General
-
Target
17931866188.zip
-
Size
5.4MB
-
Sample
240625-g2e36svajh
-
MD5
3bdf728d47d7deab6b51549f9641c3f4
-
SHA1
85fd63e3d47408cac352634213441493206d75c0
-
SHA256
e74418466797c11a2fea1fa024403b0e6bf46d568e5bfa6fe304c524708f1f8c
-
SHA512
284116ebfa00f38b0ae98ed30ff4071f1b4b6487ec33591566fc3f99ff43b0912c35edb975feddceb5a192e9472db612971a18d552c40edcd655ee0fa281561a
-
SSDEEP
98304:7kU0hQPIXub1B9nLWGQ1rfy1oAld3okyxZKqiscqPCnD7f2iiENYOGaYMbuzcTUW:7kU0nuhaRbyD3XyxZZAVNYNa9buzt12j
Behavioral task
behavioral1
Sample
1fcc2061f767574044ca1e97f92ca1d44ee0b35e0a796e3bd6a949ad4b1175e5
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral2
Sample
1fcc2061f767574044ca1e97f92ca1d44ee0b35e0a796e3bd6a949ad4b1175e5
Resource
ubuntu2204-amd64-20240522.1-en
Behavioral task
behavioral3
Sample
d8a12c39742e862d3c2a72bc85532deb7b62665357a357bf6a4f2ea3ceb8561a
Resource
ubuntu2004-amd64-20240508-en
Behavioral task
behavioral4
Sample
d8a12c39742e862d3c2a72bc85532deb7b62665357a357bf6a4f2ea3ceb8561a
Resource
ubuntu2204-amd64-20240611-en
Malware Config
Targets
-
-
Target
1fcc2061f767574044ca1e97f92ca1d44ee0b35e0a796e3bd6a949ad4b1175e5
-
Size
2.3MB
-
MD5
b9f096559e923787ebb1288c93ce2902
-
SHA1
94851bcc8f9c651bcda0ff33d17356cb0b16cf12
-
SHA256
1fcc2061f767574044ca1e97f92ca1d44ee0b35e0a796e3bd6a949ad4b1175e5
-
SHA512
ce5f09737d0b7191e3b646ed6111bb0ce97544d280223f327c4f4cc652dc840fed639bc0462b88a7f87d071066e302be7980f14faca1f5e6e9bf732637db22be
-
SSDEEP
49152:hjYpLCWvHFiMBiBFjrhrlzr18t7LxcAk4u7prrRQx:MvlNiPt9y7LxXk5prrA
Score1/10 -
-
-
Target
d8a12c39742e862d3c2a72bc85532deb7b62665357a357bf6a4f2ea3ceb8561a
-
Size
3.2MB
-
MD5
396a812c15bd9809d0c8f438b8517827
-
SHA1
6a8eb0ee0a05cede17a50ec04b0a549d70325dcb
-
SHA256
d8a12c39742e862d3c2a72bc85532deb7b62665357a357bf6a4f2ea3ceb8561a
-
SHA512
83ba44b59c9aa517887d27de612b646a17e1b0e372e216e279f188a75e12759b27f181509287e08e79aa34872b59b711fc8efd014b463f58934f762a8d70e948
-
SSDEEP
98304:EenYv0GcTOR0aUripytWEGYk91lRujZv9I:bYoOjGhnGPLlqZvW
-
Detects Kaiten/Tsunami Payload
-
Detects Kaiten/Tsunami payload
-
XMRig Miner payload
-
Executes dropped EXE
-
Flushes firewall rules
Flushes/ disables firewall rules inside the Linux kernel.
-
Reads EFI boot settings
Reads EFI boot settings from the efivars filesystem, may contain security secrets or sensitive data.
-
Attempts to change immutable files
Modifies inode attributes on the filesystem to allow changing of immutable files.
-
Checks hardware identifiers (DMI)
Checks DMI information which indicate if the system is a virtual machine.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads hardware information
Accesses system info like serial numbers, manufacturer names etc.
-
Writes file to system bin folder
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Hijack Execution Flow
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Hijack Execution Flow
1Scheduled Task/Job
1