Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    ubuntu-22.04_amd64
  • resource
    ubuntu2204-amd64-20240611-en
  • resource tags

    arch:amd64arch:i386image:ubuntu2204-amd64-20240611-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system
  • submitted
    03-12-2024 15:58

General

  • Target

    3ef65ce27d39b037d75bdc16b197e04f3b391f76c2da5f2f755e2ded38bb9078

  • Size

    731KB

  • MD5

    6634a952b1d18ed9db3a60b0e605d8c0

  • SHA1

    556c5876f530719212deb3bdd2d49cdfa9b5bc58

  • SHA256

    3ef65ce27d39b037d75bdc16b197e04f3b391f76c2da5f2f755e2ded38bb9078

  • SHA512

    77203be137f41ddf535f7297bf87cf6a9fdc8251d14ed5e9999c63552d351086fa783af238d9a0cd9d3bdd7e703cc589dffc5730e0ee0b80774a0bce4cb39805

  • SSDEEP

    12288:Yvz3zPzJWjGA036wN/4qyqFULsJ8zcoqGYmMRGWbp5JbUbZWioXjgRgse/dByaKX:Y9QGA0K8FULsJCc8YoiJbUckRgsebhAt

Malware Config

Signatures

  • Xmrig family
  • Xmrig_linux family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Contacts a large (48119) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • XMRig Miner payload 1 IoCs
  • Deletes itself 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads process memory 1 TTPs 64 IoCs

    Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

  • Changes its process name 1 IoCs
  • Enumerates kernel/hardware configuration 1 TTPs 4 IoCs

    Reads contents of /sys virtual filesystem to enumerate system information.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/3ef65ce27d39b037d75bdc16b197e04f3b391f76c2da5f2f755e2ded38bb9078
    /tmp/3ef65ce27d39b037d75bdc16b197e04f3b391f76c2da5f2f755e2ded38bb9078
    1⤵
    • Deletes itself
    • Modifies Watchdog functionality
    • Reads process memory
    • Changes its process name
    • Enumerates kernel/hardware configuration
    • Reads runtime system information
    • Writes file to tmp directory
    PID:1596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1596-1-0x0000000000400000-0x0000000000918408-memory.dmp