Overview
overview
10Static
static
10样本/Lin...9DC1D8
ubuntu-18.04-amd64
7样本/Lin...B36C5B
ubuntu-24.04-amd64
6样本/Lin...E3B383
ubuntu-24.04-amd64
8样本/Lin...6F5973
ubuntu-22.04-amd64
1样本/Lin...776DB8
ubuntu-18.04-amd64
1样本/Lin...776DB8
debian-9-armhf
1样本/Lin...776DB8
debian-9-mips
1样本/Lin...776DB8
debian-9-mipsel
1样本/Lin...C9A3F7
ubuntu-18.04-amd64
6样本/Lin...C9A3F7
debian-9-armhf
6样本/Lin...C9A3F7
debian-9-mips
6样本/Lin...C9A3F7
debian-9-mipsel
6样本/Lin...FECBE5
ubuntu-22.04-amd64
101AAF1A9F78...31.tar
windows7-x64
11AAF1A9F78...31.tar
windows10-2004-x64
1xrx/chattr
ubuntu-24.04-amd64
1xrx/init.sh
ubuntu-22.04-amd64
6xrx/init0
ubuntu-24.04-amd64
8xrx/scp
ubuntu-18.04-amd64
1xrx/scp
debian-9-armhf
1xrx/scp
debian-9-mips
1xrx/scp
debian-9-mipsel
1xrx/secure
ubuntu-24.04-amd64
7xrx/uninstall.sh
ubuntu-18.04-amd64
6xrx/uninstall.sh
debian-9-armhf
6xrx/uninstall.sh
debian-9-mips
6xrx/uninstall.sh
debian-9-mipsel
6xrx/xrx
ubuntu-18.04-amd64
6General
-
Target
hoze样本.zip
-
Size
7.6MB
-
Sample
241126-pwt9xa1pdt
-
MD5
8bb80dc9058ea755ff166d45fbcdbdcf
-
SHA1
e49e083725dcd42fba86a57959ea2cae6c7aed57
-
SHA256
747091fd60a9c41ff26d3878bac923c9c14b5472238874754577e14d47b8cba7
-
SHA512
87dab1c4e11517538113fddfd22877817455a99a0664c340c56417e9f46d4165ac7236307710378db1016628e664871f2a7db2fd48c752c17fc09370abed7226
-
SSDEEP
196608:8Qz8WgK/p06m121FaxrhZeeWDLAfVPKRWC9:tz5gK/m6mw1U2Dc4EA
Behavioral task
behavioral1
Sample
样本/Linux/shc加密脚本/069AD3938C3F9C049F670A8EB49DC1D8
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
样本/Linux/shc加密脚本/42693670C71A529A11E81943F5B36C5B
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral3
Sample
样本/Linux/shc加密脚本/73F9917255A953EB749F5A3C90E3B383
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral4
Sample
样本/Linux/shc加密脚本/CDAFEFEDB4709959B4260435DC6F5973
Resource
ubuntu2204-amd64-20240729-en
Behavioral task
behavioral5
Sample
样本/Linux/sh恶意脚本/9C8A5EF51CF8A89F5F00498A5A776DB8
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral6
Sample
样本/Linux/sh恶意脚本/9C8A5EF51CF8A89F5F00498A5A776DB8
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral7
Sample
样本/Linux/sh恶意脚本/9C8A5EF51CF8A89F5F00498A5A776DB8
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral8
Sample
样本/Linux/sh恶意脚本/9C8A5EF51CF8A89F5F00498A5A776DB8
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral9
Sample
样本/Linux/sh恶意脚本/E4CC1A7F992909E8509520FDD6C9A3F7
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral10
Sample
样本/Linux/sh恶意脚本/E4CC1A7F992909E8509520FDD6C9A3F7
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral11
Sample
样本/Linux/sh恶意脚本/E4CC1A7F992909E8509520FDD6C9A3F7
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral12
Sample
样本/Linux/sh恶意脚本/E4CC1A7F992909E8509520FDD6C9A3F7
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral13
Sample
样本/Linux/挖矿程序/9D099882A24757AC5033B0C675FECBE5
Resource
ubuntu2204-amd64-20240729-en
Behavioral task
behavioral14
Sample
1AAF1A9F7877DC2C899D910A52F67F31.tar
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
1AAF1A9F7877DC2C899D910A52F67F31.tar
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
xrx/chattr
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral17
