General

  • Target

    fa68041f-b86b-43b4-a7a6-78b1dd65e75b

  • Size

    3.2MB

  • Sample

    240703-dl6z6svaqg

  • MD5

    7b53cfbbdad8231443b31dd36d7296de

  • SHA1

    bf4a0a58fb6e6d8305bf57eb728e8243d879db94

  • SHA256

    1a7e3988f870b32971389ad121fe97ee18a517df09d214910cafad2256d2ef02

  • SHA512

    8c7952d2fb9ba68fda00e4b2f4332095d5cc98ca3452dcb5c0ee66472da62389c29f59724514fa7dcf009847355d5bc98dd39a6e64215b29296911911cfc15cc

  • SSDEEP

    49152:Uq/aUtZ3gkAPLe3J83v/x5u9IwZalBbcu9kmxRWfMSvQ/TuG3qlOsZ32cE:UqyUj3dZ83Xx5uLZanflrivQTh5s9y

Malware Config

Targets

    • Target

      fa68041f-b86b-43b4-a7a6-78b1dd65e75b

    • Size

      3.2MB

    • MD5

      7b53cfbbdad8231443b31dd36d7296de

    • SHA1

      bf4a0a58fb6e6d8305bf57eb728e8243d879db94

    • SHA256

      1a7e3988f870b32971389ad121fe97ee18a517df09d214910cafad2256d2ef02

    • SHA512

      8c7952d2fb9ba68fda00e4b2f4332095d5cc98ca3452dcb5c0ee66472da62389c29f59724514fa7dcf009847355d5bc98dd39a6e64215b29296911911cfc15cc

    • SSDEEP

      49152:Uq/aUtZ3gkAPLe3J83v/x5u9IwZalBbcu9kmxRWfMSvQ/TuG3qlOsZ32cE:UqyUj3dZ83Xx5uLZanflrivQTh5s9y

    • Detects Kaiten/Tsunami Payload

    • Detects Kaiten/Tsunami payload

    • Kaiten/Tsunami

      Linux-based IoT botnet which is controlled through IRC and normally used to carry out DDoS attacks.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Attempts to change immutable files

      Modifies inode attributes on the filesystem to allow changing of immutable files.

    • Checks hardware identifiers (DMI)

      Checks DMI information which indicate if the system is a virtual machine.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Modifies systemd

      Adds/ modifies systemd service files. Likely to achieve persistence.

    • Reads hardware information

      Accesses system info like serial numbers, manufacturer names etc.

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks