Analysis
-
max time kernel
0s -
max time network
114s -
platform
linux_amd64 -
resource
ubuntu1804-amd64-en-20211208 -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-en-20211208kernel:4.15.0-161-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
03-09-2022 22:20
Behavioral task
behavioral1
Sample
4f02cc4d5426b63e3eca3ada3c9a8a111a952c0e373c5500519ea8eea5ade853
Resource
ubuntu1804-amd64-en-20211208
General
-
Target
4f02cc4d5426b63e3eca3ada3c9a8a111a952c0e373c5500519ea8eea5ade853
-
Size
549KB
-
MD5
63d6cd74a7cd01bf3a3921c36e90237f
-
SHA1
f697783da228c7787cf1c6a67a10a8c065d6aaa7
-
SHA256
4f02cc4d5426b63e3eca3ada3c9a8a111a952c0e373c5500519ea8eea5ade853
-
SHA512
51b1aef53c8277b8700630b144f15c9a41df358a43d71ef0b9352bbdf71c8777774f1ef1e361c8c95930143b54fcde590885242df3da60dce5b1a1d3761e2db3
-
SSDEEP
12288:VeRvuKqiVZ4En5drNK0pPEfJKlHZ8mG97Qxee6yzmx:VIv/qiVNHNDEfJKHZ8mG9QeeO
Malware Config
Signatures
-
Writes file to system bin folder 1 TTPs 16 IoCs
Processes:
description ioc /bin/pxkoclhjwilo /bin/pxkoclhjwilo /bin/ryfvxfj /bin/ryfvxfj /bin/gtyipwuzdmy /bin/gtyipwuzdmy /bin/fppezzmsawjwq /bin/fppezzmsawjwq /bin/eatnhwwileys /bin/eatnhwwileys /bin/cqctbdxi /bin/cqctbdxi /bin/edjjqcwvkkf /bin/edjjqcwvkkf /bin/fhbdzoee /bin/fhbdzoee /bin/byjkkwgb /bin/byjkkwgb /bin/zeffuwdatdhexo /bin/zeffuwdatdhexo /bin/xouuqtccova /bin/xouuqtccova /bin/eltlfimjfmmma /bin/eltlfimjfmmma /bin/zejxujjkn /bin/zejxujjkn /bin/rwqbkg /bin/rwqbkg /bin/tglszjiwfypjb /bin/tglszjiwfypjb /bin/tdzoyfzrek /bin/tdzoyfzrek -
Modifies rc script 1 TTPs 5 IoCs
Adding/modifying system rc scripts is a common persistence mechanism.
Processes:
description ioc /etc/rc5.d/S90qequvoh /etc/rc5.d/S90qequvoh /etc/rc1.d/S90qequvoh /etc/rc1.d/S90qequvoh /etc/rc2.d/S90qequvoh /etc/rc2.d/S90qequvoh /etc/rc3.d/S90qequvoh /etc/rc3.d/S90qequvoh /etc/rc4.d/S90qequvoh /etc/rc4.d/S90qequvoh -
Writes file to shm directory 1 IoCs
Malware can drop malicious files in the shm directory which will run directly from RAM.
Processes:
description ioc /dev/shm/sem.bAxiYc /dev/shm/sem.bAxiYc -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
Processes:
description ioc /tmp/4f02cc4d5426b63e3eca3ada3c9a8a111a952c0e373c5500519ea8eea5ade853 /tmp/4f02cc4d5426b63e3eca3ada3c9a8a111a952c0e373c5500519ea8eea5ade853
Processes
-
/tmp/4f02cc4d5426b63e3eca3ada3c9a8a111a952c0e373c5500519ea8eea5ade853/tmp/4f02cc4d5426b63e3eca3ada3c9a8a111a952c0e373c5500519ea8eea5ade8531⤵PID:571
-
/bin/hovuqeq/bin/hovuqeq1⤵PID:575
-
/bin/eatnhwwileys/bin/eatnhwwileys -d 5761⤵PID:580
-
/bin/xouuqtccova/bin/xouuqtccova -d 5761⤵PID:587
-
/bin/eltlfimjfmmma/bin/eltlfimjfmmma -d 5761⤵PID:590
-
/bin/tglszjiwfypjb/bin/tglszjiwfypjb -d 5761⤵PID:593
-
/bin/edjjqcwvkkf/bin/edjjqcwvkkf -d 5761⤵PID:596
-
/bin/tdzoyfzrek/bin/tdzoyfzrek -d 5761⤵PID:600
-
/bin/cqctbdxi/bin/cqctbdxi -d 5761⤵PID:603
-
/bin/gtyipwuzdmy/bin/gtyipwuzdmy -d 5761⤵PID:606
-
/bin/pxkoclhjwilo/bin/pxkoclhjwilo -d 5761⤵PID:609
-
/bin/fppezzmsawjwq/bin/fppezzmsawjwq -d 5761⤵PID:611
-
/bin/zejxujjkn/bin/zejxujjkn -d 5761⤵PID:615
-
/bin/rwqbkg/bin/rwqbkg -d 5761⤵PID:618
-
/bin/ryfvxfj/bin/ryfvxfj -d 5761⤵PID:621
-
/bin/fhbdzoee/bin/fhbdzoee -d 5761⤵PID:624
-
/bin/byjkkwgb/bin/byjkkwgb -d 5761⤵PID:627
-
/bin/zeffuwdatdhexo/bin/zeffuwdatdhexo -d 5761⤵PID:630
-
/bin/arkpvop/bin/arkpvop -d 5761⤵PID:633