Analysis
-
max time kernel
154s -
max time network
152s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231215-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
21-12-2023 21:53
Behavioral task
behavioral1
Sample
0894ee1d6e43f54343f21fb8dc4b385c
Resource
ubuntu1804-amd64-20231215-en
General
-
Target
0894ee1d6e43f54343f21fb8dc4b385c
-
Size
1.5MB
-
MD5
0894ee1d6e43f54343f21fb8dc4b385c
-
SHA1
e94f9108770a3192230a9737adc2d7a541f25eb3
-
SHA256
34847c24984fcd6f3e0cad1ed7eafcb70db20583a59f0e84df3ea42c0c7659b6
-
SHA512
8c260c48edbd1d5087b3baf30dfb6b0ed3063d86bfdadba251907514d8fc3d6c3f990ee20734b9b44b307b91294099a40ec1e4dd584954319c76f358e283b4e8
-
SSDEEP
24576:GA46TrzJBisiOvhlOHdSbQmHyJgf/kgX0Exb2cyaGpIoiMKnnLmYXqSYKKZdTrnD:zRNi6OHdSbQoyJyXpxb2PaGpXiMKnLmB
Malware Config
Signatures
-
MrBlack trojan 2 IoCs
resource yara_rule behavioral1/files/fstream-4.dat family_mrblack behavioral1/files/fstream-6.dat family_mrblack -
Executes dropped EXE 2 IoCs
ioc pid Process /usr/bin/bsd-port/getty 1573 getty /usr/bin/.sshd 1581 .sshd -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc File opened for reading /proc/cpuinfo -
description ioc File opened for modification /etc/init.d/DbSecuritySpt File opened for modification /etc/init.d/selinux -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc File opened for reading /proc/net/route -
Write file to user bin folder 1 TTPs 7 IoCs
description ioc Process File opened for modification /usr/bin/dpkgd/ps cp File opened for modification /usr/bin/dpkgd/lsof cp File opened for modification /usr/bin/lsof cp File opened for modification /usr/bin/bsd-port/getty.lock Process not Found File opened for modification /usr/bin/bsd-port/udevd.lock Process not Found File opened for modification /usr/bin/bsd-port/getty cp File opened for modification /usr/bin/.sshd cp -
Writes file to system bin folder 1 TTPs 1 IoCs
description ioc Process File opened for modification /bin/ps cp -
Reads system network configuration 1 TTPs 3 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc File opened for reading /proc/net/dev File opened for reading /proc/net/route File opened for reading /proc/net/arp -
Reads runtime system information 15 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems cp File opened for reading /proc/meminfo Process not Found File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/stat Process not Found File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir -
Writes file to tmp directory 5 IoCs
Malware often drops required files in the /tmp directory.
description ioc File opened for modification /tmp/gates.lock File opened for modification /tmp/notify.file File opened for modification /tmp/conf.n File opened for modification /tmp/moni.lock File opened for modification /tmp/bill.lock
Processes
-
/tmp/0894ee1d6e43f54343f21fb8dc4b385c/tmp/0894ee1d6e43f54343f21fb8dc4b385c1⤵PID:1551
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt"1⤵PID:1557
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt2⤵PID:1558
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt"1⤵PID:1559
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt2⤵PID:1560
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt"1⤵PID:1561
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt2⤵PID:1562
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt"1⤵PID:1563
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt2⤵PID:1564
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt"1⤵PID:1565
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt2⤵PID:1566
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"1⤵PID:1567
-
/bin/mkdirmkdir -p /usr/bin/bsd-port2⤵
- Reads runtime system information
PID:1568
-
-
/bin/shsh -c "cp -f /tmp/0894ee1d6e43f54343f21fb8dc4b385c /usr/bin/bsd-port/getty"1⤵PID:1569
-
/bin/cpcp -f /tmp/0894ee1d6e43f54343f21fb8dc4b385c /usr/bin/bsd-port/getty2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1570
-
-
/bin/shsh -c /usr/bin/bsd-port/getty1⤵PID:1572
-
/usr/bin/bsd-port/getty/usr/bin/bsd-port/getty2⤵
- Executes dropped EXE
PID:1573
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1575
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1576
-
-
/bin/shsh -c "cp -f /tmp/0894ee1d6e43f54343f21fb8dc4b385c /usr/bin/.sshd"1⤵PID:1577
-
/bin/cpcp -f /tmp/0894ee1d6e43f54343f21fb8dc4b385c /usr/bin/.sshd2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1578
-
-
/bin/shsh -c /usr/bin/.sshd1⤵PID:1580
-
/usr/bin/.sshd/usr/bin/.sshd2⤵
- Executes dropped EXE
PID:1581
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"1⤵PID:1583
-
/sbin/insmodinsmod /usr/lib/xpacket.ko2⤵
