Analysis
-
max time kernel
154s -
max time network
159s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231215-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
22-12-2023 02:58
Behavioral task
behavioral1
Sample
57cdc48eaa07c06e05e40a6ff4f91152
Resource
ubuntu1804-amd64-20231215-en
General
-
Target
57cdc48eaa07c06e05e40a6ff4f91152
-
Size
1.1MB
-
MD5
57cdc48eaa07c06e05e40a6ff4f91152
-
SHA1
73aa4491cc45e5bb2c124dea5f899bfbbb7b3871
-
SHA256
e242b05592dd0460ba7ff61fc458af4c41eac421d770a1a5f24bf5c81a6f1a74
-
SHA512
ccbbafcdb90bd58ebf773d3eb358efff9612346a91197b817d40d19d93db3f4fef9c856fb55162380217af3f78c21caee6adb5f3d1a26719f7d730c85c2a8b98
-
SSDEEP
24576:5ajGoPkpF6jxtFJh/zRgQ4CkIWFNEm7YZPSlJcsZvp2wL1:kkpF+jj1gQ4CrIEm7YZ4Jc8bL1
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
resource yara_rule behavioral1/files/fstream-4.dat family_mrblack -
Executes dropped EXE 2 IoCs
ioc pid Process /usr/bin/bsd-port/getty 1541 getty /usr/bin/.sshd 1587 .sshd -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc File opened for reading /proc/cpuinfo -
description ioc File opened for modification /etc/init.d/DbSecuritySpt File opened for modification /etc/init.d/selinux -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc File opened for reading /proc/net/route -
Write file to user bin folder 1 TTPs 8 IoCs
description ioc Process File opened for modification /usr/bin/bsd-port/udevd.lock Process not Found File opened for modification /usr/bin/bsd-port/getty cp File opened for modification /usr/bin/.sshd cp File opened for modification /usr/bin/dpkgd/ps cp File opened for modification /usr/bin/dpkgd/lsof cp File opened for modification /usr/bin/lsof cp File opened for modification /usr/bin/bsd-port/conf.n Process not Found File opened for modification /usr/bin/bsd-port/getty.lock Process not Found -
Writes file to system bin folder 1 TTPs 1 IoCs
description ioc Process File opened for modification /bin/ps cp -
Reads system network configuration 1 TTPs 3 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc File opened for reading /proc/net/dev File opened for reading /proc/net/route File opened for reading /proc/net/arp -
Reads runtime system information 15 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/filesystems cp File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/stat Process not Found File opened for reading /proc/meminfo Process not Found File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp -
Writes file to tmp directory 5 IoCs
Malware often drops required files in the /tmp directory.
description ioc File opened for modification /tmp/bill.lock File opened for modification /tmp/gates.lock File opened for modification /tmp/notify.file File opened for modification /tmp/conf.n File opened for modification /tmp/moni.lock
Processes
-
/tmp/57cdc48eaa07c06e05e40a6ff4f91152/tmp/57cdc48eaa07c06e05e40a6ff4f911521⤵PID:1516
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt"1⤵PID:1525
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt2⤵PID:1526
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt"1⤵PID:1527
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt2⤵PID:1528
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt"1⤵PID:1529
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt2⤵PID:1530
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt"1⤵PID:1531
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt2⤵PID:1532
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt"1⤵PID:1533
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt2⤵PID:1534
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"1⤵PID:1535
-
/bin/mkdirmkdir -p /usr/bin/bsd-port2⤵
- Reads runtime system information
PID:1536
-
-
/bin/shsh -c "cp -f /tmp/57cdc48eaa07c06e05e40a6ff4f91152 /usr/bin/bsd-port/getty"1⤵PID:1537
-
/bin/cpcp -f /tmp/57cdc48eaa07c06e05e40a6ff4f91152 /usr/bin/bsd-port/getty2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1538
-
-
/bin/shsh -c /usr/bin/bsd-port/getty1⤵PID:1540
-
/usr/bin/bsd-port/getty/usr/bin/bsd-port/getty2⤵
- Executes dropped EXE
PID:1541
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1543
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1544
-
-
/bin/shsh -c "cp -f /tmp/57cdc48eaa07c06e05e40a6ff4f91152 /usr/bin/.sshd"1⤵PID:1545
-
/bin/cpcp -f /tmp/57cdc48eaa07c06e05e40a6ff4f91152 /usr/bin/.sshd2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1546
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"1⤵PID:1547
-
/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux2⤵PID:1548
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"1⤵PID:1549
-
/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux2⤵PID:1550
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"1⤵PID:1551
-
