General

  • Target

    xmr-go.sh

  • Size

    774B

  • Sample

    240903-x5ff4swcla

  • MD5

    2c1e821e7f6738e959ba33002a6cc08f

  • SHA1

    615877939420f0055237fc8b6dbf1b54034ab599

  • SHA256

    af92f36f142bcc7b514af34a43ec76f1f11e748ef56549619b2af0d27cf61f2a

  • SHA512

    94562b41fb17bf2baa2d43c8a9a7f57d93a556dba3b670831d2b87b9ac9c25617a4b6e4461d8c0211ec740dcbab0c148f1229f57421b30f48478d283f0555640

Malware Config

Targets

    • Target

      xmr-go.sh

    • Size

      774B

    • MD5

      2c1e821e7f6738e959ba33002a6cc08f

    • SHA1

      615877939420f0055237fc8b6dbf1b54034ab599

    • SHA256

      af92f36f142bcc7b514af34a43ec76f1f11e748ef56549619b2af0d27cf61f2a

    • SHA512

      94562b41fb17bf2baa2d43c8a9a7f57d93a556dba3b670831d2b87b9ac9c25617a4b6e4461d8c0211ec740dcbab0c148f1229f57421b30f48478d283f0555640

    • XMRig Miner payload

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Executes dropped EXE

    • Checks hardware identifiers (DMI)

      Checks DMI information which indicate if the system is a virtual machine.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads hardware information

      Accesses system info like serial numbers, manufacturer names etc.

    • Reads list of loaded kernel modules

      Reads the list of currently loaded kernel modules, possibly to detect virtual environments.

    • Write file to user bin folder

MITRE ATT&CK Enterprise v15

Tasks