General
-
Target
f12b3682-6fff-4026-bc66-3b156c781961
-
Size
3.7MB
-
Sample
240703-dj4f9sycrq
-
MD5
8b40a86b19a8f3ffec80bcc8e03dc5dd
-
SHA1
21017440a86a230e780d8e851ff42c268d292f64
-
SHA256
3afc8270bfe909376568076567dd7bcab398e766457d5945a3966d224d8c34ab
-
SHA512
c50cbceba5e101ba091a31563e30b8dbe7985d3c0cc64b56362474c91d93187ec282fe265ff877183de7bd8f83e80fbe4c3e68de0e312ae142364a8ae4c9274c
-
SSDEEP
98304:AMAAK4W7MRThAHouqB/cyzN7NCx4sdXVAcFXbPSwasS:2D4WSecXEVBPSwa7
Malware Config
Targets
-
-
Target
f12b3682-6fff-4026-bc66-3b156c781961
-
Size
3.7MB
-
MD5
8b40a86b19a8f3ffec80bcc8e03dc5dd
-
SHA1
21017440a86a230e780d8e851ff42c268d292f64
-
SHA256
3afc8270bfe909376568076567dd7bcab398e766457d5945a3966d224d8c34ab
-
SHA512
c50cbceba5e101ba091a31563e30b8dbe7985d3c0cc64b56362474c91d93187ec282fe265ff877183de7bd8f83e80fbe4c3e68de0e312ae142364a8ae4c9274c
-
SSDEEP
98304:AMAAK4W7MRThAHouqB/cyzN7NCx4sdXVAcFXbPSwasS:2D4WSecXEVBPSwa7
-
Detects Kaiten/Tsunami Payload
-
Detects Kaiten/Tsunami payload
-
XMRig Miner payload
-
Executes dropped EXE
-
Attempts to change immutable files
Modifies inode attributes on the filesystem to allow changing of immutable files.
-
Checks hardware identifiers (DMI)
Checks DMI information which indicate if the system is a virtual machine.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads hardware information
Accesses system info like serial numbers, manufacturer names etc.
-
Writes file to system bin folder
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Hijack Execution Flow
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Hijack Execution Flow
1Scheduled Task/Job
1