General
-
Target
20e0e61d27762a524f6974fb9f4995062582db351d5576e62a214d6b5e5808e7.zip
-
Size
713KB
-
Sample
241122-yrnq1atmdm
-
MD5
89a3a136e0da04b17d4d4bc5083b8dba
-
SHA1
45a5f20efd84021c671ee6e60df25beb0f7ccd9e
-
SHA256
a45521c95509806c08349879204a166b8358f165b4189e6ba810491568ed2d29
-
SHA512
ecbd3f1134dab7a63ac1bbe46f505d97aed5d331050ef13134c0aaf51bcb7341438e082f4dccd1a1462bfe86743e8d3c15d9ab85390bae4f732f85e8f5a2723e
-
SSDEEP
12288:Rsavw5eXyO88ul7iOW7XTBEs7VIJMzWncAKTPGZ6W6VzI+cm2edFEf7zrxZEa45P:zw5A7u1iOW7TasO+gjKTMh6VXv2edSVA
Static task
static1
Behavioral task
behavioral1
Sample
20e0e61d27762a524f6974fb9f4995062582db351d5576e62a214d6b5e5808e7/20e0e61d27762a524f6974fb9f499506258.elf
Resource
ubuntu2204-amd64-20240522.1-en
Malware Config
Extracted
/usr/sbin/RECOVERY INFO.txt
http://weaxorpemwzoxg5cdvvfd77p3qczkxqii37ww4foo2n4jcft3mytbpyd.onion/lsaHqOhaJLOyrWSPvtJajdzqrftqzOlt/C8C93634D8B19BE4FE221FDE41C180431DFB7200F6426B11C5A95B77AF263DB5
Targets
-
-
Target
20e0e61d27762a524f6974fb9f4995062582db351d5576e62a214d6b5e5808e7/20e0e61d27762a524f6974fb9f4995062582db351d5576e62a214d6b5e5808e7.elf
-
Size
1.7MB
-
MD5
503c35c37d00d04ff2793c2b4bf5038f
-
SHA1
a03a9d06ca8441cb2ec7fe0c49cb56023130d884
-
SHA256
20e0e61d27762a524f6974fb9f4995062582db351d5576e62a214d6b5e5808e7
-
SHA512
c653fd4f8a6724b9a25e24e9a2a0152340be294d4d53d82e5762fd8599b014dabc4be6a2830822d51ce744ef256f1e5fe78b5c016fc24907de7ea964fb5835ee
-
SSDEEP
24576:94GdIhU6rF5IF0pGVZa4B6dmyw5DQ7EQ6LPni2Mt+aa:XShUL7VZ1BYZw5DcRt+a
-
Renames multiple (107) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds new SSH keys
Linux special file to hold SSH keys. The threat actor may add new keys for further remote access.
-
Creates/modifies environment variables
Creating/modifying environment variables is a common persistence mechanism.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes file to system bin folder
-
Modifies Bash startup script
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1SSH Authorized Keys
1Boot or Logon Autostart Execution
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Privilege Escalation
Account Manipulation
1SSH Authorized Keys
1Boot or Logon Autostart Execution
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Defense Evasion
Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Virtualization/Sandbox Evasion
1System Checks
1