General

  • Target

    xmr_linux_amd64 (4)

  • Size

    9.1MB

  • Sample

    241010-1bkqhssgnl

  • MD5

    78a8cadaeade8826560e68057f751b82

  • SHA1

    354317e180688c01d2faad7ffd6970a9afd86a94

  • SHA256

    811510f00dabcd3a414015f7812c1516eb9a8471a4fec2150d7b42bdcd451bc1

  • SHA512

    ec576f085d83c9dba62a13290907733235d3c65781d77c93802ca0cb2aebc1eea9d9b69ae2532b8729b8ae8ca9104e964404feda46a683488710c2fefff59fa3

  • SSDEEP

    49152:6+fJxIlZGEB8SDBjuS+WzqZxg5TsRGofg1x+ThfGlEpyXFlV3BobTWHfU5E/qB/Y:6obTcljiWZeUkgYGlbbBOE/iaZH9

Malware Config

Targets

    • Target

      xmr_linux_amd64 (4)

    • Size

      9.1MB

    • MD5

      78a8cadaeade8826560e68057f751b82

    • SHA1

      354317e180688c01d2faad7ffd6970a9afd86a94

    • SHA256

      811510f00dabcd3a414015f7812c1516eb9a8471a4fec2150d7b42bdcd451bc1

    • SHA512

      ec576f085d83c9dba62a13290907733235d3c65781d77c93802ca0cb2aebc1eea9d9b69ae2532b8729b8ae8ca9104e964404feda46a683488710c2fefff59fa3

    • SSDEEP

      49152:6+fJxIlZGEB8SDBjuS+WzqZxg5TsRGofg1x+ThfGlEpyXFlV3BobTWHfU5E/qB/Y:6obTcljiWZeUkgYGlbbBOE/iaZH9

    • XMRig Miner payload

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Executes dropped EXE

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

    • Modifies hosts file

      Adds to hosts file used for mapping hosts to IP addresses.

    • OS Credential Dumping

      Adversaries may attempt to dump credentials to use it in password cracking.

    • Abuse Elevation Control Mechanism: Sudo and Sudo Caching

      Abuse sudo or cached sudo credentials to execute code.

    • Checks hardware identifiers (DMI)

      Checks DMI information which indicate if the system is a virtual machine.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads hardware information

      Accesses system info like serial numbers, manufacturer names etc.

    • Reads list of loaded kernel modules

      Reads the list of currently loaded kernel modules, possibly to detect virtual environments.

MITRE ATT&CK Enterprise v15

Tasks