General
-
Target
fa68041f-b86b-43b4-a7a6-78b1dd65e75b
-
Size
3.2MB
-
Sample
240703-dl6z6svaqg
-
MD5
7b53cfbbdad8231443b31dd36d7296de
-
SHA1
bf4a0a58fb6e6d8305bf57eb728e8243d879db94
-
SHA256
1a7e3988f870b32971389ad121fe97ee18a517df09d214910cafad2256d2ef02
-
SHA512
8c7952d2fb9ba68fda00e4b2f4332095d5cc98ca3452dcb5c0ee66472da62389c29f59724514fa7dcf009847355d5bc98dd39a6e64215b29296911911cfc15cc
-
SSDEEP
49152:Uq/aUtZ3gkAPLe3J83v/x5u9IwZalBbcu9kmxRWfMSvQ/TuG3qlOsZ32cE:UqyUj3dZ83Xx5uLZanflrivQTh5s9y
Malware Config
Targets
-
-
Target
fa68041f-b86b-43b4-a7a6-78b1dd65e75b
-
Size
3.2MB
-
MD5
7b53cfbbdad8231443b31dd36d7296de
-
SHA1
bf4a0a58fb6e6d8305bf57eb728e8243d879db94
-
SHA256
1a7e3988f870b32971389ad121fe97ee18a517df09d214910cafad2256d2ef02
-
SHA512
8c7952d2fb9ba68fda00e4b2f4332095d5cc98ca3452dcb5c0ee66472da62389c29f59724514fa7dcf009847355d5bc98dd39a6e64215b29296911911cfc15cc
-
SSDEEP
49152:Uq/aUtZ3gkAPLe3J83v/x5u9IwZalBbcu9kmxRWfMSvQ/TuG3qlOsZ32cE:UqyUj3dZ83Xx5uLZanflrivQTh5s9y
-
Detects Kaiten/Tsunami Payload
-
Detects Kaiten/Tsunami payload
-
XMRig Miner payload
-
Executes dropped EXE
-
Attempts to change immutable files
Modifies inode attributes on the filesystem to allow changing of immutable files.
-
Checks hardware identifiers (DMI)
Checks DMI information which indicate if the system is a virtual machine.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads hardware information
Accesses system info like serial numbers, manufacturer names etc.
-
Writes file to system bin folder
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Hijack Execution Flow
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Hijack Execution Flow
1Scheduled Task/Job
1