Analysis
-
max time kernel
17s -
max time network
1s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20240523-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
15-01-2025 12:55
Static task
static1
Behavioral task
behavioral1
Sample
suspicious
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
suspicious
-
Size
945KB
-
MD5
e8a551e4a30da99f8928cd774650fb85
-
SHA1
621a801e8da1e851c48862d5300356581962c26e
-
SHA256
bbc1b5249adc492901d16a4473f613e78e08d131afba844fe96a87f7373398ba
-
SHA512
2914cf2f3e1f702eef72dd0444679d6d1afbb618ffc1ff1e7f834ca4c6a930bfba074829cf39c4c6e8cd3ac7c494b0e9df88bb25af3bf132655fd11a53bfde5b
-
SSDEEP
24576:gQaT0i30kYpeYvZJo8bF+lyn0KaEpr8fLAjpc0/Ln2Jbg:4TZ30kWJorlyZhV8Z0/LEg
Malware Config
Signatures
-
Xmrig family
-
Xmrig_linux family
-
XMRig Miner payload 1 IoCs
resource yara_rule behavioral1/memory/2537-1-0x0000785de8c00000-0x0000785de918b4b8-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2537 suspicious -
Checks hardware identifiers (DMI) 1 TTPs 4 IoCs
Checks DMI information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /sys/devices/virtual/dmi/id/product_name suspicious File opened for reading /sys/devices/virtual/dmi/id/board_vendor suspicious File opened for reading /sys/devices/virtual/dmi/id/bios_vendor suspicious File opened for reading /sys/devices/virtual/dmi/id/sys_vendor suspicious -
Reads hardware information 1 TTPs 14 IoCs
Accesses system info like serial numbers, manufacturer names etc.
description ioc Process File opened for reading /sys/devices/virtual/dmi/id/board_asset_tag suspicious File opened for reading /sys/devices/virtual/dmi/id/chassis_asset_tag suspicious File opened for reading /sys/devices/virtual/dmi/id/bios_date suspicious File opened for reading /sys/devices/virtual/dmi/id/product_serial suspicious File opened for reading /sys/devices/virtual/dmi/id/board_name suspicious File opened for reading /sys/devices/virtual/dmi/id/board_version suspicious File opened for reading /sys/devices/virtual/dmi/id/chassis_serial suspicious File opened for reading /sys/devices/virtual/dmi/id/chassis_version suspicious File opened for reading /sys/devices/virtual/dmi/id/bios_version suspicious File opened for reading /sys/devices/virtual/dmi/id/product_version suspicious File opened for reading /sys/devices/virtual/dmi/id/product_uuid suspicious File opened for reading /sys/devices/virtual/dmi/id/board_serial suspicious File opened for reading /sys/devices/virtual/dmi/id/chassis_vendor suspicious File opened for reading /sys/devices/virtual/dmi/id/chassis_type suspicious -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself 6pEOAoR 2537 suspicious -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo suspicious -
Reads CPU attributes 1 TTPs 46 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/size suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/number_of_sets suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/level suspicious File opened for reading /sys/devices/system/cpu/cpu0/cpu_capacity suspicious File opened for reading /sys/devices/system/cpu/possible suspicious File opened for reading /sys/devices/system/cpu/cpu0/topology/core_cpus suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/type suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index4/shared_cpu_map suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index6/shared_cpu_map suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/id suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/size suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/id suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/physical_line_partition suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/id suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index7/shared_cpu_map suspicious File opened for reading /sys/devices/system/cpu/cpu0/cpufreq/cpuinfo_max_freq suspicious File opened for reading /sys/devices/system/cpu/cpu0/topology/core_id suspicious File opened for reading /sys/devices/system/cpu/cpu0/topology/die_cpus suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/coherency_line_size suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/number_of_sets suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/physical_line_partition suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/level suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index5/shared_cpu_map suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index8/shared_cpu_map suspicious File opened for reading /sys/devices/system/cpu/online suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/id suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/type suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index9/shared_cpu_map suspicious File opened for reading /sys/devices/system/cpu/cpu0/cpufreq/base_frequency suspicious File opened for reading /sys/devices/system/cpu/cpu0/topology/cluster_cpus suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/shared_cpu_map suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/coherency_line_size suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/type suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/physical_line_partition suspicious File opened for reading /sys/devices/system/cpu/cpu0/acpi_cppc/nominal_freq suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/level suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/type suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/level suspicious File opened for reading /sys/devices/system/cpu/cpu0/topology/package_cpus suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index0/size suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index2/shared_cpu_map suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/shared_cpu_map suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/coherency_line_size suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index3/number_of_sets suspicious File opened for reading /sys/devices/system/cpu/cpu0/topology/physical_package_id suspicious File opened for reading /sys/devices/system/cpu/cpu0/cache/index1/shared_cpu_map suspicious -
Enumerates kernel/hardware configuration 1 TTPs 26 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
description ioc Process File opened for reading /sys/kernel/mm/hugepages suspicious File opened for reading /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages suspicious File opened for reading /sys/devices/system/node/node0/cpumap suspicious File opened for reading /sys/bus/dax/devices suspicious File opened for reading /sys/devices/system/node/node0/access0/initiators/read_bandwidth suspicious File opened for reading /sys/devices/system/node/node0/access0/initiators/read_latency suspicious File opened for reading /sys/devices/system/cpu suspicious File opened for reading /sys/devices/cpu_atom/cpus suspicious File opened for reading /sys/devices/system/node/node0/access0/initiators/write_latency suspicious File opened for reading /sys/devices/virtual/dmi/id suspicious File opened for reading /sys/devices/system/node/node0/meminfo suspicious File opened for reading /sys/devices/system/node/node0/hugepages/hugepages-2048kB/nr_hugepages suspicious File opened for reading /sys/devices/system/node/node0/access1/initiators suspicious File opened for reading /sys/devices/system/node/node0/access0/initiators/write_bandwidth suspicious File opened for reading /sys/firmware/dmi/tables/smbios_entry_point suspicious File opened for reading /sys/bus/soc/devices suspicious File opened for reading /sys/fs/cgroup/cpuset.cpus.effective suspicious File opened for reading /sys/devices/system/node/online suspicious File opened for reading /sys/devices/system/node/node0/hugepages suspicious File opened for reading /sys/devices/system/node/node0/hugepages/hugepages-1048576kB/nr_hugepages suspicious File opened for reading /sys/devices/system/node/node0/hugepages/hugepages-2048kB/free_hugepages suspicious File opened for reading /sys/fs/cgroup/cpuset.mems.effective suspicious File opened for reading /sys/devices/cpu_core/cpus suspicious File opened for reading /sys/firmware/dmi/tables/DMI suspicious File opened for reading /sys/kernel/mm/hugepages/hugepages-1048576kB/nr_hugepages suspicious File opened for reading /sys/devices/system/node/node0/access0/initiators suspicious -
description ioc Process File opened for reading /proc/meminfo suspicious File opened for reading /proc/driver/nvidia/gpus suspicious File opened for reading /proc/version_signature suspicious File opened for reading /proc/sys/vm/nr_hugepages suspicious File opened for reading /proc/self/exe suspicious File opened for reading /proc/cmdline suspicious File opened for reading /proc/self/cpuset suspicious -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/.ICE-unix/m suspicious
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5B
MD57027d04a6e1bcad9a50b1b66d98504cc
SHA1f98002a9fa5eacf9b18bec079250bb05356b2cd3
SHA256d87ca694b8fbee56c8777b5e605cf6101634a7680493f519ba0dd0e72fc8a133
SHA512fd6930a860b13008d32bfb1e72c2e3d0442ca42d870677a45cfa930b22cfabde00c1a786cb7994575546ebeefe205be0639e0a387e88b1d1fe44bcff4618345f