General
-
Target
a3a1adfcbc6207f3e6e0c35d3cf03904.bin
-
Size
1KB
-
Sample
241020-byjz3a1crc
-
MD5
6b2fb0bdc6470c238ca377a50a5652b1
-
SHA1
2000fb97a7fb8ad8d4ef4a05281cffa1ddb2789e
-
SHA256
3d8925edeadd34930c9118cf551c581d2422b618930cff4701006affb60f0c40
-
SHA512
f89083997e336b6f32927d2e6a8f0a435b13f08a5bb06aa9ff65f5723274e3d5164d133694fd4dba2fa40f30eb65cee749e0b131a6832f95a73184059c76a6d3
Behavioral task
behavioral1
Sample
2636f4d5fa29c3747036d385c3eee167aba1aad58c29597d21df7e42c6149a35.elf
Resource
ubuntu2204-amd64-20240611-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Targets
-
-
Target
2636f4d5fa29c3747036d385c3eee167aba1aad58c29597d21df7e42c6149a35.elf
-
Size
1KB
-
MD5
a3a1adfcbc6207f3e6e0c35d3cf03904
-
SHA1
f10f7793d4d78120395d11d7020ab626995e2c01
-
SHA256
2636f4d5fa29c3747036d385c3eee167aba1aad58c29597d21df7e42c6149a35
-
SHA512
d66495bda3366633baed9e80dafb494bbe39cccb331a1b031c239650866489d6e45db7a9e5f3fe4e951e3f321d9eb9a0c7abf00ede54f6548c4235b9ef3debf9
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
XMRig Miner payload
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Checks hardware identifiers (DMI)
Checks DMI information which indicate if the system is a virtual machine.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Reads hardware information
Accesses system info like serial numbers, manufacturer names etc.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Unix Shell
1Scheduled Task/Job
1Cron
1Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
2System Checks
2