Analysis
-
max time kernel
0s -
max time network
374s -
platform
linux_amd64 -
resource
ubuntu1804-amd64-en-20211208 -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-en-20211208kernel:4.15.0-161-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
05-09-2022 12:12
Behavioral task
behavioral1
Sample
4f02cc4d5426b63e3eca3ada3c9a8a111a952c0e373c5500519ea8eea5ade853
Resource
ubuntu1804-amd64-en-20211208
General
-
Target
4f02cc4d5426b63e3eca3ada3c9a8a111a952c0e373c5500519ea8eea5ade853
-
Size
549KB
-
MD5
63d6cd74a7cd01bf3a3921c36e90237f
-
SHA1
f697783da228c7787cf1c6a67a10a8c065d6aaa7
-
SHA256
4f02cc4d5426b63e3eca3ada3c9a8a111a952c0e373c5500519ea8eea5ade853
-
SHA512
51b1aef53c8277b8700630b144f15c9a41df358a43d71ef0b9352bbdf71c8777774f1ef1e361c8c95930143b54fcde590885242df3da60dce5b1a1d3761e2db3
-
SSDEEP
12288:VeRvuKqiVZ4En5drNK0pPEfJKlHZ8mG97Qxee6yzmx:VIv/qiVNHNDEfJKHZ8mG9QeeO
Malware Config
Signatures
-
Writes file to system bin folder 1 TTPs 17 IoCs
Processes:
description ioc /bin/axsihdh /bin/axsihdh /bin/tjvuictxwlzpjn /bin/tjvuictxwlzpjn /bin/llxrmjorsvoys /bin/llxrmjorsvoys /bin/lxtkclv /bin/lxtkclv /bin/kygkkydu /bin/kygkkydu /bin/bdjndcasevfovo /bin/bdjndcasevfovo /bin/ziajduripqg /bin/ziajduripqg /bin/iorqfhwj /bin/iorqfhwj /bin/duewoclpusocs /bin/duewoclpusocs /bin/amqydslsmdgrxg /bin/amqydslsmdgrxg /bin/zbcqyirohggq /bin/zbcqyirohggq /bin/gkymqrji /bin/gkymqrji /bin/gfgzrkm /bin/gfgzrkm /bin/emqieqtwecel /bin/emqieqtwecel /bin/qwlfkxq /bin/qwlfkxq /bin/uuegtxs /bin/uuegtxs /bin/nxpsgn /bin/nxpsgn -
Modifies rc script 1 TTPs 5 IoCs
Adding/modifying system rc scripts is a common persistence mechanism.
Processes:
description ioc /etc/rc3.d/S90pwlzerj /etc/rc3.d/S90pwlzerj /etc/rc4.d/S90pwlzerj /etc/rc4.d/S90pwlzerj /etc/rc5.d/S90pwlzerj /etc/rc5.d/S90pwlzerj /etc/rc1.d/S90pwlzerj /etc/rc1.d/S90pwlzerj /etc/rc2.d/S90pwlzerj /etc/rc2.d/S90pwlzerj -
Writes file to shm directory 1 IoCs
Malware can drop malicious files in the shm directory which will run directly from RAM.
Processes:
description ioc /dev/shm/sem.7e4uh7 /dev/shm/sem.7e4uh7 -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
Processes:
description ioc /tmp/4f02cc4d5426b63e3eca3ada3c9a8a111a952c0e373c5500519ea8eea5ade853 /tmp/4f02cc4d5426b63e3eca3ada3c9a8a111a952c0e373c5500519ea8eea5ade853
Processes
-
/tmp/4f02cc4d5426b63e3eca3ada3c9a8a111a952c0e373c5500519ea8eea5ade853/tmp/4f02cc4d5426b63e3eca3ada3c9a8a111a952c0e373c5500519ea8eea5ade8531⤵PID:581
-
/bin/jrezlwp/bin/jrezlwp1⤵PID:585
-
/bin/bdjndcasevfovo/bin/bdjndcasevfovo -d 5861⤵PID:590
-
/bin/tjvuictxwlzpjn/bin/tjvuictxwlzpjn -d 5861⤵PID:597
-
/bin/llxrmjorsvoys/bin/llxrmjorsvoys -d 5861⤵PID:600
-
/bin/ziajduripqg/bin/ziajduripqg -d 5861⤵PID:603
-
/bin/qwlfkxq/bin/qwlfkxq -d 5861⤵PID:606
-
/bin/duewoclpusocs/bin/duewoclpusocs -d 5861⤵PID:610
-
/bin/iorqfhwj/bin/iorqfhwj -d 5861⤵PID:613
-
/bin/uuegtxs/bin/uuegtxs -d 5861⤵PID:616
-
/bin/amqydslsmdgrxg/bin/amqydslsmdgrxg -d 5861⤵PID:619
-
/bin/nxpsgn/bin/nxpsgn -d 5861⤵PID:622
-
/bin/gkymqrji/bin/gkymqrji -d 5861⤵PID:625
-
/bin/lxtkclv/bin/lxtkclv -d 5861⤵PID:628
-
/bin/zbcqyirohggq/bin/zbcqyirohggq -d 5861⤵PID:631
-
/bin/kygkkydu/bin/kygkkydu -d 5861⤵PID:634
-
/bin/gfgzrkm/bin/gfgzrkm -d 5861⤵PID:637
-
/bin/emqieqtwecel/bin/emqieqtwecel -d 5861⤵PID:640
-
/bin/axsihdh/bin/axsihdh -d 5861⤵PID:643