Analysis
-
max time kernel
156s -
max time network
131s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231215-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
22-12-2023 08:55
Behavioral task
behavioral1
Sample
7f25db5cb1cc08f7eb7c0f5fa46268ef
Resource
ubuntu1804-amd64-20231215-en
General
-
Target
7f25db5cb1cc08f7eb7c0f5fa46268ef
-
Size
1.1MB
-
MD5
7f25db5cb1cc08f7eb7c0f5fa46268ef
-
SHA1
c1325e3dc4881fa1c09c7f497e60b7fd0f663ba0
-
SHA256
e4883dda7079c57d623a0b7b7bd2ede4c796f1e00fe5cf039daedd25dd26c957
-
SHA512
961f221083d4f88a55a7d2424849302e18cc2e5b91f63bf776fe2beb3111569903fde685e0ec9802c83e414208fdb6af7c497fb11ff9823108ce9eca0bc1fa1b
-
SSDEEP
24576:4vRE7caCfKGPqVEDNLFxKsfaAI+gIGYuuCol7r:4vREKfPqVE5jKsfaARHGVo7r
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
resource yara_rule behavioral1/files/fstream-4.dat family_mrblack -
Executes dropped EXE 2 IoCs
ioc pid Process /usr/bin/bsd-port/getty 1549 getty /usr/bin/.sshd 1597 .sshd -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc File opened for reading /proc/cpuinfo -
description ioc File opened for modification /etc/init.d/DbSecuritySpt File opened for modification /etc/init.d/selinux -
Write file to user bin folder 1 TTPs 7 IoCs
description ioc Process File opened for modification /usr/bin/bsd-port/getty.lock Process not Found File opened for modification /usr/bin/bsd-port/udevd.lock Process not Found File opened for modification /usr/bin/bsd-port/getty cp File opened for modification /usr/bin/.sshd cp File opened for modification /usr/bin/dpkgd/ps cp File opened for modification /usr/bin/dpkgd/lsof cp File opened for modification /usr/bin/lsof cp -
Writes file to system bin folder 1 TTPs 1 IoCs
description ioc Process File opened for modification /bin/ps cp -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc File opened for reading /proc/net/dev -
Reads runtime system information 15 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/stat Process not Found File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/meminfo Process not Found File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp -
Writes file to tmp directory 4 IoCs
Malware often drops required files in the /tmp directory.
description ioc File opened for modification /tmp/moni.lock File opened for modification /tmp/bill.lock File opened for modification /tmp/gates.lock File opened for modification /tmp/notify.file
Processes
-
/tmp/7f25db5cb1cc08f7eb7c0f5fa46268ef/tmp/7f25db5cb1cc08f7eb7c0f5fa46268ef1⤵PID:1527
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt"1⤵PID:1533
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt2⤵PID:1534
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt"1⤵PID:1535
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt2⤵PID:1536
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt"1⤵PID:1537
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt2⤵PID:1538
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt"1⤵PID:1539
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt2⤵PID:1540
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt"1⤵PID:1541
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt2⤵PID:1542
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"1⤵PID:1543
-
/bin/mkdirmkdir -p /usr/bin/bsd-port2⤵
- Reads runtime system information
PID:1544
-
-
/bin/shsh -c "cp -f /tmp/7f25db5cb1cc08f7eb7c0f5fa46268ef /usr/bin/bsd-port/getty"1⤵PID:1545
-
/bin/cpcp -f /tmp/7f25db5cb1cc08f7eb7c0f5fa46268ef /usr/bin/bsd-port/getty2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1546
-
-
/bin/shsh -c /usr/bin/bsd-port/getty1⤵PID:1548
-
/usr/bin/bsd-port/getty/usr/bin/bsd-port/getty2⤵
- Executes dropped EXE
PID:1549
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1551
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1552
-
-
/bin/shsh -c "cp -f /tmp/7f25db5cb1cc08f7eb7c0f5fa46268ef /usr/bin/.sshd"1⤵PID:1553
-
/bin/cpcp -f /tmp/7f25db5cb1cc08f7eb7c0f5fa46268ef /usr/bin/.sshd2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1554
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"1⤵PID:1555
-
/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux2⤵PID:1556
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"1⤵PID:1557
-
/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux2⤵PID:1558
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"1⤵PID:1559
-
/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux2⤵PID:1560
