Analysis
-
max time kernel
152s -
max time network
159s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231215-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
22-12-2023 13:40
Behavioral task
behavioral1
Sample
a9c95cbf64552c07a2278f29b249135b
Resource
ubuntu1804-amd64-20231215-en
General
-
Target
a9c95cbf64552c07a2278f29b249135b
-
Size
1.1MB
-
MD5
a9c95cbf64552c07a2278f29b249135b
-
SHA1
6960164d2652ed3d6006dccdae8ff0e1eefa041a
-
SHA256
26f389b1b3f68324e328925fa4538fd4843014ed609fdff4bee80f72c845654f
-
SHA512
b4144490ad0f092d12977395192cb0155f0187b146bac8a51e51a465ddacd940346abb58c38524ddf9134cdaa781b4d17ec2217b4a71057d558cc8e5ecf16844
-
SSDEEP
24576:4vRE7caCfKGPqVEDNLFxKsfaSI+gIGYuuCol7r:4vREKfPqVE5jKsfaSRHGVo7r
Malware Config
Signatures
-
MrBlack trojan 2 IoCs
resource yara_rule behavioral1/files/fstream-4.dat family_mrblack behavioral1/files/fstream-6.dat family_mrblack -
Executes dropped EXE 2 IoCs
ioc pid Process /usr/bin/bsd-port/getty 1558 getty /usr/bin/.swhd 1576 .swhd -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc File opened for reading /proc/cpuinfo -
description ioc File opened for modification /etc/init.d/DbSecuritySpt -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc File opened for reading /proc/net/route -
Write file to user bin folder 1 TTPs 4 IoCs
description ioc Process File opened for modification /usr/bin/bsd-port/getty cp File opened for modification /usr/bin/.swhd cp File opened for modification /usr/bin/bsd-port/getty.lock Process not Found File opened for modification /usr/bin/bsd-port/udevd.lock Process not Found -
Reads system network configuration 1 TTPs 3 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc File opened for reading /proc/net/dev File opened for reading /proc/net/route File opened for reading /proc/net/arp -
Reads runtime system information 7 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/filesystems cp File opened for reading /proc/stat Process not Found File opened for reading /proc/meminfo Process not Found File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir -
Writes file to tmp directory 5 IoCs
Malware often drops required files in the /tmp directory.
description ioc File opened for modification /tmp/moni.lock File opened for modification /tmp/bill.lock File opened for modification /tmp/gates.lock File opened for modification /tmp/notify.file File opened for modification /tmp/conf.n
Processes
-
/tmp/a9c95cbf64552c07a2278f29b249135b/tmp/a9c95cbf64552c07a2278f29b249135b1⤵PID:1533
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt"1⤵PID:1539
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt2⤵PID:1540
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt"1⤵PID:1541
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt2⤵PID:1542
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt"1⤵PID:1543
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt2⤵PID:1544
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt"1⤵PID:1545
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt2⤵PID:1546
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt"1⤵PID:1547
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt2⤵PID:1548
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"1⤵PID:1552
-
/bin/mkdirmkdir -p /usr/bin/bsd-port2⤵
- Reads runtime system information
PID:1553
-
-
/bin/shsh -c "cp -f /tmp/a9c95cbf64552c07a2278f29b249135b /usr/bin/bsd-port/getty"1⤵PID:1554
-
/bin/cpcp -f /tmp/a9c95cbf64552c07a2278f29b249135b /usr/bin/bsd-port/getty2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1555
-
-
/bin/shsh -c /usr/bin/bsd-port/getty1⤵PID:1557
-
/usr/bin/bsd-port/getty/usr/bin/bsd-port/getty2⤵
- Executes dropped EXE
PID:1558
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1560
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1561
-
-
/bin/shsh -c "cp -f /tmp/a9c95cbf64552c07a2278f29b249135b /usr/bin/.swhd"1⤵PID:1562
-
/bin/cpcp -f /tmp/a9c95cbf64552c07a2278f29b249135b /usr/bin/.swhd2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1563
-
-
/bin/shsh -c /usr/bin/.swhd1⤵PID:1575
-
/usr/bin/.swhd/usr/bin/.swhd2⤵
- Executes dropped EXE
PID:1576
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"1⤵PID:1578
-
/sbin/insmodinsmod /usr/lib/xpacket.ko2⤵
- Reads runtime system information
PID:1579
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50B
MD54a4007ea7945833380d09763f7843c0a
SHA18cd1a7aecfb171c46ab7771c59381a956e1c418e
SHA256153ef03f55058dfad32f42e936c148fa96e50435777ed03cf5a774f6edf4b940
SHA512623db51e5d1ac07722f08e461efcb278e0815d37050f9fbba0eb3b19ff0202d7270beafcf9a3be200618fbf43ebde6d046fe3581ee1bfc5ef0e20f79aa50ed5e
-
Filesize
4B
MD5d63fbf8c3173730f82b150c5ef38b8ff
SHA11d23c8edf135106a57d7f1694d9c2c7eb67cc326
SHA25613be5b896be039957e7996f606c8513fa2d9061132bdcabdbee5a362dd9fd8ff
SHA512275c9875be2b60cc2d67678f6c08b9bfb4f21f8f087eaa942aad8d808f2141a9d1b376e1825ab764f8eda46cc7f6a86490d8475ca8446a6ef519c71784fdc11a
-
Filesize
4B
MD57e1d842d0f7ee600116ffc6b2d87d83f
SHA158cb004c78ad7dd27552600c7c1d525e5797cd1d
SHA2561d16bb3354a11b509e641db094ca078be290298b0ec32c6b46b88fe919a1a8ed
SHA512113c6380957062e07ff7390ef365b7352fa3e96dabb6503422821a7de921d40296db514ff99bf85f780aee8486787810184d16106a8a7ccdc92423e23bf31575
-
Filesize
37B
MD591246cab966943cd6632b08e6a200ef2
SHA1cf0f300185bc964f4eefc227f0b78be19b49ef92
SHA2565b247bc588a5e20ae01c3ac67f6f590549a8fb746e74abd191d9ed51899323ff
SHA51281b5a6de110b6a60ed7d5f0275f64c9361075dbec5811fb3b1f7b3868d77abb10532a7948ac4a17923ca4bb18d17e84da1bec5694cd5831adef14b6a4f28ffc2
-
Filesize
1.0MB
MD5cd8f76938e2d891bde4975dd1f39ee7f
SHA1cbfbd91dab1c58f787c51006f664ff0bf7039d3b
SHA256fe58d07305ce8b9bfbad7563de2a5d3e346cb0759b838412f9f1e5ec295dccf5
SHA512c470d640fa7b52004cee075d2eaf051fe9fa5d6800d6bda101472468e96c6fc9889f3d604d52318e2cdea3db2e4b767a3f9b510b0ec95f12c24cc39fe61e5100
-
Filesize
1.1MB
MD5a9c95cbf64552c07a2278f29b249135b
SHA16960164d2652ed3d6006dccdae8ff0e1eefa041a
SHA25626f389b1b3f68324e328925fa4538fd4843014ed609fdff4bee80f72c845654f
SHA512b4144490ad0f092d12977395192cb0155f0187b146bac8a51e51a465ddacd940346abb58c38524ddf9134cdaa781b4d17ec2217b4a71057d558cc8e5ecf16844