- Reads runtime system information
PID:1584
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"1⤵PID:1593
-
/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux2⤵PID:1594
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"1⤵PID:1595
-
/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux2⤵PID:1596
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"1⤵PID:1597
-
/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux2⤵PID:1598
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"1⤵PID:1599
-
/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux2⤵PID:1600
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"1⤵PID:1601
-
/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux2⤵PID:1602
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"1⤵PID:1603
-
/bin/mkdirmkdir -p /usr/bin/dpkgd2⤵
- Reads runtime system information
PID:1604
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"1⤵PID:1605
-
/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1606
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1607
-
/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1608
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ps"1⤵PID:1609
-
/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ps2⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1610
-
-
/bin/shsh -c "chmod 0755 /bin/ps"1⤵PID:1611
-
/bin/chmodchmod 0755 /bin/ps2⤵PID:1612
-
-
/bin/shsh -c "cp -f /usr/bin/lsof /usr/bin/dpkgd/lsof"1⤵PID:1613
-
/bin/cpcp -f /usr/bin/lsof /usr/bin/dpkgd/lsof2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1614
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1615
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1616
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/lsof"1⤵PID:1617
-
/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/lsof2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1618
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"1⤵PID:1619
-
/bin/chmodchmod 0755 /usr/bin/lsof2⤵PID:1620
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"1⤵PID:1621
-
/sbin/insmodinsmod /usr/lib/xpacket.ko2⤵
- Reads runtime system information
PID:1624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36B
MD5993cc15058142d96c3daf7852c3d5ee8
SHA10950b8b391b04dd3895ea33cd3141543ebd2525d
SHA2568171d077918611803d93088409f220c66fae1c670b297e1aa5d8cbd548ce9208
SHA5120c4256c00a3710f97e92581b552682b36b62afc35fe72622c491323c618c19ea62611ac04ccafc3dfcde2254a2ebbd93b69b66795b16e36332293bed83adb928
-
Filesize
4B
MD5351b33587c5fdd93bd42ef7ac9995a28
SHA1440f13f2ffe7800ae87431f50edb70aa51e49fde
SHA25651e6811411165c04f691eb5a38cf11a7316fdd776478b4fd222fd0107973c381
SHA512d4c03bb876b38c94d99a022f56ae99cfa0b0aebe95723c0851d5d989ef2eb6924962d0d332abcae2b9cba6fc86a0d57c11a13d2ae94df169718ba45f2ef90565
-
Filesize
4B
MD5b710915795b9e9c02cf10d6d2bdb688c
SHA16b3d34f8fc2796e5d9ef688e0827f7d5c64ded85
SHA2566d78b19a042a64f08cc4df0d42fb91cd757829718e60e82a54e3498f03f3ef32
SHA51225dd2f5d5a8e4b6137d22c4f9d45b77df576481ee9ef8c54d0174a3ff55d216c1bce6fe8ee6fe6d093427a3b4448cafb456a025cd789029adf7179870a5d7a00
-
Filesize
37B
MD5ca79998e9fcfdab9131a831d2a48e000
SHA1e1ff03649345e835f6e57406d564098911f4ea60
SHA256c9797b723d38733e016c254168eeb98fa80c24034e33bbda61ca180696bb5774
SHA512f1a9f77874f266dcb5b1840c4e5ac2d4b40edee86246722e7f56380fcdd07b433a1dee70d8f770ae050ce414153d741b03b5309109c020a171b372ed00a5fa8c
-
Filesize
918KB
MD5d3a2ca107499174f24ec7d4350db7ccb
SHA15e019be62e10e302729c4fa15b7e9791ab7c6a9e
SHA256c75ee6dd7c23cb27222bb03938012f15261dd7844f6aa1fff23a39fbe25dee01
SHA512bca6f2e9a8c58b19a43f4e4ddf4a8332a2a962db48cbdedeccea682abe01a7b99b6cdf286115bfa14c1f647a6c2836062d66979f2c5474fe8d47cd5811c9227d
-
Filesize
1.5MB
MD50894ee1d6e43f54343f21fb8dc4b385c
SHA1e94f9108770a3192230a9737adc2d7a541f25eb3
SHA25634847c24984fcd6f3e0cad1ed7eafcb70db20583a59f0e84df3ea42c0c7659b6
SHA5128c260c48edbd1d5087b3baf30dfb6b0ed3063d86bfdadba251907514d8fc3d6c3f990ee20734b9b44b307b91294099a40ec1e4dd584954319c76f358e283b4e8
-
Filesize
159KB
MD5e093dc78225e2a0a25e3b137c1c1e442
SHA1c29497cfaae729eb576875e4fdfa400640ab16be
SHA2561190f4dbc7be174de8fd4096c9bf7a28eebfac937d308b7cc533be4a1240d26e
SHA512fe1cc7a65327732eaaee89f427c10239ba822430e34177842f4681068d78d404b1830d808a2a71b1efcc5f126c6d8c053512237421173aaa150e215a672da6f0
-
Filesize
130KB
MD5558edc26f8a38fa9788220b9af8a73e7
SHA13024d44e580e9c67f32f6c585d50e2a6cc9a7cac
SHA256b76435c80333d2c1fd18e0e7682f1c9dfb5da8d507e93e3c416f54b481c428d5
SHA512edaa425b441044f015e8f68fffa1664e42372d00dd0e7b0924d24ce947aa8e5f96b3bdc326fa2f8b978e3fcf638a1ceca45a223735db73f1607df66990feb56f