General
-
Target
xmr_linux_amd64.elf
-
Size
8.7MB
-
Sample
240918-g1fy3sxalq
-
MD5
aff9d4675fdb21bb30e23ab1466b5841
-
SHA1
bed1388ccca38218fa67ac7670b0e13bf759702e
-
SHA256
5f3e06f187c4088882133251e9ee6a03e8f11c73354af3bd6fd7c010b46e78f0
-
SHA512
2ed958de56fa264446d7d85d36c05e693926a6bfeed6d58aeea7aa1d6f595c94b71472c75834c3edc71ffefc4c3fc59a5362e377ee93c651637d77dc20c9ecf0
-
SSDEEP
98304:6OiwcvRyACNEbruhSGwXUEvNPHbZNcRsR:diNCKbreqv9bZNcRsR
Static task
static1
Behavioral task
behavioral1
Sample
xmr_linux_amd64.elf
Resource
ubuntu2204-amd64-20240522.1-en
Malware Config
Targets
-
-
Target
xmr_linux_amd64.elf
-
Size
8.7MB
-
MD5
aff9d4675fdb21bb30e23ab1466b5841
-
SHA1
bed1388ccca38218fa67ac7670b0e13bf759702e
-
SHA256
5f3e06f187c4088882133251e9ee6a03e8f11c73354af3bd6fd7c010b46e78f0
-
SHA512
2ed958de56fa264446d7d85d36c05e693926a6bfeed6d58aeea7aa1d6f595c94b71472c75834c3edc71ffefc4c3fc59a5362e377ee93c651637d77dc20c9ecf0
-
SSDEEP
98304:6OiwcvRyACNEbruhSGwXUEvNPHbZNcRsR:diNCKbreqv9bZNcRsR
-
XMRig Miner payload
-
Executes dropped EXE
-
OS Credential Dumping
Adversaries may attempt to dump credentials to use it in password cracking.
-
Abuse Elevation Control Mechanism: Sudo and Sudo Caching
Abuse sudo or cached sudo credentials to execute code.
-
Checks hardware identifiers (DMI)
Checks DMI information which indicate if the system is a virtual machine.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads hardware information
Accesses system info like serial numbers, manufacturer names etc.
-
Reads list of loaded kernel modules
Reads the list of currently loaded kernel modules, possibly to detect virtual environments.
-