Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
157s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231215-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
21/12/2023, 23:34
Behavioral task
behavioral1
Sample
27201c2352dc520fea6cd5d52680cb62
Resource
ubuntu1804-amd64-20231215-en
General
-
Target
27201c2352dc520fea6cd5d52680cb62
-
Size
1.5MB
-
MD5
27201c2352dc520fea6cd5d52680cb62
-
SHA1
7a8b40a3750419a2dfa0e86b9dc9f42cace11ebd
-
SHA256
913b27ed6c2bb0f654cfbc8d8dadbf3b187ca4916a56d6397808f1582b826ef4
-
SHA512
256688e4ed7aa985b5e868773add6bba2a09ec5cfa883a02287cbd5865b041bc2a984e1b3fd43f81148fb0a89144dc3cfa5969fc3b7da169d28085903586eb5a
-
SSDEEP
49152:2nilOolLbt1laIunbZsehknS55555555555555555555555555555555555k55w1:yeOolLbt1laIunlsehHNtYi7COEm
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
resource yara_rule behavioral1/files/fstream-4.dat family_mrblack -
Executes dropped EXE 2 IoCs
ioc pid Process /usr/bin/bsd-port/getty 1572 getty /usr/bin/.sshd 1588 .sshd -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc File opened for reading /proc/cpuinfo -
description ioc File opened for modification /etc/init.d/DbSecuritySpt File opened for modification /etc/init.d/selinux -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc File opened for reading /proc/net/route -
Write file to user bin folder 1 TTPs 9 IoCs
description ioc Process File opened for modification /usr/bin/.sshd cp File opened for modification /usr/bin/dpkgd/ss cp File opened for modification /usr/bin/dpkgd/lsof cp File opened for modification /usr/bin/lsof cp File opened for modification /usr/bin/bsd-port/udevd.lock Process not Found File opened for modification /usr/bin/bsd-port/getty cp File opened for modification /usr/bin/bsd-port/conf.n Process not Found File opened for modification /usr/bin/bsd-port/getty.lock Process not Found File opened for modification /usr/bin/dpkgd/ps cp -
Writes file to system bin folder 1 TTPs 2 IoCs
description ioc Process File opened for modification /bin/ps cp File opened for modification /bin/ss cp -
Reads system network configuration 1 TTPs 3 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc File opened for reading /proc/net/dev File opened for reading /proc/net/route File opened for reading /proc/net/arp -
Reads runtime system information 23 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/stat Process not Found File opened for reading /proc/meminfo Process not Found File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems mkdir File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir -
Writes file to tmp directory 5 IoCs
Malware often drops required files in the /tmp directory.
description ioc File opened for modification /tmp/moni.lod File opened for modification /tmp/bill.lock File opened for modification /tmp/gates.lod File opened for modification /tmp/notify.file File opened for modification /tmp/conf.n
Processes
-
/tmp/27201c2352dc520fea6cd5d52680cb62/tmp/27201c2352dc520fea6cd5d52680cb621⤵PID:1539
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt"1⤵PID:1544
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt2⤵PID:1545
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt"1⤵PID:1546
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt2⤵PID:1547
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt"1⤵PID:1548
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt2⤵PID:1549
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt"1⤵PID:1550
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt2⤵PID:1551
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt"1⤵PID:1552
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt2⤵PID:1553
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"1⤵PID:1564