Sample
xrx/init.sh
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral18
Sample
xrx/init0
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral19
Sample
xrx/scp
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral20
Sample
xrx/scp
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral21
Sample
xrx/scp
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral22
Sample
xrx/scp
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral23
Sample
xrx/secure
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral24
Sample
xrx/uninstall.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral25
Sample
xrx/uninstall.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral26
Sample
xrx/uninstall.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral27
Sample
xrx/uninstall.sh
Resource
debian9-mipsel-20240611-en
Malware Config
Targets
-
-
Target
样本/Linux/shc加密脚本/069AD3938C3F9C049F670A8EB49DC1D8
-
Size
1023KB
-
MD5
069ad3938c3f9c049f670a8eb49dc1d8
-
SHA1
f4fd0c87a18d45ab4b642f32a94673c949ab7caf
-
SHA256
84d4b99f0d98900b4eadb7e107bf54196f2e5796d8707ebf0dcd76f5b6693295
-
SHA512
3c627883f53082face65b22d353c1926c4d4f4de008cf41cf2a3326762ad080dd95324f2fd35c3f60c069df4fb2c510d4fa07b26cbc404678f8a655c884beedb
-
SSDEEP
12288:SBgtRmLBGYhFcueTIqRe/w/Yt6myOP7/x7L15k7bKrHNq9EnE:SQRmLBTFcueTIie/wgB/x7LFLNq9
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Attempts to change immutable files
Modifies inode attributes on the filesystem to allow changing of immutable files.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
-
-
Target
样本/Linux/shc加密脚本/42693670C71A529A11E81943F5B36C5B
-
Size
1020KB
-
MD5
42693670c71a529a11e81943f5b36c5b
-
SHA1
9026cc25786215bba3bc06c4875f7da410425f8c
-
SHA256
eb2329422e52901d0bea0c0fcc4b3a6d1923ef278a96d2a14ab1839882cd0ecf
-
SHA512
a92d9bd9cd4c1c81a2e8042a9b7c31badba5e033743f34fb851b60350c5833afb246c64fc982112afecad9b1fc48bfdeab16a7bda169b4a635a8922549067d82
-
SSDEEP
12288:ztLJzlNZDaY9FnavUIqEhgvmKe36myOP7/67LN5kwrHNq9EnE:zvxNZD7FnavUILhgvJeb/67LFLNq9
Score6/10-
Enumerates running processes
Discovers information about currently running processes on the system
-
-
-
Target
样本/Linux/shc加密脚本/73F9917255A953EB749F5A3C90E3B383
-
Size
1.0MB
-
MD5
73f9917255a953eb749f5a3c90e3b383
-
SHA1
c8e392cf523aca7e2df62f72d68c83829f0c085d
-
SHA256
c5c11802623d02ba9b1c2c7a52579dbf0c3aa4c87ae6fc85cbfcd71dffffec27
-
SHA512
65b8946b67d42003272690266ccddb59ce715edd16eb6e67e8c3e2b34bb9e092ec736900432efbc1c70777c831742f820b61de8098a6438005641df4f3ddbe46
-
SSDEEP
12288:fbS+JhtEBBYYFkfciIqELZ3OlN6myOP7/i7L95k2rHNq9EnE:fXJ/EBJFkfciIjLZ3Ih/i7LbLNq9
-
Modifies password files for system users/ groups
Modifies files storing password hashes of existing users/ groups, likely to grant additional privileges.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Modifies PAM framework files
Modifies Linux PAM framework files, possibly to intercept credentials.
-
OS Credential Dumping
Adversaries may attempt to dump credentials to use it in password cracking.
-
Abuse Elevation Control Mechanism: Sudo and Sudo Caching
Abuse sudo or cached sudo credentials to execute code.
