Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
132s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231215-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
19/12/2023, 22:48
Behavioral task
behavioral1
Sample
2980c9ba79ca51b516ba6445bc7f59c4
Resource
ubuntu1804-amd64-20231215-en
General
-
Target
2980c9ba79ca51b516ba6445bc7f59c4
-
Size
1.2MB
-
MD5
2980c9ba79ca51b516ba6445bc7f59c4
-
SHA1
0de1f4a62d41572ab4ab05f2ecfdf691fc8565cb
-
SHA256
cb6a490f34f400137bf9a0c1507b5db717b6cc3c526368d538c783c98315cfcd
-
SHA512
b738e34b72ba545d6680af77b9e2c2731252f39d578a6d31ccec02da0dd4609b190b9951f68cab3b222f1ca8339844103e0249852a37102b1ca11b573b3d69fa
-
SSDEEP
24576:e845rGHu6gVJKG75oFpA0VWeX4O2y1q2rJp0:745vRVJKGtSA0VWeotu9p0
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
resource yara_rule behavioral1/files/fstream-4.dat family_mrblack -
Executes dropped EXE 2 IoCs
ioc pid Process /usr/bin/bsd-port/getty 1600 getty /usr/bin/.sshd 1618 .sshd -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc File opened for reading /proc/cpuinfo -
description ioc File opened for modification /etc/init.d/DbSecuritySpt File opened for modification /etc/init.d/selinux -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc File opened for reading /proc/net/route -
Write file to user bin folder 1 TTPs 9 IoCs
description ioc Process File opened for modification /usr/bin/.sshd cp File opened for modification /usr/bin/dpkgd/lsof cp File opened for modification /usr/bin/bsd-port/conf.n Process not Found File opened for modification /usr/bin/bsd-port/getty.lock Process not Found File opened for modification /usr/bin/bsd-port/udevd.lock Process not Found File opened for modification /usr/bin/bsd-port/getty cp File opened for modification /usr/bin/dpkgd/ps cp File opened for modification /usr/bin/dpkgd/ss cp File opened for modification /usr/bin/lsof cp -
Writes file to system bin folder 1 TTPs 2 IoCs
description ioc Process File opened for modification /bin/ps cp File opened for modification /bin/ss cp -
Reads system network configuration 1 TTPs 3 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc File opened for reading /proc/net/dev File opened for reading /proc/net/route File opened for reading /proc/net/arp -
Reads runtime system information 23 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/meminfo Process not Found File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/stat Process not Found File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir -
Writes file to tmp directory 4 IoCs
Malware often drops required files in the /tmp directory.
description ioc File opened for modification /tmp/moni.lod File opened for modification /tmp/bill.lock File opened for modification /tmp/gates.lod File opened for modification /tmp/notify.file
Processes
-
/tmp/2980c9ba79ca51b516ba6445bc7f59c4/tmp/2980c9ba79ca51b516ba6445bc7f59c41⤵PID:1577
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt"1⤵PID:1582
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt2⤵PID:1583
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt"1⤵PID:1584
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt2⤵PID:1585
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt"1⤵PID:1586
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt2⤵PID:1587
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt"1⤵PID:1588
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt2⤵PID:1589
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt"1⤵PID:1590
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt2⤵PID:1591
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"1⤵PID:1592
-
/bin/mkdirmkdir -p /usr/bin/bsd-port2⤵
- Reads runtime system information
PID:1593
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"1⤵PID:1594
-
/bin/mkdirmkdir -p /usr/bin/bsd-port2⤵
- Reads runtime system information
PID:1595
-
-
/bin/shsh -c "cp -f /tmp/2980c9ba79ca51b516ba6445bc7f59c4 /usr/bin/bsd-port/getty"1⤵PID:1596
-
/bin/cpcp -f /tmp/2980c9ba79ca51b516ba6445bc7f59c4 /usr/bin/bsd-port/getty2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1597
-
-
/bin/shsh -c /usr/bin/bsd-port/getty1⤵PID:1599
-
/usr/bin/bsd-port/getty/usr/bin/bsd-port/getty2⤵
- Executes dropped EXE
PID:1600
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1602
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1603
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1604
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1605
-
-
/bin/shsh -c "cp -f /tmp/2980c9ba79ca51b516ba6445bc7f59c4 /usr/bin/.sshd"1⤵PID:1606
-
/bin/cpcp -f /tmp/2980c9ba79ca51b516ba6445bc7f59c4 /usr/bin/.sshd2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1607
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"1⤵PID:1608
-
/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux2⤵PID:1609
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"1⤵PID:1610
-
/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux2⤵PID:1611
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"1⤵PID:1612
-
/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux2⤵PID:1613
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"1⤵PID:1614
-
/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux2⤵PID:1615
-
-
/bin/shsh -c /usr/bin/.sshd1⤵PID:1617
-
/usr/bin/.sshd/usr/bin/.sshd2⤵
- Executes dropped EXE
PID:1618
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"1⤵PID:1619
-
/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux2⤵PID:1620
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"1⤵PID:1621
-
/bin/mkdirmkdir -p /usr/bin/dpkgd2⤵
- Reads runtime system information
PID:1622
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"1⤵PID:1623
-
/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1624
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1625
-
/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1626
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1627
-
/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1628
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ps"1⤵PID:1629
-
/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ps2⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1630
-
-
/bin/shsh -c "chmod 0755 /bin/ps"1⤵PID:1631
-
/bin/chmodchmod 0755 /bin/ps2⤵PID:1632
-
-
/bin/shsh -c "cp -f /bin/ss /usr/bin/dpkgd/ss"1⤵PID:1633
-
/bin/cpcp -f /bin/ss /usr/bin/dpkgd/ss2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1634
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1635
-
/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1636
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1637
-
/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1638
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ss"1⤵PID:1639
-
/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ss2⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1640
-
-
/bin/shsh -c "chmod 0755 /bin/ss"1⤵PID:1641
-
/bin/chmodchmod 0755 /bin/ss2⤵PID:1642
-
-
/bin/shsh -c "cp -f /usr/bin/lsof /usr/bin/dpkgd/lsof"1⤵PID:1643
-
/bin/cpcp -f /usr/bin/lsof /usr/bin/dpkgd/lsof2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1645
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1646
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1647
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1649
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1650
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/lsof"1⤵PID:1651
-
/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/lsof2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1652
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"1⤵PID:1653
-
/bin/chmodchmod 0755 /usr/bin/lsof2⤵PID:1654
-
-
/bin/shsh -c "insmod /tmp/xpacket.ko"1⤵PID:1655
-
/sbin/insmodinsmod /tmp/xpacket.ko2⤵
- Reads runtime system information
PID:1656
-
-
/bin/shsh -c "insmod /usr/bin/bsd-port/xpacket.ko"1⤵PID:1665
-
/sbin/insmodinsmod /usr/bin/bsd-port/xpacket.ko2⤵
- Reads runtime system information
PID:1666
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50B
MD55dfb122b0ded36f8e9afe9f650dea379
SHA18260754ff313a2a2aaf59695027277ae3bbcdc9b
SHA256103d6dff037600ae0c809673889f68c4ebf04cd1ba36cf372354f0397c93085b
SHA512ca925860aeaf30a4b4a27a1ce832c4aae11497e0b70d04921b073c0ad0a5da39186fe42d1fcbde3ca003ac9a7610c966bcd857bfd8ca645fe4de20bffe825792
-
Filesize
4B
MD588a199611ac2b85bd3f76e8ee7e55650
SHA12e6f7cec101464171ebd06503c2a50d6aa5b1e4c
SHA2563ef4ba73834a4409affdc4f09899d57af3f9c201946d624705e5753bd88d3e89
SHA5125d9a0c28781e00e7ca858c8fc76218becdcf8daaafabc4398de20adc94d86447970f07e6e1934db2de3767b8d38c612c05959de3993292a8929a4a9a4b66daa3
-
Filesize
4B
MD589f03f7d02720160f1b04cf5b27f5ccb
SHA1cbf641003962d3b22ea5aeb9164c4cff46a13515
SHA256f7d9615965e2b49c6bde79dedfdecc39afade6e543922d5d023fda9d13430c44
SHA512b86aa582e4cbffc73c377a673ee2364627f267fe71a97a95b1cfcbb2c79373da88190563f456a178d9d734daeeb5f1e12df41d61ce6c4b50cbcd03f506cb0642
-
Filesize
73B
MD5dbe460de5fac414fb1b673011804d35f
SHA10e62853fe1accdeb3659e1588b995a1bb02c7a5d
SHA256fbd8ec381b31b530497b049a23ef6a26ee7c0ebc35868f96e4dd3ab8c0f86c13
SHA51206ae8d98efba360f0cd57428ab6fcdb3d618520d7f969101053a35f0bf33a8c9a179741b2dcc53605c2f4c9a37c99e92ff69f805b079600cca9096e6e57e022e
-
Filesize
1.2MB
MD52980c9ba79ca51b516ba6445bc7f59c4
SHA10de1f4a62d41572ab4ab05f2ecfdf691fc8565cb
SHA256cb6a490f34f400137bf9a0c1507b5db717b6cc3c526368d538c783c98315cfcd
SHA512b738e34b72ba545d6680af77b9e2c2731252f39d578a6d31ccec02da0dd4609b190b9951f68cab3b222f1ca8339844103e0249852a37102b1ca11b573b3d69fa
-
Filesize
159KB
MD5e093dc78225e2a0a25e3b137c1c1e442
SHA1c29497cfaae729eb576875e4fdfa400640ab16be
SHA2561190f4dbc7be174de8fd4096c9bf7a28eebfac937d308b7cc533be4a1240d26e
SHA512fe1cc7a65327732eaaee89f427c10239ba822430e34177842f4681068d78d404b1830d808a2a71b1efcc5f126c6d8c053512237421173aaa150e215a672da6f0
-
Filesize
130KB
MD5558edc26f8a38fa9788220b9af8a73e7
SHA13024d44e580e9c67f32f6c585d50e2a6cc9a7cac
SHA256b76435c80333d2c1fd18e0e7682f1c9dfb5da8d507e93e3c416f54b481c428d5
SHA512edaa425b441044f015e8f68fffa1664e42372d00dd0e7b0924d24ce947aa8e5f96b3bdc326fa2f8b978e3fcf638a1ceca45a223735db73f1607df66990feb56f
-
Filesize
136KB
MD51dc929b5f2cd12fe6a2fe71140d2a9e3
SHA1f9995a92bb201b1b7738a39a38570ef0c40b52d2
SHA256418aae1da62554afe9f260866267af328fd761b3fd6f90f0ea53d543e2fefc38
SHA512fbed011c595084548db440dfbe485b7d27032a44a6ae9e141fe43f31c8c524ff9347135ab035deb441fca99e5a3794f7bb9194f148aa2f60f1547a7c67d47373