General

  • Target

    xmr_linux_amd64

  • Size

    9.0MB

  • Sample

    240927-3bdnbaxdka

  • MD5

    1eebb205d5a4da4dbd06a3dab2ea1f2e

  • SHA1

    f983558b3ec3833c2fd1ce4c3f2ba1573296a14e

  • SHA256

    d9427445e344cbdc861daff091b4571ed057dc263648963cf99198fe5b8fa31c

  • SHA512

    ead4121a3525cf22b019b88cda79e5827ce8d338115a1f877f47a1e9cd71a46d7cdfe0a892b4d42ddefc7d23e259f575203adaac962633828873290aceaaad7b

  • SSDEEP

    49152:u3hrWC56jo7dozmwAXIRfVk9p/qHZyUH871o9+kZD6QvKia54KIEf5EIOdlvWmQh:uJB/CSJEV2CHZyrZokSExEFvm5v

Malware Config

Targets

    • Target

      xmr_linux_amd64

    • Size

      9.0MB

    • MD5

      1eebb205d5a4da4dbd06a3dab2ea1f2e

    • SHA1

      f983558b3ec3833c2fd1ce4c3f2ba1573296a14e

    • SHA256

      d9427445e344cbdc861daff091b4571ed057dc263648963cf99198fe5b8fa31c

    • SHA512

      ead4121a3525cf22b019b88cda79e5827ce8d338115a1f877f47a1e9cd71a46d7cdfe0a892b4d42ddefc7d23e259f575203adaac962633828873290aceaaad7b

    • SSDEEP

      49152:u3hrWC56jo7dozmwAXIRfVk9p/qHZyUH871o9+kZD6QvKia54KIEf5EIOdlvWmQh:uJB/CSJEV2CHZyrZokSExEFvm5v

    • XMRig Miner payload

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Executes dropped EXE

    • Modifies hosts file

      Adds to hosts file used for mapping hosts to IP addresses.

    • OS Credential Dumping

      Adversaries may attempt to dump credentials to use it in password cracking.

    • Abuse Elevation Control Mechanism: Sudo and Sudo Caching

      Abuse sudo or cached sudo credentials to execute code.

    • Checks hardware identifiers (DMI)

      Checks DMI information which indicate if the system is a virtual machine.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads hardware information

      Accesses system info like serial numbers, manufacturer names etc.

    • Reads list of loaded kernel modules

      Reads the list of currently loaded kernel modules, possibly to detect virtual environments.

MITRE ATT&CK Enterprise v15

Tasks