-
Adds a user to the system
-
Attempts to change immutable files
Modifies inode attributes on the filesystem to allow changing of immutable files.
-
Checks hardware identifiers (DMI)
Checks DMI information which indicate if the system is a virtual machine.
-
Checks mountinfo of local process
Checks mountinfo of running processes which indicate if it is running in chroot jail.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Modifies special file permissions
Adds special setuid and/ or setgid bits on a file, possibly to elevate privileges.
-
Write file to user bin folder
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-
-
-
Target
样本/Linux/shc加密脚本/CDAFEFEDB4709959B4260435DC6F5973
-
Size
990KB
-
MD5
cdafefedb4709959b4260435dc6f5973
-
SHA1
9c54fa7b42fb4f25e6dbc995741661cee1bd8141
-
SHA256
cb7d520296116df898c01bb9e94c05efcaa38dffb14354f42b62262c5b147e34
-
SHA512
391bf2745abbac6ccd8eee0c7e3ea62daec185ac997d8a8cb0c918c733defdc701ff0ba44d727a3619a9be0e2070e0e34e8ceb2e1cceca889cb0f94b92c2e404
-
SSDEEP
24576:bNAp09HLyf/Jck/sGjeXFAGqkkdagwGKLUU:bip0Byf/Jck/sGjYBlEwGK
Score1/10 -
-
-
Target
样本/Linux/sh恶意脚本/9C8A5EF51CF8A89F5F00498A5A776DB8
-
Size
8KB
-
MD5
9c8a5ef51cf8a89f5f00498a5a776db8
-
SHA1
2c0e74dff734f88893f95d0cb78ede1c1e49c3a8
-
SHA256
c63d1164454a56c39eb1726cd77e18bd4faca84a719073c61c49d0135e83d29b
-
SHA512
9924bd7f8002e84c01405a9bc83435b1dea81744bf472dfa7f59dde222148ee18007b2fe666e4996b6961eda9a8d8662529df20f01957ddcd1a6b4c6f3ac5239
-
SSDEEP
96:oK8jK4TgZmQznnTnULBrWuji8LtVtU+UACM3nUO3VqIWyLlcOiO/U4lGyXPh/moF:kOmKnrULsafdUJM3UOze32
Score1/10 -
-
-
Target
样本/Linux/sh恶意脚本/E4CC1A7F992909E8509520FDD6C9A3F7
-
Size
2KB
-
MD5
e4cc1a7f992909e8509520fdd6c9a3f7
-
SHA1
2978a46c0be87a65e4371c0682329fbda7f631b0
-
SHA256
5b6783965bcab2350aa9559c6f4c08fe44d7ae764ac8fbdcb7722056a2b000d3
-
SHA512
20e14b888f90e5f5ee3c560326f16be46dfded9cf992a8436295d0318c41336109cc9750e9f3b9e5461cd95fc226da9619af0b65fdcf9093c289df983cb5040b
Score6/10-
Enumerates running processes
Discovers information about currently running processes on the system
-
-
-
Target
样本/Linux/挖矿程序/9D099882A24757AC5033B0C675FECBE5
-
Size
5.9MB
-
MD5
9d099882a24757ac5033b0c675fecbe5
-
SHA1
1c1b1a4608918b6e95065c86b4a338e245ab36b2
-
SHA256
fb86120a4a1b13b29957eb5f95f7857cf9e469514fc20d25fad02ae87bf99091
-
SHA512
a59a855b10c0b0a0f84cfdfa89ae004c76be08a4879761d588810ef2e5f247298be63e3cd60dd2510ab35e3f3653fa4423ffb579c17f7b3e09ac47c5d4aeb9d0
-
SSDEEP
98304:h5ge1EgVtDw6pvf0pttZppppppZppppRlclclJGToGToGTCaqOpU6cXTpKDL4xW+:hNrD2irwCYM5qDv
Score10/10-
Xmrig_linux family
-
-
-
Target
1AAF1A9F7877DC2C899D910A52F67F31
-
Size
9.0MB
-
MD5
2cd3e15d8f618f931e792b95d263df89
-
SHA1
d35b6ce9a0c6ead507d3a7450c3c58cf6cef87a8
-
SHA256
81c8b6f32d5669cbd7ce434c16c0cb6b5d3a23478fee0db97e0ce7110dcc1d88
-
SHA512
