Analysis

  • max time kernel
    0s
  • max time network
    8s
  • platform
    ubuntu-22.04_amd64
  • resource
    ubuntu2204-amd64-20240729-en
  • resource tags

    arch:amd64arch:i386image:ubuntu2204-amd64-20240729-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system
  • submitted
    17/02/2025, 18:23

General

  • Target

    Linux-Malware-Samples-main/0dcfa54a7e8a4e631ef466670ce604a61f3b0e8b3e9cf72c943278c0f77c31a2

  • Size

    2.5MB

  • MD5

    c76b11be6fdeb10b7fccd678b42a7c97

  • SHA1

    e205276a72a6ae17adac5a4ed10123117e5a4e0f

  • SHA256

    0dcfa54a7e8a4e631ef466670ce604a61f3b0e8b3e9cf72c943278c0f77c31a2

  • SHA512

    1fc1ea1acd43d43fd4ee5b2d362246db95a36b16b3fa66c79466d96115a2c265f6b61602aa74e2f15e1aeef0bfa47ce6826bd7088ec53908cc5f103408d72a65

  • SSDEEP

    49152:oIgrtR1Vl3vrk0c6wOu4hMs9jvlOQhmRYSoXFIz9MZeaFquFUTf80MGIDY9G:oIYtR1VK0c6wOu4PJ1wYTUA0M2G

Malware Config

Signatures

  • Xmrig_linux family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Deletes itself 1 IoCs
  • Checks hardware identifiers (DMI) 1 TTPs 4 IoCs

    Checks DMI information which indicate if the system is a virtual machine.

  • Reads hardware information 1 TTPs 14 IoCs

    Accesses system info like serial numbers, manufacturer names etc.

  • Changes its process name 1 IoCs
  • Checks CPU configuration 1 TTPs 1 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads CPU attributes 1 TTPs 2 IoCs
  • Enumerates kernel/hardware configuration 1 TTPs 53 IoCs

    Reads contents of /sys virtual filesystem to enumerate system information.

  • Reads runtime system information 4 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/Linux-Malware-Samples-main/0dcfa54a7e8a4e631ef466670ce604a61f3b0e8b3e9cf72c943278c0f77c31a2
    /tmp/Linux-Malware-Samples-main/0dcfa54a7e8a4e631ef466670ce604a61f3b0e8b3e9cf72c943278c0f77c31a2
    1⤵
    • Deletes itself
    • Checks hardware identifiers (DMI)
    • Reads hardware information
    • Changes its process name
    • Checks CPU configuration
    • Reads CPU attributes
    • Enumerates kernel/hardware configuration
    • Reads runtime system information
    • Writes file to tmp directory
    PID:1563

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /tmp/.X11-unix/11

    Filesize

    5B

    MD5

    239a7b3f7dfebbd099500f8dd4aaad6a

    SHA1

    9d263020320fe5d6af6ee12690b3c4cb38e57e70

    SHA256

    f932f15ce9feee8ba7d661ecdc75e1b34365acae7bdfaea5295a7fe5c78d6d91

    SHA512

    c18b3bbe14541d1070c61749a933f7d57eb2b0fbbed4ddc7c5b0725bfaa427d007b3c4f2c00b7f3e5222aed9bcea7ea32f2dd19ccb73d8e5192ebf92478236d7