-
/bin/mkdirmkdir -p /usr/bin/bsd-port2⤵
- Reads runtime system information
PID:1565
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"1⤵PID:1566
-
/bin/mkdirmkdir -p /usr/bin/bsd-port2⤵
- Reads runtime system information
PID:1567
-
-
/bin/shsh -c "cp -f /tmp/27201c2352dc520fea6cd5d52680cb62 /usr/bin/bsd-port/getty"1⤵PID:1568
-
/bin/cpcp -f /tmp/27201c2352dc520fea6cd5d52680cb62 /usr/bin/bsd-port/getty2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1569
-
-
/bin/shsh -c /usr/bin/bsd-port/getty1⤵PID:1571
-
/usr/bin/bsd-port/getty/usr/bin/bsd-port/getty2⤵
- Executes dropped EXE
PID:1572
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1574
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1575
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1576
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1577
-
-
/bin/shsh -c "cp -f /tmp/27201c2352dc520fea6cd5d52680cb62 /usr/bin/.sshd"1⤵PID:1578
-
/bin/cpcp -f /tmp/27201c2352dc520fea6cd5d52680cb62 /usr/bin/.sshd2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1579
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"1⤵PID:1580
-
/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux2⤵PID:1581
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"1⤵PID:1582
-
/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux2⤵PID:1583
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"1⤵PID:1584
-
/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux2⤵PID:1585
-
-
/bin/shsh -c /usr/bin/.sshd1⤵PID:1587
-
/usr/bin/.sshd/usr/bin/.sshd2⤵
- Executes dropped EXE
PID:1588
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"1⤵PID:1589
-
/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux2⤵PID:1590
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"1⤵PID:1591
-
/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux2⤵PID:1592
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"1⤵PID:1593
-
/bin/mkdirmkdir -p /usr/bin/dpkgd2⤵
- Reads runtime system information
PID:1594
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"1⤵PID:1595
-
/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1596
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1600
-
/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1601
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1602
-
/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1603
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ps"1⤵PID:1604
-
/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ps2⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1605
-
-
/bin/shsh -c "chmod 0755 /bin/ps"1⤵PID:1606
-
/bin/chmodchmod 0755 /bin/ps2⤵PID:1607
-
-
/bin/shsh -c "cp -f /bin/ss /usr/bin/dpkgd/ss"1⤵PID:1608
-
/bin/cpcp -f /bin/ss /usr/bin/dpkgd/ss2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1609
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1610
-
/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1611
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1612
-
/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1613
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ss"1⤵PID:1614
-
/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ss2⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1615
-
-
/bin/shsh -c "chmod 0755 /bin/ss"1⤵PID:1616
-
/bin/chmodchmod 0755 /bin/ss2⤵PID:1617
-
-
/bin/shsh -c "cp -f /usr/bin/lsof /usr/bin/dpkgd/lsof"1⤵PID:1618
-
/bin/cpcp -f /usr/bin/lsof /usr/bin/dpkgd/lsof2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1619
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1620
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1621
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1622
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1623
