General

  • Target

    yak.sh

  • Size

    2KB

  • Sample

    241123-3zkrjatkat

  • MD5

    f50f60f970a5203dad27c480da7b4519

  • SHA1

    f50f26900efe72f11c37767b5db9a3916a7c76b4

  • SHA256

    ca0bd413a34399accc6f62506ac94f9c7e1fd5c4efa49d1627eed568b1de78bf

  • SHA512

    40c118ed8e7b22ba4c439cc3de9a9d69d7cccd9b4d109b00a716ea564379e001304edaffb0f9ca143e87cb0138f566aebea2e998b76c9bb4b653cf7a191e4ddd

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    linux-it.abuser.eu
  • Port:
    21
  • Username:
    anonymous
  • Password:
    [email protected]

Targets

    • Target

      yak.sh

    • Size

      2KB

    • MD5

      f50f60f970a5203dad27c480da7b4519

    • SHA1

      f50f26900efe72f11c37767b5db9a3916a7c76b4

    • SHA256

      ca0bd413a34399accc6f62506ac94f9c7e1fd5c4efa49d1627eed568b1de78bf

    • SHA512

      40c118ed8e7b22ba4c439cc3de9a9d69d7cccd9b4d109b00a716ea564379e001304edaffb0f9ca143e87cb0138f566aebea2e998b76c9bb4b653cf7a191e4ddd

    • XMRig Miner payload

    • Xmrig family

    • Xmrig_linux family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Contacts a large (4428) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks