Analysis
-
max time kernel
139s -
max time network
151s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231215-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
20-12-2023 17:41
Behavioral task
behavioral1
Sample
fabdcc80bc425b814e83962d104eef6c
Resource
ubuntu1804-amd64-20231215-en
General
-
Target
fabdcc80bc425b814e83962d104eef6c
-
Size
7.0MB
-
MD5
fabdcc80bc425b814e83962d104eef6c
-
SHA1
e5f5b30c22051f8c37df092516c62f2aa86403b1
-
SHA256
129ff78e405aa6abe96453a2b480f446680f912f5512a9e0e67a15c871d3bfd5
-
SHA512
4609f13607b94b2f2d146019b55b827658bc4890e92e776a8c68d38a3a8a1cec2fa995594986ac2b2a8c53367a4111f0517069f0abe61cf645818f166ddfb1b4
-
SSDEEP
98304:n4qmZmgSoh0iDxpRqVlaCM/ieYCXfhxIX:4hZml0Dx3eeipCXZx
Malware Config
Signatures
-
Checks CPU configuration 1 TTPs 2 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo cat File opened for reading /proc/cpuinfo cat -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /var/spool/cron/crontabs/tmp.i7C8tX crontab -
Reads runtime system information 4 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/sys/net/core/somaxconn fabdcc80bc425b814e83962d104eef6c File opened for reading /proc/version cat File opened for reading /proc/sys/net/core/somaxconn fabdcc80bc425b814e83962d104eef6c File opened for reading /proc/version cat -
Writes file to tmp directory 3 IoCs
Malware often drops required files in the /tmp directory.
description ioc File opened for modification /tmp/nip9iNeiph5chee File opened for modification /tmp/[stealth].pid File opened for modification /tmp/.pid
Processes
-
/tmp/fabdcc80bc425b814e83962d104eef6c/tmp/fabdcc80bc425b814e83962d104eef6c1⤵
- Reads runtime system information
PID:1533
-
/bin/catcat /proc/version1⤵
- Reads runtime system information
PID:1540
-
/bin/catcat /proc/cpuinfo1⤵
- Checks CPU configuration
PID:1541
-
/bin/unameuname -a1⤵PID:1543
-
/usr/bin/getconfgetconf LONG_BIT1⤵PID:1547
-
/tmp/fabdcc80bc425b814e83962d104eef6c"[stealth]"1⤵
- Reads runtime system information
PID:1548 -
/bin/catcat /proc/version2⤵
- Reads runtime system information
PID:1551
-
-
/bin/catcat /proc/cpuinfo1⤵
- Checks CPU configuration
PID:1553
-
/bin/unameuname -a1⤵PID:1554
-
/usr/bin/getconfgetconf LONG_BIT1⤵PID:1555
-
/usr/bin/crontab/usr/bin/crontab /tmp/nip9iNeiph5chee1⤵
- Creates/modifies Cron job
PID:1556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD535464c848f410e55a13bb9d78e7fddd0
SHA1a575bcefdc7a11dec7302ce66652db242e7931ea
SHA25648f31b127dde9f650b07d6d68488d734ed95687cbcfb2d06867d21ad0997f438
SHA5121d0d7db8e07f74deab2c3b47c8bc683145a0a8ed486c65c19f0e43a62f283d69ff4ad586802d96b866ac836d0ff925b0e8de8e485c95473d044cec04edfede18
-
Filesize
260B
MD5ed3fe169a638c6cc3f6e21b54e9ff007
SHA18169455acf9769e6fae900f4bdab87a14777bed6
SHA256eed2c24eb9cf0bb6419cb45456e0efda93f9292d68976d63ddc397ffbdc3d90c
SHA512b69bf32777bb63d9fe19708725d5ebf71cc232f0cf0a0a0bcdf74b4555ab76784fe1961cd7d4d09279ee19231e39f95a340ca5045d038a62b5e0fc649fb19158