General
-
Target
kernel.sh
-
Size
3KB
-
Sample
241213-t61lwsvjfx
-
MD5
70b5ca97532b13cf5743c138d213ef1f
-
SHA1
55ce28f0db3d7fbd69c72d78282b06147df690f9
-
SHA256
7bc7583c91a5b3880dcb9ae735530d4990d13f67216f08dfa140f927a09c1a87
-
SHA512
253b9e6eda76101b81522d412fa394da12406997e813f1cc49dcfc57dbf6b432d64829600a2d0413a7ecfce3e6f412f4529eb4a35b278bf5fb3626fc5f7dbfa6
Static task
static1
Behavioral task
behavioral1
Sample
kernel.sh
Resource
ubuntu2404-amd64-20240523-en
Malware Config
Targets
-
-
Target
kernel.sh
-
Size
3KB
-
MD5
70b5ca97532b13cf5743c138d213ef1f
-
SHA1
55ce28f0db3d7fbd69c72d78282b06147df690f9
-
SHA256
7bc7583c91a5b3880dcb9ae735530d4990d13f67216f08dfa140f927a09c1a87
-
SHA512
253b9e6eda76101b81522d412fa394da12406997e813f1cc49dcfc57dbf6b432d64829600a2d0413a7ecfce3e6f412f4529eb4a35b278bf5fb3626fc5f7dbfa6
-
XMRig Miner payload
-
Xmrig family
-
Xmrig_linux family
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Attempts to change immutable files
Modifies inode attributes on the filesystem to allow changing of immutable files.
-
Checks hardware identifiers (DMI)
Checks DMI information which indicate if the system is a virtual machine.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads hardware information
Accesses system info like serial numbers, manufacturer names etc.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
2System Checks
2