Analysis
-
max time kernel
155s -
max time network
160s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231215-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
19-12-2023 22:21
Behavioral task
behavioral1
Sample
011fb10d031cdc8ea1242ed91dc1e726
Resource
ubuntu1804-amd64-20231215-en
General
-
Target
011fb10d031cdc8ea1242ed91dc1e726
-
Size
1.2MB
-
MD5
011fb10d031cdc8ea1242ed91dc1e726
-
SHA1
514ce6f5a6c9d6879f612c360bbe97cd2af9904b
-
SHA256
709d04dd39dd7f214f3711f7795337fbb1c2e837dddd24e6d426a0d6c306618e
-
SHA512
0edea1a6f78ccf7c8fb5feffa0d0a10380f35083a56f3a53a5ad1ab620c22c5141b11050aa046390fe5519177d46766e5797d72b2f3423aeae5782fa45e2ba24
-
SSDEEP
24576:e845rGHu6gVJKG75oFpA0VWIX4L2y1q2rJp0:745vRVJKGtSA0VWIo6u9p0
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
resource yara_rule behavioral1/files/fstream-4.dat family_mrblack -
Executes dropped EXE 2 IoCs
ioc pid Process /usr/bin/bsd-port/getty 1574 getty /usr/bin/.sshd 1589 .sshd -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc File opened for reading /proc/cpuinfo -
description ioc File opened for modification /etc/init.d/DbSecuritySpt File opened for modification /etc/init.d/selinux -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc File opened for reading /proc/net/route -
Write file to user bin folder 1 TTPs 8 IoCs
description ioc Process File opened for modification /usr/bin/bsd-port/udevd.lock Process not Found File opened for modification /usr/bin/bsd-port/getty cp File opened for modification /usr/bin/.sshd cp File opened for modification /usr/bin/dpkgd/ps cp File opened for modification /usr/bin/dpkgd/ss cp File opened for modification /usr/bin/dpkgd/lsof cp File opened for modification /usr/bin/lsof cp File opened for modification /usr/bin/bsd-port/getty.lock Process not Found -
Writes file to system bin folder 1 TTPs 2 IoCs
description ioc Process File opened for modification /bin/ps cp File opened for modification /bin/ss cp -
Reads system network configuration 1 TTPs 3 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc File opened for reading /proc/net/dev File opened for reading /proc/net/route File opened for reading /proc/net/arp -
Reads runtime system information 23 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/stat Process not Found File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/meminfo Process not Found -
Writes file to tmp directory 5 IoCs
Malware often drops required files in the /tmp directory.
description ioc File opened for modification /tmp/moni.lod File opened for modification /tmp/bill.lock File opened for modification /tmp/gates.lod File opened for modification /tmp/notify.file File opened for modification /tmp/conf.n
Processes
-
/tmp/011fb10d031cdc8ea1242ed91dc1e726/tmp/011fb10d031cdc8ea1242ed91dc1e7261⤵PID:1551
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt"1⤵PID:1556
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt2⤵PID:1557
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt"1⤵PID:1558
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt2⤵PID:1559
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt"1⤵PID:1560
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt2⤵PID:1561
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt"1⤵PID:1562
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt2⤵PID:1563
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt"1⤵PID:1564
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt2⤵PID:1565
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"1⤵PID:1566
-
/bin/mkdirmkdir -p /usr/bin/bsd-port2⤵
- Reads runtime system information
PID:1567
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"1⤵PID:1568
-
/bin/mkdirmkdir -p /usr/bin/bsd-port2⤵
- Reads runtime system information
PID:1569
-
-
/bin/shsh -c "cp -f /tmp/011fb10d031cdc8ea1242ed91dc1e726 /usr/bin/bsd-port/getty"1⤵PID:1570
-
/bin/cpcp -f /tmp/011fb10d031cdc8ea1242ed91dc1e726 /usr/bin/bsd-port/getty2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1571
-
-
/bin/shsh -c /usr/bin/bsd-port/getty1⤵PID:1573
-
/usr/bin/bsd-port/getty/usr/bin/bsd-port/getty2⤵
- Executes dropped EXE
PID:1574
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1576
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1577
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1578
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1579
-
-
/bin/shsh -c "cp -f /tmp/011fb10d031cdc8ea1242ed91dc1e726 /usr/bin/.sshd"1⤵PID:1580
-
/bin/cpcp -f /tmp/011fb10d031cdc8ea1242ed91dc1e726 /usr/bin/.sshd2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1581
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"1⤵PID:1582
-
/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux2⤵PID:1583
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"1⤵PID:1584
-
/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux2⤵PID:1585
-
-
/bin/shsh -c /usr/bin/.sshd1⤵PID:1588
-
/usr/bin/.sshd/usr/bin/.sshd2⤵
- Executes dropped EXE
PID:1589
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"1⤵PID:1586
-
/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux2⤵PID:1590
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"1⤵PID:1591
-
/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux2⤵PID:1592
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"1⤵PID:1593
-
/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux2⤵PID:1594
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"1⤵PID:1595
-
/bin/mkdirmkdir -p /usr/bin/dpkgd2⤵
- Reads runtime system information
PID:1596
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"1⤵PID:1597
-
/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1598
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1599
-
/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1600
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1601
-
/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1602
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ps"1⤵PID:1603
-
/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ps2⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1604
-
-
/bin/shsh -c "chmod 0755 /bin/ps"1⤵PID:1605
-
/bin/chmodchmod 0755 /bin/ps2⤵PID:1606
-
-
/bin/shsh -c "cp -f /bin/ss /usr/bin/dpkgd/ss"1⤵PID:1607
-
/bin/cpcp -f /bin/ss /usr/bin/dpkgd/ss2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1608
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1609
-
/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1610
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1611
-
/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1612
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ss"1⤵PID:1613
-
/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ss2⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1614
-
-
/bin/shsh -c "chmod 0755 /bin/ss"1⤵PID:1615
-
/bin/chmodchmod 0755 /bin/ss2⤵PID:1616
-
-
/bin/shsh -c "cp -f /usr/bin/lsof /usr/bin/dpkgd/lsof"1⤵PID:1617
-
/bin/cpcp -f /usr/bin/lsof /usr/bin/dpkgd/lsof2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1618
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1619
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1620
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1621
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1622
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/lsof"1⤵PID:1623
-
/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/lsof2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1624
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"1⤵PID:1625
-
/bin/chmodchmod 0755 /usr/bin/lsof2⤵PID:1626
-
-
/bin/shsh -c "insmod /usr/bin/bsd-port/xpacket.ko"1⤵PID:1629
-
/sbin/insmodinsmod /usr/bin/bsd-port/xpacket.ko2⤵
- Reads runtime system information
PID:1630
-
-
/bin/shsh -c "insmod /tmp/xpacket.ko"1⤵PID:1631
-
/sbin/insmodinsmod /tmp/xpacket.ko2⤵
- Reads runtime system information
PID:1632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50B
MD52fb01dd57fbfa30c697026e1d4033a63
SHA165d34f0240b64cca11451e97418f2fe64922fd8e
SHA25670e58d0b1fec31cb0a272afeebe6590a5a7f55329c6795f890d0f7220461d0e4
SHA512d32205cbf67d80c154e6d3e0d66e0ae3ce66f9c2ddb9b514f4e339bff3bc16470d2a11fdb46f376e814239c278791c87af6e28ee0c19be0c742042618856c7bf
-
Filesize
36B
MD5993cc15058142d96c3daf7852c3d5ee8
SHA10950b8b391b04dd3895ea33cd3141543ebd2525d
SHA2568171d077918611803d93088409f220c66fae1c670b297e1aa5d8cbd548ce9208
SHA5120c4256c00a3710f97e92581b552682b36b62afc35fe72622c491323c618c19ea62611ac04ccafc3dfcde2254a2ebbd93b69b66795b16e36332293bed83adb928
-
Filesize
4B
MD5b2dd140336c9df867c087a29b2e66034
SHA19f7f230b6748530889d6d498ff5f5e2934fdbe69
SHA2562ae7ffb0ec4d1bccf01b12233aaced6949cc5808a4a173315ee508abbbaaaa1c
SHA5124140f3a8f3bd58f4e2e4c071d097d6401a78187340dd6f63f7e157d3fcd2a4f78d65f3b6b34c352c8f35cdb2983d054b76f4d8ea49586e260ab81c0463a31c9b
-
Filesize
4B
MD597d0145823aeb8ed80617be62e08bdcc
SHA13c7bf807f29cfe10e5cf0897570ded86d1e0a174
SHA2568ec5f9f24992404000f7060d95c087f773f0dd3eeed7c616ee3d89e052ac2ecb
SHA512fadf103de9d5a6ed5c165f6ae9fc337dda7a0b88b5ca88ced1aa1b73b1cf349888a3cb7c607a57939e02c8ee5ab4212420ba95e775db71d2961841530511aaaf
-
Filesize
37B
MD511a6b79e5a43b375873963519859e413
SHA1a884d5484df146fcc3f89873d93bd58744352285
SHA2561553473bf32df7df3e5354cc5b05e82e7270f8bc7e194fc9bb073ec40d4a573d
SHA51246afaa573fa373b7c23218f4b49ed3e1a935fa5ed4add61d63fbc1a597493626310401454bb21a3bf8ac9c56a52a234409ebf79cd6bcc9fdcb3aa4e3ee1d3f5a
-
Filesize
1.2MB
MD5011fb10d031cdc8ea1242ed91dc1e726
SHA1514ce6f5a6c9d6879f612c360bbe97cd2af9904b
SHA256709d04dd39dd7f214f3711f7795337fbb1c2e837dddd24e6d426a0d6c306618e
SHA5120edea1a6f78ccf7c8fb5feffa0d0a10380f35083a56f3a53a5ad1ab620c22c5141b11050aa046390fe5519177d46766e5797d72b2f3423aeae5782fa45e2ba24
-
Filesize
130KB
MD5558edc26f8a38fa9788220b9af8a73e7
SHA13024d44e580e9c67f32f6c585d50e2a6cc9a7cac
SHA256b76435c80333d2c1fd18e0e7682f1c9dfb5da8d507e93e3c416f54b481c428d5
SHA512edaa425b441044f015e8f68fffa1664e42372d00dd0e7b0924d24ce947aa8e5f96b3bdc326fa2f8b978e3fcf638a1ceca45a223735db73f1607df66990feb56f
-
Filesize
136KB
MD51dc929b5f2cd12fe6a2fe71140d2a9e3
SHA1f9995a92bb201b1b7738a39a38570ef0c40b52d2
SHA256418aae1da62554afe9f260866267af328fd761b3fd6f90f0ea53d543e2fefc38
SHA512fbed011c595084548db440dfbe485b7d27032a44a6ae9e141fe43f31c8c524ff9347135ab035deb441fca99e5a3794f7bb9194f148aa2f60f1547a7c67d47373