Analysis
-
max time kernel
149s -
max time network
132s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231215-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
27/12/2023, 11:43
Behavioral task
behavioral1
Sample
afd986e0754c07002e764f8038a5fbf8
Resource
ubuntu1804-amd64-20231215-en
General
-
Target
afd986e0754c07002e764f8038a5fbf8
-
Size
8.2MB
-
MD5
afd986e0754c07002e764f8038a5fbf8
-
SHA1
bc18d23c16bbbadd6aa4ba226ff9cac0a9aafa20
-
SHA256
71eed0656bcb2ca1f2f6af4cf073e14f17dadec7af9cd93153299c0fd4aa07c0
-
SHA512
7ae76dd88f22ecc529d07606dba5cddd89f733980dccbed0e4dde83109775ea685d5bbc4813a5338666b12206a9ca6ffe66ff85024e76374c8c8b8c2625466ac
-
SSDEEP
49152:bK2IsqJ6+KCdOF87M6ee8ry770lDlzroschqayHQDx7XF/6jcRO8FYefPudx5zqn:vD+wFwz8raOVc76/6VfVf5rNOX
Malware Config
Signatures
-
Checks CPU configuration 1 TTPs 2 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo cat File opened for reading /proc/cpuinfo cat -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /var/spool/cron/crontabs/tmp.YDO4NL crontab -
Reads runtime system information 4 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/sys/net/core/somaxconn afd986e0754c07002e764f8038a5fbf8 File opened for reading /proc/version cat File opened for reading /proc/sys/net/core/somaxconn afd986e0754c07002e764f8038a5fbf8 File opened for reading /proc/version cat -
Writes file to tmp directory 3 IoCs
Malware often drops required files in the /tmp directory.
description ioc File opened for modification /tmp/[stea].pid File opened for modification /tmp/.pids File opened for modification /tmp/nip9iNeiph5chee
Processes
-
/tmp/afd986e0754c07002e764f8038a5fbf8/tmp/afd986e0754c07002e764f8038a5fbf81⤵
- Reads runtime system information
PID:1527 -
/bin/catcat /proc/version2⤵
- Reads runtime system information
PID:1531
-
-
/bin/catcat /proc/cpuinfo1⤵
- Checks CPU configuration
PID:1537
-
/bin/unameuname -a1⤵PID:1539
-
/usr/bin/getconfgetconf LONG_BIT1⤵PID:1540
-
/tmp/afd986e0754c07002e764f8038a5fbf8"[stea]"1⤵
- Reads runtime system information
PID:1541 -
/bin/catcat /proc/version2⤵
- Reads runtime system information
PID:1545
-
-
/bin/catcat /proc/cpuinfo1⤵
- Checks CPU configuration
PID:1546
-
/bin/unameuname -a1⤵PID:1547
-
/usr/bin/getconfgetconf LONG_BIT1⤵PID:1548
-
/usr/bin/crontab/usr/bin/crontab /tmp/nip9iNeiph5chee1⤵
- Creates/modifies Cron job
PID:1555
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD51373b284bc381890049e92d324f56de0
SHA1d05785002742a30502dde3731b28883334e46040
SHA256477e2d13152129e72c4a47a5abed06ce422daff2ca0e99d33bc527477effee34
SHA512b409dbef7cad909beab9e2b251590e7a6773e6ef7bc3782a9adb4be3a2765fdefca68cb96b9b31e92e0edb23d521aa3adfb7c90ade660e75b1a04832d19d59f4
-
Filesize
66B
MD5bc64d6fb2b1d3531e6373ff6cf4abafb
SHA160b6cab271d14dea85e2da664c0388a2cf558162
SHA2565b55450a9fc311ad13cd47f4b4e69e86d154103804a531bd98ffade16cd49db3
SHA512af7019fcb4b5dcc4571c2910c6bd3d327ce08e850a8ffc3450e7cade3e62449c44f0df47169b1a6461470c308e072021eb685e0655896bbf1562f18c011ce00e
-
Filesize
260B
MD5d86fbb2a1d5922e9775044a4ee9fc6e4
SHA18c376855c4dbf4714289273db67db2e853f9e97c
SHA2562371d00b172c981146a029cf467273d627cf2f0932681920f110d2dfd6c967ab
SHA512932c7b77a05a403dab412d1323eed2a2b62d79f2b51d5d1165029b15662c159e70618714383a5b8fd58410b1d2d5bb0c3ba6e7aba42b07f551a6c2d5e0297e92