General
-
Target
196b528e7c816ef6dc101e193bb73338e2e6c696137302f991099682e52bc910.sh
-
Size
37KB
-
Sample
250123-hfrqhsymck
-
MD5
d6648f420423f9dad4292a606f743c4b
-
SHA1
dcae47ec15e96274a39fcce4352077846ebf7b70
-
SHA256
196b528e7c816ef6dc101e193bb73338e2e6c696137302f991099682e52bc910
-
SHA512
3820b4fb435732fef05157ff0713ed3a62269dc1c21240dbf7e2e59191a0f34050247573b4d9758cd84495fb28d8f346e381b8f09a9041c70ca88333b1303f93
-
SSDEEP
384:Q7pQQwQHDf6lpTWg3vM4Qdre21jT58vKpG2Y0orcfKLUv0KZnNEVdUeUoJpJydIi:Q7xFNB48Fkc2zq0xvMGdl18r
Static task
static1
Behavioral task
behavioral1
Sample
196b528e7c816ef6dc101e193bb73338e2e6c696137302f991099682e52bc910.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
196b528e7c816ef6dc101e193bb73338e2e6c696137302f991099682e52bc910.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
196b528e7c816ef6dc101e193bb73338e2e6c696137302f991099682e52bc910.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
196b528e7c816ef6dc101e193bb73338e2e6c696137302f991099682e52bc910.sh
Resource
debian9-mipsel-20240611-en
Malware Config
Targets
-
-
Target
196b528e7c816ef6dc101e193bb73338e2e6c696137302f991099682e52bc910.sh
-
Size
37KB
-
MD5
d6648f420423f9dad4292a606f743c4b
-
SHA1
dcae47ec15e96274a39fcce4352077846ebf7b70
-
SHA256
196b528e7c816ef6dc101e193bb73338e2e6c696137302f991099682e52bc910
-
SHA512
3820b4fb435732fef05157ff0713ed3a62269dc1c21240dbf7e2e59191a0f34050247573b4d9758cd84495fb28d8f346e381b8f09a9041c70ca88333b1303f93
-
SSDEEP
384:Q7pQQwQHDf6lpTWg3vM4Qdre21jT58vKpG2Y0orcfKLUv0KZnNEVdUeUoJpJydIi:Q7xFNB48Fkc2zq0xvMGdl18r
-
Xmrig_linux family
-
Adds new SSH keys
Linux special file to hold SSH keys. The threat actor may add new keys for further remote access.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Deletes system logs
Deletes log file which contains global system messages. Adversaries may delete system logs to minimize their footprint.
-
Attempts to change immutable files
Modifies inode attributes on the filesystem to allow changing of immutable files.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Disables AppArmor
Disables AppArmor security module.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes file to system bin folder
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1SSH Authorized Keys
1Scheduled Task/Job
1Cron
1Privilege Escalation
Account Manipulation
1SSH Authorized Keys
1Scheduled Task/Job
1Cron
1Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
1Clear Linux or Mac System Logs
1Virtualization/Sandbox Evasion
1System Checks
1