General

  • Target

    196b528e7c816ef6dc101e193bb73338e2e6c696137302f991099682e52bc910.sh

  • Size

    37KB

  • Sample

    250123-hfrqhsymck

  • MD5

    d6648f420423f9dad4292a606f743c4b

  • SHA1

    dcae47ec15e96274a39fcce4352077846ebf7b70

  • SHA256

    196b528e7c816ef6dc101e193bb73338e2e6c696137302f991099682e52bc910

  • SHA512

    3820b4fb435732fef05157ff0713ed3a62269dc1c21240dbf7e2e59191a0f34050247573b4d9758cd84495fb28d8f346e381b8f09a9041c70ca88333b1303f93

  • SSDEEP

    384:Q7pQQwQHDf6lpTWg3vM4Qdre21jT58vKpG2Y0orcfKLUv0KZnNEVdUeUoJpJydIi:Q7xFNB48Fkc2zq0xvMGdl18r

Malware Config

Targets

    • Target

      196b528e7c816ef6dc101e193bb73338e2e6c696137302f991099682e52bc910.sh

    • Size

      37KB

    • MD5

      d6648f420423f9dad4292a606f743c4b

    • SHA1

      dcae47ec15e96274a39fcce4352077846ebf7b70

    • SHA256

      196b528e7c816ef6dc101e193bb73338e2e6c696137302f991099682e52bc910

    • SHA512

      3820b4fb435732fef05157ff0713ed3a62269dc1c21240dbf7e2e59191a0f34050247573b4d9758cd84495fb28d8f346e381b8f09a9041c70ca88333b1303f93

    • SSDEEP

      384:Q7pQQwQHDf6lpTWg3vM4Qdre21jT58vKpG2Y0orcfKLUv0KZnNEVdUeUoJpJydIi:Q7xFNB48Fkc2zq0xvMGdl18r

    • Xmrig_linux family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Adds new SSH keys

      Linux special file to hold SSH keys. The threat actor may add new keys for further remote access.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Deletes system logs

      Deletes log file which contains global system messages. Adversaries may delete system logs to minimize their footprint.

    • Flushes firewall rules

      Flushes/ disables firewall rules inside the Linux kernel.

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

    • Attempts to change immutable files

      Modifies inode attributes on the filesystem to allow changing of immutable files.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Disables AppArmor

      Disables AppArmor security module.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks