Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    ubuntu-22.04_amd64
  • resource
    ubuntu2204-amd64-20240611-en
  • resource tags

    arch:amd64arch:i386image:ubuntu2204-amd64-20240611-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system
  • submitted
    17-01-2025 06:28

General

  • Target

    bbc1b5249adc492901d16a4473f613e78e08d131afba844fe96a87f7373398ba.elf

  • Size

    945KB

  • MD5

    e8a551e4a30da99f8928cd774650fb85

  • SHA1

    621a801e8da1e851c48862d5300356581962c26e

  • SHA256

    bbc1b5249adc492901d16a4473f613e78e08d131afba844fe96a87f7373398ba

  • SHA512

    2914cf2f3e1f702eef72dd0444679d6d1afbb618ffc1ff1e7f834ca4c6a930bfba074829cf39c4c6e8cd3ac7c494b0e9df88bb25af3bf132655fd11a53bfde5b

  • SSDEEP

    24576:gQaT0i30kYpeYvZJo8bF+lyn0KaEpr8fLAjpc0/Ln2Jbg:4TZ30kWJorlyZhV8Z0/LEg

Malware Config

Signatures

  • Xmrig family
  • Xmrig_linux family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 1 IoCs
  • Deletes itself 1 IoCs
  • Checks hardware identifiers (DMI) 1 TTPs 4 IoCs

    Checks DMI information which indicate if the system is a virtual machine.

  • Reads hardware information 1 TTPs 14 IoCs

    Accesses system info like serial numbers, manufacturer names etc.

  • Changes its process name 1 IoCs
  • Checks CPU configuration 1 TTPs 1 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads CPU attributes 1 TTPs 46 IoCs
  • Enumerates kernel/hardware configuration 1 TTPs 26 IoCs

    Reads contents of /sys virtual filesystem to enumerate system information.

  • Reads runtime system information 7 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/bbc1b5249adc492901d16a4473f613e78e08d131afba844fe96a87f7373398ba.elf
    /tmp/bbc1b5249adc492901d16a4473f613e78e08d131afba844fe96a87f7373398ba.elf
    1⤵
    • Deletes itself
    • Checks hardware identifiers (DMI)
    • Reads hardware information
    • Changes its process name
    • Checks CPU configuration
    • Reads CPU attributes
    • Enumerates kernel/hardware configuration
    • Reads runtime system information
    • Writes file to tmp directory
    PID:1587

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /tmp/.ICE-unix/m

    Filesize

    5B

    MD5

    cc09cb9f83c8ad2038e058f42067fb57

    SHA1

    b39b261383741ad43b40482a8679f56a350f8538

    SHA256

    11f3018349e3efddad90e9ac2fca6492a7d46ccdb9001e3de328db84c727f09e

    SHA512

    bc2cf384be92012c12cb3e7d5ec21b82a9073bb7b142c6f8300c59aefd11147cd39245e9313015bfcf23e33c1483d3366e18b4014cfe9f2d7a8414aad65f4636