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/lsof"1⤵PID:1624
-
/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/lsof2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1625
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"1⤵PID:1626
-
/bin/chmodchmod 0755 /usr/bin/lsof2⤵PID:1627
-
-
/bin/shsh -c "insmod /tmp/xpacket.ko"1⤵PID:1628
-
/sbin/insmodinsmod /tmp/xpacket.ko2⤵
- Reads runtime system information
PID:1629
-
-
/bin/shsh -c "insmod /usr/bin/bsd-port/xpacket.ko"1⤵PID:1630
-
/sbin/insmodinsmod /usr/bin/bsd-port/xpacket.ko2⤵
- Reads runtime system information
PID:1631
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50B
MD58f1f452e37256d5065f4b1d090d42883
SHA171cdece53b36c94777d84034d82360aea3b4d8f8
SHA256e9656e88ddcef8e2ac1bd42c6a3a39c06690a1c464afc463d04df2767c296fcc
SHA5124c7a798119bac324a4ac96d1b48dc135f6eb6b0961de836ca99d30dde0544cb3bf1972e69ed3bde89d14a6884e7e9bb394060c86d49f6b8304b142ba656a5021
-
Filesize
36B
MD5993cc15058142d96c3daf7852c3d5ee8
SHA10950b8b391b04dd3895ea33cd3141543ebd2525d
SHA2568171d077918611803d93088409f220c66fae1c670b297e1aa5d8cbd548ce9208
SHA5120c4256c00a3710f97e92581b552682b36b62afc35fe72622c491323c618c19ea62611ac04ccafc3dfcde2254a2ebbd93b69b66795b16e36332293bed83adb928
-
Filesize
4B
MD5819c9fbfb075d62a16393b9fe4fcbaa5
SHA18959169251e7394bcf4b9004326f83e266a06bfb
SHA25650a0a04f2d67b4a26d3aaa163fa2fb0d80a5457716579587cc45ce5bc89d8fce
SHA5121a2836932a771fac43e720d14d8df08c3e32ca5d6d335ae38788fa774e05568c6c05a7c5531ab745b8ec7a9d410f7460ea86c3f5fb6fc097a991170cf26feb57
-
Filesize
4B
MD587ec2f451208df97228105657edb717f
SHA13738f2650c3885bee794953d56a1e91a5516f93f
SHA256eb57f949956cc9f3c32eb7f249bbe56a74c253015af4dddb0c98cde49157cbd0
SHA512ed0b97c0e93e6fea48a3038fe6a19f5083f8e81575d5e27472e7f40d9cca795ef6ab7440acedb4a7837623e9ef21f635f782067d411ee428e7690d3ffe6644ea
-
Filesize
37B
MD5e4b78049268b74ae76f95ecb31c1913f
SHA18da5f3a5f9ef8b8ac7429da0a121d12741046e96
SHA2568a272d64798779c386df1a27e95b53c9b6dc18d680419468c8f546d2a9f0ab02
SHA51206b8de1feb47c27b0451c4e7a477216e873f5ec555da561d123864df26252dd771eb603966ed2741c169835b6bbb1df09fb4805b229c73630710f45d2de49f78
-
Filesize
73B
MD52e5111bfdca6f5db3084c3c76ad257d7
SHA14854398484be73c219290928d28caf370c4ea99c
SHA25650be1059d97fd3794356b61e96fa53046006cbc919dd9f117db43521d857a8b6
SHA512a3b3f2b622c59a6c14ae087b15135fe544618ad1da77c46f3a251839176b4bd452a6e7bdfcec62fc032d292036f2ac03adfbfd9eefd69b7391e8f65b46e15b4c
-
Filesize
1.5MB
MD527201c2352dc520fea6cd5d52680cb62
SHA17a8b40a3750419a2dfa0e86b9dc9f42cace11ebd
SHA256913b27ed6c2bb0f654cfbc8d8dadbf3b187ca4916a56d6397808f1582b826ef4
SHA512256688e4ed7aa985b5e868773add6bba2a09ec5cfa883a02287cbd5865b041bc2a984e1b3fd43f81148fb0a89144dc3cfa5969fc3b7da169d28085903586eb5a
-
Filesize
159KB
MD5e093dc78225e2a0a25e3b137c1c1e442
SHA1c29497cfaae729eb576875e4fdfa400640ab16be
SHA2561190f4dbc7be174de8fd4096c9bf7a28eebfac937d308b7cc533be4a1240d26e
SHA512fe1cc7a65327732eaaee89f427c10239ba822430e34177842f4681068d78d404b1830d808a2a71b1efcc5f126c6d8c053512237421173aaa150e215a672da6f0
-
Filesize
130KB
MD5558edc26f8a38fa9788220b9af8a73e7
SHA13024d44e580e9c67f32f6c585d50e2a6cc9a7cac
SHA256b76435c80333d2c1fd18e0e7682f1c9dfb5da8d507e93e3c416f54b481c428d5
SHA512edaa425b441044f015e8f68fffa1664e42372d00dd0e7b0924d24ce947aa8e5f96b3bdc326fa2f8b978e3fcf638a1ceca45a223735db73f1607df66990feb56f
-
Filesize
136KB
MD51dc929b5f2cd12fe6a2fe71140d2a9e3
SHA1f9995a92bb201b1b7738a39a38570ef0c40b52d2
SHA256418aae1da62554afe9f260866267af328fd761b3fd6f90f0ea53d543e2fefc38
SHA512fbed011c595084548db440dfbe485b7d27032a44a6ae9e141fe43f31c8c524ff9347135ab035deb441fca99e5a3794f7bb9194f148aa2f60f1547a7c67d47373