Analysis

  • max time kernel
    149s
  • max time network
    142s
  • platform
    ubuntu-22.04_amd64
  • resource
    ubuntu2204-amd64-20240522.1-en
  • resource tags

    arch:amd64arch:i386image:ubuntu2204-amd64-20240522.1-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system
  • submitted
    16-01-2025 04:47

General

  • Target

    bbc1b5249adc492901d16a4473f613e78e08d131afba844fe96a87f7373398ba.elf

  • Size

    945KB

  • MD5

    e8a551e4a30da99f8928cd774650fb85

  • SHA1

    621a801e8da1e851c48862d5300356581962c26e

  • SHA256

    bbc1b5249adc492901d16a4473f613e78e08d131afba844fe96a87f7373398ba

  • SHA512

    2914cf2f3e1f702eef72dd0444679d6d1afbb618ffc1ff1e7f834ca4c6a930bfba074829cf39c4c6e8cd3ac7c494b0e9df88bb25af3bf132655fd11a53bfde5b

  • SSDEEP

    24576:gQaT0i30kYpeYvZJo8bF+lyn0KaEpr8fLAjpc0/Ln2Jbg:4TZ30kWJorlyZhV8Z0/LEg

Malware Config

Signatures

  • Xmrig family
  • Xmrig_linux family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 1 IoCs
  • Deletes itself 1 IoCs
  • Checks hardware identifiers (DMI) 1 TTPs 4 IoCs

    Checks DMI information which indicate if the system is a virtual machine.

  • Reads hardware information 1 TTPs 14 IoCs

    Accesses system info like serial numbers, manufacturer names etc.

  • Changes its process name 1 IoCs
  • Checks CPU configuration 1 TTPs 1 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads CPU attributes 1 TTPs 46 IoCs
  • Enumerates kernel/hardware configuration 1 TTPs 26 IoCs

    Reads contents of /sys virtual filesystem to enumerate system information.

  • Reads runtime system information 7 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/bbc1b5249adc492901d16a4473f613e78e08d131afba844fe96a87f7373398ba.elf
    /tmp/bbc1b5249adc492901d16a4473f613e78e08d131afba844fe96a87f7373398ba.elf
    1⤵
    • Deletes itself
    • Checks hardware identifiers (DMI)
    • Reads hardware information
    • Changes its process name
    • Checks CPU configuration
    • Reads CPU attributes
    • Enumerates kernel/hardware configuration
    • Reads runtime system information
    • Writes file to tmp directory
    PID:1566

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /tmp/.ICE-unix/m

    Filesize

    5B

    MD5

    a1d200638f796124e5e82a108d172109

    SHA1

    59d0515504ba4ee1088d9b4ab5aceb0a9720b51c

    SHA256

    41cdf517e65893586c5d62c62930cc85aea5f1f2294e4cdc5bb846b75e8d7bef

    SHA512

    e39f2ff19607f9cf40b0ef9600d4c3f632d4ca6395594878f8c4c5778cddc560c0ffe8e42bb3f1ed8e10727f3f688b4c7bbf07416b91b571b397c9915d7f933d