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"1⤵PID:1561
-
/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux2⤵PID:1562
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"1⤵PID:1563
-
/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux2⤵PID:1564
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"1⤵PID:1565
-
/bin/mkdirmkdir -p /usr/bin/dpkgd2⤵
- Reads runtime system information
PID:1566
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"1⤵PID:1567
-
/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1568
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1569
-
/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1570
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ps"1⤵PID:1571
-
/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ps2⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1572
-
-
/bin/shsh -c "chmod 0755 /bin/ps"1⤵PID:1573
-
/bin/chmodchmod 0755 /bin/ps2⤵PID:1574
-
-
/bin/shsh -c "cp -f /usr/bin/lsof /usr/bin/dpkgd/lsof"1⤵PID:1575
-
/bin/cpcp -f /usr/bin/lsof /usr/bin/dpkgd/lsof2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1576
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1577
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1578
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/lsof"1⤵PID:1579
-
/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/lsof2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1580
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"1⤵PID:1581
-
/bin/chmodchmod 0755 /usr/bin/lsof2⤵PID:1582
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"1⤵PID:1583
-
/sbin/insmodinsmod /usr/lib/xpacket.ko2⤵
- Reads runtime system information
PID:1584
-
-
/bin/shsh -c /usr/bin/.sshd1⤵PID:1596
-
/usr/bin/.sshd/usr/bin/.sshd2⤵
- Executes dropped EXE
PID:1597
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"1⤵PID:1599
-
/sbin/insmodinsmod /usr/lib/xpacket.ko2⤵
- Reads runtime system information
PID:1600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50B
MD56568ff09041b5c1e5240b615ef10b9da
SHA18bef0ce6716181516618e951eb8cd1de35735277
SHA2561a6ecbd34e5b6120b16db6f109570a83692474e256e38fd3dcac46da9f8b0e70
SHA51240a9c07975145060b8529ed213004f3aa6f4ca0aebe673da7c57eed07e5431af19d7c12156fc965580e73adb2188954573c65ad07c924ac47b1d5726325d1212
-
Filesize
36B
MD5993cc15058142d96c3daf7852c3d5ee8
SHA10950b8b391b04dd3895ea33cd3141543ebd2525d
SHA2568171d077918611803d93088409f220c66fae1c670b297e1aa5d8cbd548ce9208
SHA5120c4256c00a3710f97e92581b552682b36b62afc35fe72622c491323c618c19ea62611ac04ccafc3dfcde2254a2ebbd93b69b66795b16e36332293bed83adb928
-
Filesize
4B
MD5109d2dd3608f669ca17920c511c2a41e
SHA1f73ea162f0ed315f3d7f8e2c79a2a4144091a128
SHA2567e46d737fdcad87443ca5b30dd756a5eb6b6dfa94eb0c97ce8c8c16554bc4efb
SHA512f413ec0c42aa8762a1e4aba709dfc25f114308cd795b4f324df00a77afcc42eae9d765642e11285fc75b4c9528595080a5cad76be02e4d4cae8bc3832dd51c9d
-
Filesize
4B
MD59c19a2aa1d84e04b0bd4bc888792bd1e
SHA1037880d210451b590c3a5229ea350645724e7e15
SHA256191024c47d6c2b3c24a570326b7e29f09652ec8bc2bb1779d95783e8753d12db
SHA512fbc7830e289b19696b7b6e01ae6d7e5403d144d417e380e47c29ea17db59c765ae7aa4a47cf885b6af0df831a8c98d5f99a40c35d121854ba273dd4afab24f93
-
Filesize
37B
MD5d31ed53790863b21aefbbbc0832e1936
SHA1ae6cb2eda3a5d61c3e50e09ad03835f003f52ecd
SHA25699178664b02e3adf8c0b58f0d9041b5a550634e0c1c15fd259a55784c43c0e6e
SHA5125bf633771c2620b16e22f43523f8da64319a57aa4b315d24942d78c64b6b8c59a4a233e33930eae2d1107023ea13cc5040ba55e8760e7f1d9f3e7f12177ea391
-
Filesize
1.1MB
MD57f25db5cb1cc08f7eb7c0f5fa46268ef
SHA1c1325e3dc4881fa1c09c7f497e60b7fd0f663ba0
SHA256e4883dda7079c57d623a0b7b7bd2ede4c796f1e00fe5cf039daedd25dd26c957
SHA512961f221083d4f88a55a7d2424849302e18cc2e5b91f63bf776fe2beb3111569903fde685e0ec9802c83e414208fdb6af7c497fb11ff9823108ce9eca0bc1fa1b
-
Filesize
159KB
MD5e093dc78225e2a0a25e3b137c1c1e442
SHA1c29497cfaae729eb576875e4fdfa400640ab16be
SHA2561190f4dbc7be174de8fd4096c9bf7a28eebfac937d308b7cc533be4a1240d26e
SHA512fe1cc7a65327732eaaee89f427c10239ba822430e34177842f4681068d78d404b1830d808a2a71b1efcc5f126c6d8c053512237421173aaa150e215a672da6f0
-
Filesize
130KB
MD5558edc26f8a38fa9788220b9af8a73e7
SHA13024d44e580e9c67f32f6c585d50e2a6cc9a7cac
SHA256b76435c80333d2c1fd18e0e7682f1c9dfb5da8d507e93e3c416f54b481c428d5
SHA512edaa425b441044f015e8f68fffa1664e42372d00dd0e7b0924d24ce947aa8e5f96b3bdc326fa2f8b978e3fcf638a1ceca45a223735db73f1607df66990feb56f