Analysis
-
max time kernel
31s -
max time network
40s -
platform
linux_amd64 -
resource
ubuntu1804-amd64-en-20211208 -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-en-20211208kernel:4.15.0-161-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
20-04-2023 08:21
Behavioral task
behavioral1
Sample
yxbitkdccc_
Resource
ubuntu1804-amd64-en-20211208
General
-
Target
yxbitkdccc_
-
Size
611KB
-
MD5
a2279a054fba006fd74c3b61ddc6a3ef
-
SHA1
df2a4c91d86be560c7c19628923b601af460258d
-
SHA256
ce0f1914e0f0748f85ecc18d8470de2a0b2b60be7eaab7a459899f77993e82e6
-
SHA512
089bf2ef2926e6cdd93412ce006fb06cf8c75f60c9adb475c4798532b2214e083b4d1a6dd29b864a77c9744a953e67a40c2dc7195661682cfaa268c549e9cbe5
-
SSDEEP
12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrryT6yF8EEP4UlUuTh1AR:FBXmkN/+Fhu/Qo4h9L+zNNyBVEBl/91I
Malware Config
Signatures
-
Writes file to system bin folder 1 TTPs 5 IoCs
Processes:
description ioc /bin/peldlftdrl /bin/peldlftdrl /bin/lnabuzweue /bin/lnabuzweue /bin/xkwkhgnxkt /bin/xkwkhgnxkt /bin/sugyaakpxc /bin/sugyaakpxc /bin/hdneuyyydd /bin/hdneuyyydd -
Creates/modifies Cron job 1 TTPs 2 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
Processes:
sedshdescription ioc process /etc/crontab /etc/crontab sed /etc/crontab /etc/crontab sh -
Modifies rc script 1 TTPs 12 IoCs
Adding/modifying system rc scripts is a common persistence mechanism.
Processes:
update-rc.ddescription ioc /etc/rc2.d/S90yxbitkdccc_ /etc/rc2.d/S90yxbitkdccc_ /etc/rc3.d/S90yxbitkdccc_ /etc/rc3.d/S90yxbitkdccc_ /etc/rc4.d/S90yxbitkdccc_ /etc/rc4.d/S90yxbitkdccc_ /etc/rc5.d/S90yxbitkdccc_ /etc/rc5.d/S90yxbitkdccc_ /etc/rc4.d/ /etc/rc4.d/ update-rc.d /etc/rc6.d/ /etc/rc6.d/ update-rc.d /etc/rc1.d/ /etc/rc1.d/ update-rc.d /etc/rc1.d/S90yxbitkdccc_ /etc/rc1.d/S90yxbitkdccc_ /etc/rc5.d/ /etc/rc5.d/ update-rc.d /etc/rc3.d/ /etc/rc3.d/ update-rc.d /etc/rc2.d/ /etc/rc2.d/ update-rc.d /etc/rc0.d/ /etc/rc0.d/ update-rc.d -
Write file to user bin folder 1 TTPs 6 IoCs
Processes:
update-rc.ddescription ioc process /usr/sbin/update-rc.d /usr/sbin/update-rc.d update-rc.d /usr/bin/lnabuzweue /usr/bin/lnabuzweue /usr/bin/xkwkhgnxkt /usr/bin/xkwkhgnxkt /usr/bin/sugyaakpxc /usr/bin/sugyaakpxc /usr/bin/hdneuyyydd /usr/bin/hdneuyyydd /usr/bin/peldlftdrl /usr/bin/peldlftdrl -
Reads runtime system information 7 IoCs
Reads data from /proc virtual filesystem.
Processes:
systemctlseddescription ioc process /proc/1/environ /proc/1/environ systemctl /proc/1/sched /proc/1/sched systemctl /proc/cmdline /proc/cmdline systemctl /proc/filesystems /proc/filesystems sed /proc/filesystems /proc/filesystems systemctl /proc/self/stat /proc/self/stat systemctl /proc/sys/kernel/osrelease /proc/sys/kernel/osrelease systemctl -
Writes file to tmp directory 5 IoCs
Malware often drops required files in the /tmp directory.
