04/2024, 15:18
Behavioral task
behavioral1
Sample
SecuriteInfo.com.FileRepMalware.13665.4413.elf
Resource
ubuntu1804-amd64-20240418-en
General
-
Target
SecuriteInfo.com.FileRepMalware.13665.4413.elf
-
Size
2.8MB
-
MD5
7c631fca21e348ae4c3408ddd400b416
-
SHA1
faae2eecad2082940462611b7a91c2e4c6241a22
-
SHA256
7c6f0bae1e588821bd5d66cd98f52b7005e054279748c2c851647097fa2ae2df
-
SHA512
0571816d19ad83430953248e6f86545cf4de9836cf5dc9c431832e21252113d137d163d2b2fdeeb9ef468442fe542b9c322be1d22cc862821b6f58567eed7e50
-
SSDEEP
49152:HgCQ//i653nE/IoQQKro0b497cl50mDDJQQb77eSFdFH0wM9qhGql3VGzwIuxMXT:K/i65XoQQyfb4tg5PCgnFHU9qsCpIAMD
Malware Config
Signatures
-
xmrig
XMRig is a high performance, open source, cross platform CPU/GPU miner.
-
XMRig Miner payload 1 IoCs
resource yara_rule behavioral1/memory/1528-1-0x00007fb8d571a000-0x00007fb8d5ea6c38-memory.dmp xmrig -
Checks hardware identifiers (DMI) 1 TTPs 4 IoCs
Checks DMI information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /sys/devices/virtual/dmi/id/product_name SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/virtual/dmi/id/board_vendor SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/virtual/dmi/id/bios_vendor SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/virtual/dmi/id/sys_vendor SecuriteInfo.com.FileRepMalware.13665.4413.elf -
Reads hardware information 1 TTPs 14 IoCs
Accesses system info like serial numbers, manufacturer names etc.
description ioc Process File opened for reading /sys/devices/virtual/dmi/id/board_name SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/virtual/dmi/id/board_serial SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/virtual/dmi/id/board_asset_tag SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/virtual/dmi/id/chassis_vendor SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/virtual/dmi/id/bios_date SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/virtual/dmi/id/product_version SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/virtual/dmi/id/board_version SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/virtual/dmi/id/chassis_type SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/virtual/dmi/id/chassis_version SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/virtual/dmi/id/bios_version SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/virtual/dmi/id/product_serial SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/virtual/dmi/id/product_uuid SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/virtual/dmi/id/chassis_serial SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/virtual/dmi/id/chassis_asset_tag SecuriteInfo.com.FileRepMalware.13665.4413.elf -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo SecuriteInfo.com.FileRepMalware.13665.4413.elf -
Reads CPU attributes 1 TTPs 45 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/level SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/topology/die_cpus SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/type SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/shared_cpu_map SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/type SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/id SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cpufreq/cpuinfo_max_freq SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/topology/cluster_cpus SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/number_of_sets SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/physical_line_partition SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/level SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/size SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/coherency_line_size SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/physical_line_partition SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index6/shared_cpu_map SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/shared_cpu_map SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/number_of_sets SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/physical_line_partition SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cpu_capacity SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/topology/thread_siblings SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/topology/core_id SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/topology/physical_package_id SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cpufreq/base_frequency SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/id SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/id SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/level SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/shared_cpu_map SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/number_of_sets SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index4/shared_cpu_map SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index8/shared_cpu_map SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/possible SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/level SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/size SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/id SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/coherency_line_size SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index5/shared_cpu_map SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index9/shared_cpu_map SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/online SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/coherency_line_size SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/shared_cpu_map SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/size SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index7/shared_cpu_map SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/topology/core_siblings SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/type SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/type SecuriteInfo.com.FileRepMalware.13665.4413.elf -
Enumerates kernel/hardware configuration 1 TTPs 19 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
description ioc Process File opened for reading /sys/devices/system/node/node0/meminfo SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/bus/dax/devices SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/node/node0/access0/initiators/read_latency SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/node/node0/access0/initiators/write_latency SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/fs/cgroup/cpuset/cpuset.cpus SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/fs/cgroup/cpuset/cpuset.mems SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/node/node0/access0/initiators SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/cpu SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/kernel/mm/hugepages SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/node/node0/hugepages SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/node/node0/cpumap SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/node/node0/hugepages/hugepages-2048kB/nr_hugepages SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/node/node0/access1/initiators SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/node/node0/access0/initiators/read_bandwidth SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/node/node0/access0/initiators/write_bandwidth SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/fs/cgroup/unified/cgroup.controllers SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/system/node/online SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /sys/devices/virtual/dmi/id SecuriteInfo.com.FileRepMalware.13665.4413.elf -
Reads runtime system information 5 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/mounts SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /proc/self/cpuset SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /proc/meminfo SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /proc/driver/nvidia/gpus SecuriteInfo.com.FileRepMalware.13665.4413.elf File opened for reading /proc/self/exe SecuriteInfo.com.FileRepMalware.13665.4413.elf