General

  • Target

    ad09939a999ace146e122de0082bbf2a3c3d64aedaf844421ba21276b1280b2c.elf

  • Size

    8.7MB

  • Sample

    241105-s75fsswpdq

  • MD5

    d25208063842ebf39e092d55e033f9e2

  • SHA1

    3b945c29647d3681a953ce00e042293a156bb3d2

  • SHA256

    ad09939a999ace146e122de0082bbf2a3c3d64aedaf844421ba21276b1280b2c

  • SHA512

    20cbec57b0a5ceb0670b1128d0b4aed20a516e8f57a91bae784544dc2274fd8527b6749f70d6c42f570c95417215b4c18a4f4fb145fbf18df67981ab1483b267

  • SSDEEP

    98304:f9EkDvpp61mDmhBDq89YUEeiGWFD30GIc8:Vk1mKhBO8KtjGWyGw

Malware Config

Targets

    • Target

      ad09939a999ace146e122de0082bbf2a3c3d64aedaf844421ba21276b1280b2c.elf

    • Size

      8.7MB

    • MD5

      d25208063842ebf39e092d55e033f9e2

    • SHA1

      3b945c29647d3681a953ce00e042293a156bb3d2

    • SHA256

      ad09939a999ace146e122de0082bbf2a3c3d64aedaf844421ba21276b1280b2c

    • SHA512

      20cbec57b0a5ceb0670b1128d0b4aed20a516e8f57a91bae784544dc2274fd8527b6749f70d6c42f570c95417215b4c18a4f4fb145fbf18df67981ab1483b267

    • SSDEEP

      98304:f9EkDvpp61mDmhBDq89YUEeiGWFD30GIc8:Vk1mKhBO8KtjGWyGw

    • XMRig Miner payload

    • Xmrig family

    • Xmrig_linux family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Executes dropped EXE

    • Modifies hosts file

      Adds to hosts file used for mapping hosts to IP addresses.

    • OS Credential Dumping

      Adversaries may attempt to dump credentials to use it in password cracking.

    • Abuse Elevation Control Mechanism: Sudo and Sudo Caching

      Abuse sudo or cached sudo credentials to execute code.

    • Checks hardware identifiers (DMI)

      Checks DMI information which indicate if the system is a virtual machine.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads hardware information

      Accesses system info like serial numbers, manufacturer names etc.

    • Reads list of loaded kernel modules

      Reads the list of currently loaded kernel modules, possibly to detect virtual environments.

MITRE ATT&CK Enterprise v15

Tasks