General
-
Target
xmr_linux_amd64
-
Size
9.0MB
-
Sample
240927-3bdnbaxdka
-
MD5
1eebb205d5a4da4dbd06a3dab2ea1f2e
-
SHA1
f983558b3ec3833c2fd1ce4c3f2ba1573296a14e
-
SHA256
d9427445e344cbdc861daff091b4571ed057dc263648963cf99198fe5b8fa31c
-
SHA512
ead4121a3525cf22b019b88cda79e5827ce8d338115a1f877f47a1e9cd71a46d7cdfe0a892b4d42ddefc7d23e259f575203adaac962633828873290aceaaad7b
-
SSDEEP
49152:u3hrWC56jo7dozmwAXIRfVk9p/qHZyUH871o9+kZD6QvKia54KIEf5EIOdlvWmQh:uJB/CSJEV2CHZyrZokSExEFvm5v
Static task
static1
Behavioral task
behavioral1
Sample
xmr_linux_amd64
Resource
ubuntu2004-amd64-20240508-en
Malware Config
Targets
-
-
Target
xmr_linux_amd64
-
Size
9.0MB
-
MD5
1eebb205d5a4da4dbd06a3dab2ea1f2e
-
SHA1
f983558b3ec3833c2fd1ce4c3f2ba1573296a14e
-
SHA256
d9427445e344cbdc861daff091b4571ed057dc263648963cf99198fe5b8fa31c
-
SHA512
ead4121a3525cf22b019b88cda79e5827ce8d338115a1f877f47a1e9cd71a46d7cdfe0a892b4d42ddefc7d23e259f575203adaac962633828873290aceaaad7b
-
SSDEEP
49152:u3hrWC56jo7dozmwAXIRfVk9p/qHZyUH871o9+kZD6QvKia54KIEf5EIOdlvWmQh:uJB/CSJEV2CHZyrZokSExEFvm5v
-
XMRig Miner payload
-
Executes dropped EXE
-
Modifies hosts file
Adds to hosts file used for mapping hosts to IP addresses.
-
OS Credential Dumping
Adversaries may attempt to dump credentials to use it in password cracking.
-
Abuse Elevation Control Mechanism: Sudo and Sudo Caching
Abuse sudo or cached sudo credentials to execute code.
-
Checks hardware identifiers (DMI)
Checks DMI information which indicate if the system is a virtual machine.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads hardware information
Accesses system info like serial numbers, manufacturer names etc.
-
Reads list of loaded kernel modules
Reads the list of currently loaded kernel modules, possibly to detect virtual environments.
-