General
-
Target
ad09939a999ace146e122de0082bbf2a3c3d64aedaf844421ba21276b1280b2c.elf
-
Size
8.7MB
-
Sample
241105-s75fsswpdq
-
MD5
d25208063842ebf39e092d55e033f9e2
-
SHA1
3b945c29647d3681a953ce00e042293a156bb3d2
-
SHA256
ad09939a999ace146e122de0082bbf2a3c3d64aedaf844421ba21276b1280b2c
-
SHA512
20cbec57b0a5ceb0670b1128d0b4aed20a516e8f57a91bae784544dc2274fd8527b6749f70d6c42f570c95417215b4c18a4f4fb145fbf18df67981ab1483b267
-
SSDEEP
98304:f9EkDvpp61mDmhBDq89YUEeiGWFD30GIc8:Vk1mKhBO8KtjGWyGw
Static task
static1
Behavioral task
behavioral1
Sample
ad09939a999ace146e122de0082bbf2a3c3d64aedaf844421ba21276b1280b2c.elf
Resource
ubuntu2004-amd64-20240508-en
Malware Config
Targets
-
-
Target
ad09939a999ace146e122de0082bbf2a3c3d64aedaf844421ba21276b1280b2c.elf
-
Size
8.7MB
-
MD5
d25208063842ebf39e092d55e033f9e2
-
SHA1
3b945c29647d3681a953ce00e042293a156bb3d2
-
SHA256
ad09939a999ace146e122de0082bbf2a3c3d64aedaf844421ba21276b1280b2c
-
SHA512
20cbec57b0a5ceb0670b1128d0b4aed20a516e8f57a91bae784544dc2274fd8527b6749f70d6c42f570c95417215b4c18a4f4fb145fbf18df67981ab1483b267
-
SSDEEP
98304:f9EkDvpp61mDmhBDq89YUEeiGWFD30GIc8:Vk1mKhBO8KtjGWyGw
-
XMRig Miner payload
-
Xmrig family
-
Xmrig_linux family
-
Executes dropped EXE
-
Modifies hosts file
Adds to hosts file used for mapping hosts to IP addresses.
-
OS Credential Dumping
Adversaries may attempt to dump credentials to use it in password cracking.
-
Abuse Elevation Control Mechanism: Sudo and Sudo Caching
Abuse sudo or cached sudo credentials to execute code.
-
Checks hardware identifiers (DMI)
Checks DMI information which indicate if the system is a virtual machine.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads hardware information
Accesses system info like serial numbers, manufacturer names etc.
-
Reads list of loaded kernel modules
Reads the list of currently loaded kernel modules, possibly to detect virtual environments.
-