Processes:
description ioc /tmp/lnabuzweue /tmp/lnabuzweue /tmp/xkwkhgnxkt /tmp/xkwkhgnxkt /tmp/sugyaakpxc /tmp/sugyaakpxc /tmp/hdneuyyydd /tmp/hdneuyyydd /tmp/peldlftdrl /tmp/peldlftdrl
Processes
-
/tmp/yxbitkdccc_/tmp/yxbitkdccc_1⤵
-
/bin/shsh -c "sed -i '/\\/etc\\/cron.hourly\\/gcc.sh/d' /etc/crontab && echo '*/3 * * * * root /etc/cron.hourly/gcc.sh' >> /etc/crontab"1⤵
- Creates/modifies Cron job
-
/bin/sedsed -i "/\\/etc\\/cron.hourly\\/gcc.sh/d" /etc/crontab2⤵
- Creates/modifies Cron job
- Reads runtime system information
-
/bin/chkconfigchkconfig --add yxbitkdccc_1⤵
-
/sbin/chkconfigchkconfig --add yxbitkdccc_1⤵
-
/usr/bin/chkconfigchkconfig --add yxbitkdccc_1⤵
-
/usr/sbin/chkconfigchkconfig --add yxbitkdccc_1⤵
-
/usr/local/bin/chkconfigchkconfig --add yxbitkdccc_1⤵
-
/usr/local/sbin/chkconfigchkconfig --add yxbitkdccc_1⤵
-
/usr/X11R6/bin/chkconfigchkconfig --add yxbitkdccc_1⤵
-
/bin/update-rc.dupdate-rc.d yxbitkdccc_ defaults1⤵
-
/sbin/update-rc.dupdate-rc.d yxbitkdccc_ defaults1⤵
-
/usr/bin/update-rc.dupdate-rc.d yxbitkdccc_ defaults1⤵
-
/usr/sbin/update-rc.dupdate-rc.d yxbitkdccc_ defaults1⤵
- Modifies rc script
- Write file to user bin folder
-
/bin/systemctlsystemctl daemon-reload2⤵
- Reads runtime system information
-
/usr/bin/lnabuzweue/usr/bin/lnabuzweue top 5761⤵
-
/usr/bin/lnabuzweue/usr/bin/lnabuzweue "netstat -an" 5761⤵
-
/usr/bin/lnabuzweue/usr/bin/lnabuzweue pwd 5761⤵
-
/usr/bin/lnabuzweue/usr/bin/lnabuzweue whoami 5761⤵
-
/usr/bin/lnabuzweue/usr/bin/lnabuzweue "echo \"find\"" 5761⤵
-
/usr/bin/xkwkhgnxkt/usr/bin/xkwkhgnxkt top 5761⤵
-
/usr/bin/xkwkhgnxkt/usr/bin/xkwkhgnxkt "grep \"A\"" 5761⤵
-
/usr/bin/xkwkhgnxkt/usr/bin/xkwkhgnxkt "cat resolv.conf" 5761⤵
-
/usr/bin/xkwkhgnxkt/usr/bin/xkwkhgnxkt id 5761⤵
-
/usr/bin/xkwkhgnxkt/usr/bin/xkwkhgnxkt "ls -la" 5761⤵
-
/usr/bin/sugyaakpxc/usr/bin/sugyaakpxc pwd 5761⤵
-
/usr/bin/sugyaakpxc/usr/bin/sugyaakpxc "grep \"A\"" 5761⤵
-
/usr/bin/sugyaakpxc/usr/bin/sugyaakpxc "cat resolv.conf" 5761⤵
-
/usr/bin/sugyaakpxc/usr/bin/sugyaakpxc bash 5761⤵
-
/usr/bin/sugyaakpxc/usr/bin/sugyaakpxc bash 5761⤵
-
/usr/bin/hdneuyyydd/usr/bin/hdneuyyydd "echo \"find\"" 5761⤵
-
/usr/bin/hdneuyyydd/usr/bin/hdneuyyydd gnome-terminal 5761⤵
-
/usr/bin/hdneuyyydd/usr/bin/hdneuyyydd "ls -la" 5761⤵
-
/usr/bin/hdneuyyydd/usr/bin/hdneuyyydd sh 5761⤵
-
/usr/bin/hdneuyyydd/usr/bin/hdneuyyydd ls 5761⤵
-
/usr/bin/peldlftdrl/usr/bin/peldlftdrl ls 5761⤵
-
/usr/bin/peldlftdrl/usr/bin/peldlftdrl pwd 5761⤵
-
/usr/bin/peldlftdrl/usr/bin/peldlftdrl gnome-terminal 5761⤵
-
/usr/bin/peldlftdrl/usr/bin/peldlftdrl "ps -ef" 5761⤵
-
/usr/bin/peldlftdrl/usr/bin/peldlftdrl gnome-terminal 5761⤵
-
/usr/bin/zmxwdgrepc/usr/bin/zmxwdgrepc whoami 5761⤵