General
-
Target
newinit.sh
-
Size
46KB
-
Sample
241208-ysgzvatldv
-
MD5
d85918fc8a4f927f91d5914a149eabc4
-
SHA1
51e8581f114a18b9e98b0a860a03220f8209eea8
-
SHA256
520e22713960b96051de3d666c4ca1ebe01a9f34ea2281c646474b514a1aab1f
-
SHA512
5f57e8b30a0dd9920c5ae80b55421c9177a015ea1be329c5bd155d93aa41a6dcf73793f95e6ff2ce67a503ea32713fbeaf0be59b8c7924ac19248a4549d1aa69
-
SSDEEP
768:bxlT2wDuWvWi7XFNcuFkc2zq0x3UKnicZuiR/a6X85:8qF+Lc2/FicfS6X85
Static task
static1
Behavioral task
behavioral1
Sample
newinit.sh
Resource
ubuntu2204-amd64-20240611-en
Malware Config
Targets
-
-
Target
newinit.sh
-
Size
46KB
-
MD5
d85918fc8a4f927f91d5914a149eabc4
-
SHA1
51e8581f114a18b9e98b0a860a03220f8209eea8
-
SHA256
520e22713960b96051de3d666c4ca1ebe01a9f34ea2281c646474b514a1aab1f
-
SHA512
5f57e8b30a0dd9920c5ae80b55421c9177a015ea1be329c5bd155d93aa41a6dcf73793f95e6ff2ce67a503ea32713fbeaf0be59b8c7924ac19248a4549d1aa69
-
SSDEEP
768:bxlT2wDuWvWi7XFNcuFkc2zq0x3UKnicZuiR/a6X85:8qF+Lc2/FicfS6X85
-
Xmrig family
-
Xmrig_linux family
-
XMRig Miner payload
-
Adds new SSH keys
Linux special file to hold SSH keys. The threat actor may add new keys for further remote access.
-
Modifies password files for system users/ groups
Modifies files storing password hashes of existing users/ groups, likely to grant additional privileges.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Deletes system logs
Deletes log file which contains global system messages. Adversaries may delete system logs to minimize their footprint.
-
Executes dropped EXE
-
OS Credential Dumping
Adversaries may attempt to dump credentials to use it in password cracking.
-
Writes DNS configuration
Writes data to DNS resolver config file.
-
Adds a user to the system
-
Attempts to change immutable files
Modifies inode attributes on the filesystem to allow changing of immutable files.
-
Checks hardware identifiers (DMI)
Checks DMI information which indicate if the system is a virtual machine.
-
Checks mountinfo of local process
Checks mountinfo of running processes which indicate if it is running in chroot jail.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Disables AppArmor
Disables AppArmor security module.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads hardware information
Accesses system info like serial numbers, manufacturer names etc.
-
Write file to user bin folder
-
Writes file to system bin folder
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1SSH Authorized Keys
1Boot or Logon Autostart Execution
2Boot or Logon Initialization Scripts
2RC Scripts
2Modify Authentication Process
1Pluggable Authentication Modules
1Scheduled Task/Job
1Cron
1Privilege Escalation
Account Manipulation
1SSH Authorized Keys
1Boot or Logon Autostart Execution
2Boot or Logon Initialization Scripts
2RC Scripts
2Scheduled Task/Job
1Cron
1Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Indicator Removal
2Clear Linux or Mac System Logs
2Modify Authentication Process
1Pluggable Authentication Modules
1Virtualization/Sandbox Evasion
3System Checks
3Credential Access
Adversary-in-the-Middle
1Modify Authentication Process
1Pluggable Authentication Modules
1OS Credential Dumping
2/etc/passwd and /etc/shadow
1Proc Filesystem
1