73887b21b91ba845164ccaa0cabf3d0b00670a65be7ccbba3bf0dce4b8d8ee281105466d2145378ec04968a4ff6ce46768f25122ff2f3fd380a75b817c2f1223
-
SSDEEP
98304:oBsfnIxQ4uBKu4IRFHF5ge1EgVtDw6pvf0pttZppppppZppppRlclclJGToGToGM:oBNoBRnNrD2irwCYM5qDvFDt
Score1/10 -
-
-
Target
xrx/chattr
-
Size
35KB
-
MD5
a074fef55aacf28bd6d7a5b2f5a99fc9
-
SHA1
2217b96394209dac95f75bdbd78f97f48a2c7f5d
-
SHA256
34a4f26cb133ab9bfaf9339e73b3421f88b3cf2ae7b59be0a186b19f8dd3fb66
-
SHA512
4c1899197719512f4088253bb8579f139f8a21a67f8f801009c1a3137335ca677d1ef43cebd6d3b05f45fb20b5fe3561798f9a8a720a82442382d620109abf14
-
SSDEEP
768:5TPE/yJQgRjt7wEYp2EeggGPVyzErU2np:xjQgVt8EYp2ETPoorUq
Score1/10 -
-
-
Target
xrx/init.sh
-
Size
1020KB
-
MD5
42693670c71a529a11e81943f5b36c5b
-
SHA1
9026cc25786215bba3bc06c4875f7da410425f8c
-
SHA256
eb2329422e52901d0bea0c0fcc4b3a6d1923ef278a96d2a14ab1839882cd0ecf
-
SHA512
a92d9bd9cd4c1c81a2e8042a9b7c31badba5e033743f34fb851b60350c5833afb246c64fc982112afecad9b1fc48bfdeab16a7bda169b4a635a8922549067d82
-
SSDEEP
12288:ztLJzlNZDaY9FnavUIqEhgvmKe36myOP7/67LN5kwrHNq9EnE:zvxNZD7FnavUILhgvJeb/67LFLNq9
Score6/10-
Enumerates running processes
Discovers information about currently running processes on the system
-
-
-
Target
xrx/init0
-
Size
1.0MB
-
MD5
73f9917255a953eb749f5a3c90e3b383
-
SHA1
c8e392cf523aca7e2df62f72d68c83829f0c085d
-
SHA256
c5c11802623d02ba9b1c2c7a52579dbf0c3aa4c87ae6fc85cbfcd71dffffec27
-
SHA512
65b8946b67d42003272690266ccddb59ce715edd16eb6e67e8c3e2b34bb9e092ec736900432efbc1c70777c831742f820b61de8098a6438005641df4f3ddbe46
-
SSDEEP
12288:fbS+JhtEBBYYFkfciIqELZ3OlN6myOP7/i7L95k2rHNq9EnE:fXJ/EBJFkfciIjLZ3Ih/i7LbLNq9
-
Adds new SSH keys
Linux special file to hold SSH keys. The threat actor may add new keys for further remote access.
-
Modifies password files for system users/ groups
Modifies files storing password hashes of existing users/ groups, likely to grant additional privileges.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Modifies PAM framework files
Modifies Linux PAM framework files, possibly to intercept credentials.
-
OS Credential Dumping
Adversaries may attempt to dump credentials to use it in password cracking.
-
Abuse Elevation Control Mechanism: Sudo and Sudo Caching
Abuse sudo or cached sudo credentials to execute code.
-
Adds a user to the system
-
Attempts to change immutable files
Modifies inode attributes on the filesystem to allow changing of immutable files.
-
Checks hardware identifiers (DMI)
Checks DMI information which indicate if the system is a virtual machine.
-
Checks mountinfo of local process
Checks mountinfo of running processes which indicate if it is running in chroot jail.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Modifies special file permissions
Adds special setuid and/ or setgid bits on a file, possibly to elevate privileges.
