General
-
Target
xmr_linux_amd64 (4)
-
Size
9.1MB
-
Sample
241010-1bkqhssgnl
-
MD5
78a8cadaeade8826560e68057f751b82
-
SHA1
354317e180688c01d2faad7ffd6970a9afd86a94
-
SHA256
811510f00dabcd3a414015f7812c1516eb9a8471a4fec2150d7b42bdcd451bc1
-
SHA512
ec576f085d83c9dba62a13290907733235d3c65781d77c93802ca0cb2aebc1eea9d9b69ae2532b8729b8ae8ca9104e964404feda46a683488710c2fefff59fa3
-
SSDEEP
49152:6+fJxIlZGEB8SDBjuS+WzqZxg5TsRGofg1x+ThfGlEpyXFlV3BobTWHfU5E/qB/Y:6obTcljiWZeUkgYGlbbBOE/iaZH9
Static task
static1
Behavioral task
behavioral1
Sample
xmr_linux_amd64 (4)
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
xmr_linux_amd64 (4)
Resource
ubuntu2004-amd64-20240611-en
Behavioral task
behavioral3
Sample
xmr_linux_amd64 (4)
Resource
ubuntu2204-amd64-20240729-en
Behavioral task
behavioral4
Sample
xmr_linux_amd64 (4)
Resource
ubuntu2404-amd64-20240523-en
Malware Config
Targets
-
-
Target
xmr_linux_amd64 (4)
-
Size
9.1MB
-
MD5
78a8cadaeade8826560e68057f751b82
-
SHA1
354317e180688c01d2faad7ffd6970a9afd86a94
-
SHA256
811510f00dabcd3a414015f7812c1516eb9a8471a4fec2150d7b42bdcd451bc1
-
SHA512
ec576f085d83c9dba62a13290907733235d3c65781d77c93802ca0cb2aebc1eea9d9b69ae2532b8729b8ae8ca9104e964404feda46a683488710c2fefff59fa3
-
SSDEEP
49152:6+fJxIlZGEB8SDBjuS+WzqZxg5TsRGofg1x+ThfGlEpyXFlV3BobTWHfU5E/qB/Y:6obTcljiWZeUkgYGlbbBOE/iaZH9
-
XMRig Miner payload
-
Executes dropped EXE
-
Modifies hosts file
Adds to hosts file used for mapping hosts to IP addresses.
-
OS Credential Dumping
Adversaries may attempt to dump credentials to use it in password cracking.
-
Abuse Elevation Control Mechanism: Sudo and Sudo Caching
Abuse sudo or cached sudo credentials to execute code.
-
Checks hardware identifiers (DMI)
Checks DMI information which indicate if the system is a virtual machine.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads hardware information
Accesses system info like serial numbers, manufacturer names etc.
-
Reads list of loaded kernel modules
Reads the list of currently loaded kernel modules, possibly to detect virtual environments.
-