General

  • Target

    pg.sh

  • Size

    35KB

  • Sample

    250123-bzp8gawqek

  • MD5

    7df7607aab8bd9a6c542cfc9156cda62

  • SHA1

    3d411cd41f10c79f1be0502965b62441960fe5c2

  • SHA256

    8f293050288c2ccee3effbc438a1324be5366d1933a68a426bcf1837cc64d417

  • SHA512

    71a62f8257d60ff8512292a9253b86e580e6075ac20c5e9763aa474e01a432a5a04079002b2c3d8a3445dc0ea492559e5663eb90358ba4a59ac4f13d060b6ab6

  • SSDEEP

    768:b87mzQ5VFNcDAFLcIwgnoYq0xFBSytguz:bOVF+D6cIwgosXz

Malware Config

Targets

    • Target

      pg.sh

    • Size

      35KB

    • MD5

      7df7607aab8bd9a6c542cfc9156cda62

    • SHA1

      3d411cd41f10c79f1be0502965b62441960fe5c2

    • SHA256

      8f293050288c2ccee3effbc438a1324be5366d1933a68a426bcf1837cc64d417

    • SHA512

      71a62f8257d60ff8512292a9253b86e580e6075ac20c5e9763aa474e01a432a5a04079002b2c3d8a3445dc0ea492559e5663eb90358ba4a59ac4f13d060b6ab6

    • SSDEEP

      768:b87mzQ5VFNcDAFLcIwgnoYq0xFBSytguz:bOVF+D6cIwgosXz

    • Kinsing

      Kinsing is a loader written in Golang.

    • Kinsing family

    • Kinsing payload

    • Xmrig_linux family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Deletes system logs

      Deletes log file which contains global system messages. Adversaries may delete system logs to minimize their footprint.

    • Executes dropped EXE

    • Flushes firewall rules

      Flushes/ disables firewall rules inside the Linux kernel.

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

    • Abuse Elevation Control Mechanism: Sudo and Sudo Caching

      Abuse sudo or cached sudo credentials to execute code.

    • Attempts to change immutable files

      Modifies inode attributes on the filesystem to allow changing of immutable files.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Disables AppArmor

      Disables AppArmor security module.

    • Disables SELinux

      Disables SELinux security module.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Reads list of loaded kernel modules

      Reads the list of currently loaded kernel modules, possibly to detect virtual environments.

MITRE ATT&CK Enterprise v15

Tasks