Analysis
-
max time kernel
52s -
max time network
49s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240729-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
15-01-2025 11:26
Static task
static1
Behavioral task
behavioral1
Sample
suspicious
Resource
ubuntu2204-amd64-20240729-en
General
-
Target
suspicious
-
Size
945KB
-
MD5
e8a551e4a30da99f8928cd774650fb85
-
SHA1
621a801e8da1e851c48862d5300356581962c26e
-
SHA256
bbc1b5249adc492901d16a4473f613e78e08d131afba844fe96a87f7373398ba
-
SHA512
2914cf2f3e1f702eef72dd0444679d6d1afbb618ffc1ff1e7f834ca4c6a930bfba074829cf39c4c6e8cd3ac7c494b0e9df88bb25af3bf132655fd11a53bfde5b
-
SSDEEP
24576:gQaT0i30kYpeYvZJo8bF+lyn0KaEpr8fLAjpc0/Ln2Jbg:4TZ30kWJorlyZhV8Z0/LEg
Malware Config
Signatures
-
Xmrig family
-
Xmrig_linux family
-
XMRig Miner payload 1 IoCs
resource yara_rule behavioral1/memory/1565-1-0x00007f01173a3000-0x00007f011792e4b8-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1565 suspicious -
Checks hardware identifiers (DMI) 1 TTPs 4 IoCs
Checks DMI information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /sys/devices/virtual/dmi/id/product_name suspicious File opened for reading /sys/devices/virtual/dmi/id/board_vendor suspicious File opened for reading /sys/devices/virtual/dmi/id/bios_vendor suspicious File opened for reading /sys/devices/virtual/dmi/id/sys_vendor suspicious -
Reads hardware information 1 TTPs 14 IoCs
Accesses system info like serial numbers, manufacturer names etc.
description ioc Process File opened for reading /sys/devices/virtual/dmi/id/product_version suspicious File opened for reading /sys/devices/virtual/dmi/id/board_serial suspicious File opened for reading /sys/devices/virtual/dmi/id/board_asset_tag suspicious File opened for reading /sys/devices/virtual/dmi/id/chassis_version suspicious File opened for reading /sys/devices/virtual/dmi/id/board_version suspicious File opened for reading /sys/devices/virtual/dmi/id/chassis_vendor suspicious File opened for reading /sys/devices/virtual/dmi/id/chassis_type suspicious File opened for reading /sys/devices/virtual/dmi/id/chassis_serial suspicious File opened for reading /sys/devices/virtual/dmi/id/bios_date suspicious File opened for reading /sys/devices/virtual/dmi/id/product_serial suspicious File opened for reading /sys/devices/virtual/dmi/id/product_uuid suspicious File opened for reading /sys/devices/virtual/dmi/id/board_name suspicious File opened for reading /sys/devices/virtual/dmi/id/bios_version suspicious File opened for reading /sys/devices/virtual/dmi/id/chassis_asset_tag suspicious -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself 7hh3jyn 1565 suspicious -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo suspicious -
Reads CPU attributes 1 TTPs 46 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/cpu0/topology/core_cpus suspicious File opened for reading /sys/devices/system/cpu/cpu0/topology/core_id suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/id suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/level suspicious File opened for reading /sys/devices/system/cpu/cpu0/acpi_cppc/nominal_freq suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/size suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index8/shared_cpu_map suspicious File opened for reading /sys/devices/system/cpu/cpu0/cpufreq/cpuinfo_max_freq suspicious File opened for reading /sys/devices/system/cpu/cpu0/topology/die_cpus suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/shared_cpu_map suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/level suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/id suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/number_of_sets suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/physical_line_partition suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/type suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/size suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/type suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/shared_cpu_map suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/shared_cpu_map suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/coherency_line_size suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/number_of_sets suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index7/shared_cpu_map suspicious File opened for reading /sys/devices/system/cpu/possible suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index6/shared_cpu_map suspicious File opened for reading /sys/devices/system/cpu/cpu0/topology/cluster_cpus suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/type suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/coherency_line_size suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index4/shared_cpu_map suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index5/shared_cpu_map suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/id suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/number_of_sets suspicious File opened for reading /sys/devices/system/cpu/cpu0/cpufreq/base_frequency suspicious File opened for reading /sys/devices/system/cpu/online suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/physical_line_partition suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/shared_cpu_map suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/level suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/coherency_line_size suspicious File opened for reading /sys/devices/system/cpu/cpu0/topology/physical_package_id suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/type suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/id suspicious File opened for reading /sys/devices/system/cpu/cpu0/cpu_capacity suspicious File opened for reading /sys/devices/system/cpu/cpu0/topology/package_cpus suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/level suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/physical_line_partition suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/size suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index9/shared_cpu_map suspicious -
Enumerates kernel/hardware configuration 1 TTPs 26 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
description ioc Process File opened for reading /sys/kernel/mm/hugepages/hugepages-1048576kB/nr_hugepages suspicious File opened for reading /sys/bus/dax/devices suspicious File opened for reading /sys/devices/system/node/node0/access0/initiators/read_bandwidth suspicious File opened for reading /sys/bus/soc/devices suspicious File opened for reading /sys/devices/cpu_core/cpus suspicious File opened for reading /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages suspicious File opened for reading /sys/kernel/mm/hugepages suspicious File opened for reading /sys/devices/system/node/node0/access0/initiators suspicious File opened for reading /sys/devices/system/node/node0/access0/initiators/write_bandwidth suspicious File opened for reading /sys/firmware/dmi/tables/smbios_entry_point suspicious File opened for reading /sys/devices/system/node/node0/hugepages/hugepages-2048kB/free_hugepages suspicious File opened for reading /sys/fs/cgroup/cpuset.cpus.effective suspicious File opened for reading /sys/fs/cgroup/cpuset.mems.effective suspicious File opened for reading /sys/devices/system/cpu suspicious File opened for reading /sys/devices/system/node/node0/cpumap suspicious File opened for reading /sys/devices/system/node/node0/access1/initiators suspicious File opened for reading /sys/devices/system/node/node0/hugepages suspicious File opened for reading /sys/devices/system/node/node0/hugepages/hugepages-2048kB/nr_hugepages suspicious File opened for reading /sys/devices/system/node/node0/hugepages/hugepages-1048576kB/nr_hugepages suspicious File opened for reading /sys/devices/system/node/node0/access0/initiators/read_latency suspicious File opened for reading /sys/devices/system/node/node0/access0/initiators/write_latency suspicious File opened for reading /sys/devices/cpu_atom/cpus suspicious File opened for reading /sys/devices/system/node/online suspicious File opened for reading /sys/devices/system/node/node0/meminfo suspicious File opened for reading /sys/devices/virtual/dmi/id suspicious File opened for reading /sys/firmware/dmi/tables/DMI suspicious -
description ioc Process File opened for reading /proc/self/exe suspicious File opened for reading /proc/cmdline suspicious File opened for reading /proc/self/cpuset suspicious File opened for reading /proc/meminfo suspicious File opened for reading /proc/driver/nvidia/gpus suspicious File opened for reading /proc/version_signature suspicious File opened for reading /proc/sys/vm/nr_hugepages suspicious -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/.ICE-unix/m suspicious
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5B
MD5f631ec390a83f97b9830dc4de468d368
SHA1b2e05cbe4a9a4fdca6a185e7f072546afc8861c1
SHA256d0e56b63b479c60047594a107ae14413020401ef6bb2cd2b490cf181517e565a
SHA5126f04cb1d2b6f7df0fce41baa23a3d5b03df0d8073e3d0b1977ab9a1287cd33f8dd577fcaab183a6821f9a04e4f7b3b5047f1c91462e38f79f553b324a91ce185