/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux2⤵PID:1552
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"1⤵PID:1553
-
/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux2⤵PID:1554
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"1⤵PID:1555
-
/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux2⤵PID:1556
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"1⤵PID:1557
-
/bin/mkdirmkdir -p /usr/bin/dpkgd2⤵
- Reads runtime system information
PID:1558
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"1⤵PID:1559
-
/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1560
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1561
-
/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1562
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ps"1⤵PID:1563
-
/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ps2⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1564
-
-
/bin/shsh -c "chmod 0755 /bin/ps"1⤵PID:1565
-
/bin/chmodchmod 0755 /bin/ps2⤵PID:1566
-
-
/bin/shsh -c "cp -f /usr/bin/lsof /usr/bin/dpkgd/lsof"1⤵PID:1567
-
/bin/cpcp -f /usr/bin/lsof /usr/bin/dpkgd/lsof2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1568
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1569
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1570
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/lsof"1⤵PID:1571
-
/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/lsof2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1572
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"1⤵PID:1573
-
/bin/chmodchmod 0755 /usr/bin/lsof2⤵PID:1574
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"1⤵PID:1575
-
/sbin/insmodinsmod /usr/lib/xpacket.ko2⤵
- Reads runtime system information
PID:1576
-
-
/bin/shsh -c /usr/bin/.sshd1⤵PID:1586
-
/usr/bin/.sshd/usr/bin/.sshd2⤵
- Executes dropped EXE
PID:1587
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"1⤵PID:1589
-
/sbin/insmodinsmod /usr/lib/xpacket.ko2⤵
- Reads runtime system information
PID:1590
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50B
MD5a4b4e9a490266c4b1d80630447f1be9d
SHA1106096fc8647c3609490b5ab38f279b338e6a58c
SHA2564fbe1749e98f0b7f777bf865969b63c93130a009821edfe478c69f0de6fb225d
SHA512b78f28ffd9138a99d731d78b91e8e171dc350482b57096b10c9bb9d05c9108273f8f4d26478282600a722c1c02c8058be19a6b2fbc8dd90626961811738a6e0e
-
Filesize
36B
MD5993cc15058142d96c3daf7852c3d5ee8
SHA10950b8b391b04dd3895ea33cd3141543ebd2525d
SHA2568171d077918611803d93088409f220c66fae1c670b297e1aa5d8cbd548ce9208
SHA5120c4256c00a3710f97e92581b552682b36b62afc35fe72622c491323c618c19ea62611ac04ccafc3dfcde2254a2ebbd93b69b66795b16e36332293bed83adb928
-
Filesize
4B
MD581c8727c62e800be708dbf37c4695dff
SHA142e12cb7198394beb558db2dc1f1a862366e1045
SHA2564091f2c5c45d0cb95c6b43919f9f07f62f7f6c6fb46ca207264b2aee4ee6e4f9
SHA512a6bb8360a59413364b955cde894976b6f7401d2b07296bf964d224eef87032ac500dccc76b01c445d8e85692d555ae28d672929376e32fe9cf80bb721b9d1632
-
Filesize
4B
MD5894b77f805bd94d292574c38c5d628d5
SHA11784f0e37c1fdd6200c1e8b28e8caae5402e74e0
SHA256d24eac45e69be063cc0053eb02650954eec62c314c405e564a4d11e951392e75
SHA512605b8ee18c6bd7c9d489faa803dc4c00fed6e7a4b21a9a69ba7b429642a06d7fe42e5fd45162f72fff76f1ec518c5840399c97d4ab0f7633651d35e2b19f2e05
-
Filesize
37B
MD54bf128f5891680a0a594f9b1636bd114
SHA16069c437d478ade9a88c96578f8deecc8e4131b1
SHA25606210b9befaa5922db16c71b82fe66ce29cb3ea8dff0b5954a5380d964e1f529
SHA5129763d0e9572c91e92b7c1942e3f1f0bcf11df721996bd905096f3a7761a807cb6fb576ba139e70346d512069a8bdcfdde9eaa0c9b2caa306a1710aa79e22c5f2
-
Filesize
69B
MD5263b0ce42f14cf38e8560580bc9da9f6
SHA16808c57007b269a6f26b04b53b85ff674b44a745
SHA2567a6dce7ed89d28fb62a44dd2cc81f6b4072dc18d8c4ca7ea3a83baf4c87b4b02
SHA51237201cec1a1ad823eb34aa05330e99e27a24f28e8297cb56a67b56c4ba98570ae9b24ca2610f0b0709c0eef768bafcc88ab7489d3230f2436c944df45dd78506
-
Filesize
1.1MB
MD557cdc48eaa07c06e05e40a6ff4f91152
SHA173aa4491cc45e5bb2c124dea5f899bfbbb7b3871
SHA256e242b05592dd0460ba7ff61fc458af4c41eac421d770a1a5f24bf5c81a6f1a74
SHA512ccbbafcdb90bd58ebf773d3eb358efff9612346a91197b817d40d19d93db3f4fef9c856fb55162380217af3f78c21caee6adb5f3d1a26719f7d730c85c2a8b98
-
Filesize
159KB
MD5e093dc78225e2a0a25e3b137c1c1e442
SHA1c29497cfaae729eb576875e4fdfa400640ab16be
SHA2561190f4dbc7be174de8fd4096c9bf7a28eebfac937d308b7cc533be4a1240d26e
SHA512fe1cc7a65327732eaaee89f427c10239ba822430e34177842f4681068d78d404b1830d808a2a71b1efcc5f126c6d8c053512237421173aaa150e215a672da6f0
-
Filesize
130KB
MD5558edc26f8a38fa9788220b9af8a73e7
SHA13024d44e580e9c67f32f6c585d50e2a6cc9a7cac
SHA256b76435c80333d2c1fd18e0e7682f1c9dfb5da8d507e93e3c416f54b481c428d5
SHA512edaa425b441044f015e8f68fffa1664e42372d00dd0e7b0924d24ce947aa8e5f96b3bdc326fa2f8b978e3fcf638a1ceca45a223735db73f1607df66990feb56f