-
Write file to user bin folder
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-
-
-
Target
xrx/scp
-
Size
63B
-
MD5
7e21ae4da5edbbe4adaeacd5f7c1ece6
-
SHA1
f5574230833e98e010ecea9ceb027c2981f57488
-
SHA256
fc26873006164decacbcfb01d246b54539b786b404be0bb1a5cde5263031663a
-
SHA512
113ca3b1217fa477acd003d65faac8913e805281ae7f664a7a91d6195c0e354831645238f98c6c9d7fe622587065e1db5e7d2a2385ad32ff17b6644832563b1c
Score1/10 -
-
-
Target
xrx/secure
-
Size
1023KB
-
MD5
069ad3938c3f9c049f670a8eb49dc1d8
-
SHA1
f4fd0c87a18d45ab4b642f32a94673c949ab7caf
-
SHA256
84d4b99f0d98900b4eadb7e107bf54196f2e5796d8707ebf0dcd76f5b6693295
-
SHA512
3c627883f53082face65b22d353c1926c4d4f4de008cf41cf2a3326762ad080dd95324f2fd35c3f60c069df4fb2c510d4fa07b26cbc404678f8a655c884beedb
-
SSDEEP
12288:SBgtRmLBGYhFcueTIqRe/w/Yt6myOP7/x7L15k7bKrHNq9EnE:SQRmLBTFcueTIie/wgB/x7LFLNq9
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Attempts to change immutable files
Modifies inode attributes on the filesystem to allow changing of immutable files.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
-
-
Target
xrx/uninstall.sh
-
Size
2KB
-
MD5
e4cc1a7f992909e8509520fdd6c9a3f7
-
SHA1
2978a46c0be87a65e4371c0682329fbda7f631b0
-
SHA256
5b6783965bcab2350aa9559c6f4c08fe44d7ae764ac8fbdcb7722056a2b000d3
-
SHA512
20e14b888f90e5f5ee3c560326f16be46dfded9cf992a8436295d0318c41336109cc9750e9f3b9e5461cd95fc226da9619af0b65fdcf9093c289df983cb5040b
Score6/10-
Enumerates running processes
Discovers information about currently running processes on the system
-
-
-
Target
xrx/xrx
-
Size
5.9MB
-
MD5
9d099882a24757ac5033b0c675fecbe5
-
SHA1
1c1b1a4608918b6e95065c86b4a338e245ab36b2
-
SHA256
fb86120a4a1b13b29957eb5f95f7857cf9e469514fc20d25fad02ae87bf99091
-
SHA512
a59a855b10c0b0a0f84cfdfa89ae004c76be08a4879761d588810ef2e5f247298be63e3cd60dd2510ab35e3f3653fa4423ffb579c17f7b3e09ac47c5d4aeb9d0
-
SSDEEP
98304:h5ge1EgVtDw6pvf0pttZppppppZppppRlclclJGToGToGTCaqOpU6cXTpKDL4xW+:hNrD2irwCYM5qDv
-
Checks hardware identifiers (DMI)
Checks DMI information which indicate if the system is a virtual machine.
-
Reads hardware information
Accesses system info like serial numbers, manufacturer names etc.
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1SSH Authorized Keys
1Modify Authentication Process
2Pluggable Authentication Modules
2Scheduled Task/Job
1Cron
1Privilege Escalation
Abuse Elevation Control Mechanism
2Setuid and Setgid
1Sudo and Sudo Caching
1Account Manipulation
1SSH Authorized Keys
1Scheduled Task/Job
1Cron
1Defense Evasion
Abuse Elevation Control Mechanism
2Setuid and Setgid
1Sudo and Sudo Caching
1File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Indicator Removal
1Clear Linux or Mac System Logs
1Modify Authentication Process
2Pluggable Authentication Modules
2Virtualization/Sandbox Evasion
3System Checks
3Credential Access
Modify Authentication Process
2Pluggable Authentication Modules
2OS Credential Dumping
2/etc/passwd and /etc/shadow
1Proc Filesystem
1