Analysis
-
max time kernel
149s -
max time network
153s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231215-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
19-02-2024 15:10
Behavioral task
behavioral1
Sample
cb084b73d800c005e5a3cf4f299f032a.elf
Resource
ubuntu1804-amd64-20231215-en
General
-
Target
cb084b73d800c005e5a3cf4f299f032a.elf
-
Size
1.2MB
-
MD5
cb084b73d800c005e5a3cf4f299f032a
-
SHA1
770fca135b25594e77480cdca7116366be2ba91d
-
SHA256
036a2f04ab56b5e7098c7d866eb21307011b812f126793159be1c853a6a54796
-
SHA512
1b7476baa62f8388f933e2e15473bca928abf0d1128d551ca21a8d1b6615b04f2660f77bcf406df939d31c9916d42900a5c3dec50ebfa40ce1340ae545e41234
-
SSDEEP
24576:e845rGHu6gVJKG75oFpA0VWeX4B2y1q2rJp0:745vRVJKGtSA0VWeoYu9p0
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
resource yara_rule behavioral1/files/fstream-4.dat family_mrblack -
Executes dropped EXE 2 IoCs
ioc pid Process /usr/bin/bsd-port/getty 1638 getty /usr/bin/.sshd 1662 .sshd -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc File opened for reading /proc/cpuinfo -
description ioc File opened for modification /etc/init.d/DbSecuritySpt File opened for modification /etc/init.d/selinux -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc File opened for reading /proc/net/route -
Write file to user bin folder 1 TTPs 9 IoCs
description ioc Process File opened for modification /usr/bin/bsd-port/conf.n Process not Found File opened for modification /usr/bin/bsd-port/getty.lock Process not Found File opened for modification /usr/bin/bsd-port/udevd.lock Process not Found File opened for modification /usr/bin/dpkgd/ps cp File opened for modification /usr/bin/dpkgd/ss cp File opened for modification /usr/bin/dpkgd/lsof cp File opened for modification /usr/bin/lsof cp File opened for modification /usr/bin/bsd-port/getty cp File opened for modification /usr/bin/.sshd cp -
Writes file to system bin folder 1 TTPs 2 IoCs
description ioc Process File opened for modification /bin/ps cp File opened for modification /bin/ss cp -
Reads system network configuration 1 TTPs 3 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc File opened for reading /proc/net/dev File opened for reading /proc/net/route File opened for reading /proc/net/arp -
Reads runtime system information 23 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/stat Process not Found File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/meminfo Process not Found File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/cmdline insmod -
Writes file to tmp directory 5 IoCs
Malware often drops required files in the /tmp directory.
description ioc File opened for modification /tmp/moni.lod File opened for modification /tmp/bill.lock File opened for modification /tmp/gates.lod File opened for modification /tmp/notify.file File opened for modification /tmp/conf.n
Processes
-
/tmp/cb084b73d800c005e5a3cf4f299f032a.elf/tmp/cb084b73d800c005e5a3cf4f299f032a.elf1⤵PID:1597
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt"1⤵PID:1620
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt2⤵PID:1621
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt"1⤵PID:1622
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt2⤵PID:1623
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt"1⤵PID:1624
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt2⤵PID:1625
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt"1⤵PID:1626
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt2⤵PID:1627
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt"1⤵PID:1628
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt2⤵PID:1629
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"1⤵PID:1630
-
/bin/mkdirmkdir -p /usr/bin/bsd-port2⤵
- Reads runtime system information
PID:1631
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"1⤵PID:1632
-
/bin/mkdirmkdir -p /usr/bin/bsd-port2⤵
- Reads runtime system information
PID:1633
-
-
/bin/shsh -c "cp -f /tmp/cb084b73d800c005e5a3cf4f299f032a.elf /usr/bin/bsd-port/getty"1⤵PID:1634
-
/bin/cpcp -f /tmp/cb084b73d800c005e5a3cf4f299f032a.elf /usr/bin/bsd-port/getty2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1635
-
-
/bin/shsh -c /usr/bin/bsd-port/getty1⤵PID:1637
-
/usr/bin/bsd-port/getty/usr/bin/bsd-port/getty2⤵
- Executes dropped EXE
PID:1638
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1640
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1641
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1642
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1643
-
-
/bin/shsh -c "cp -f /tmp/cb084b73d800c005e5a3cf4f299f032a.elf /usr/bin/.sshd"1⤵PID:1644
-
/bin/cpcp -f /tmp/cb084b73d800c005e5a3cf4f299f032a.elf /usr/bin/.sshd2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1645
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"1⤵PID:1646
-
/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux2⤵PID:1647
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"1⤵PID:1648
-
/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux2⤵PID:1649
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"1⤵PID:1650
-
/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux2⤵PID:1651
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"1⤵PID:1652
-
/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux2⤵PID:1653
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"1⤵PID:1654
-
/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux2⤵PID:1655
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"1⤵PID:1656
-
/bin/mkdirmkdir -p /usr/bin/dpkgd2⤵
- Reads runtime system information
PID:1657
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"1⤵PID:1658
-
/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1659
-
-
/bin/shsh -c /usr/bin/.sshd1⤵PID:1661
-
/usr/bin/.sshd/usr/bin/.sshd2⤵
- Executes dropped EXE
PID:1662
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1663
-
/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1664
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1665
-
/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1666
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ps"1⤵PID:1667
-
/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ps2⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1668
-
-
/bin/shsh -c "chmod 0755 /bin/ps"1⤵PID:1669
-
/bin/chmodchmod 0755 /bin/ps2⤵PID:1670
-
-
/bin/shsh -c "cp -f /bin/ss /usr/bin/dpkgd/ss"1⤵PID:1671
-
/bin/cpcp -f /bin/ss /usr/bin/dpkgd/ss2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1672
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1673
-
/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1674
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1675
-
/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1676
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ss"1⤵PID:1677
-
/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ss2⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1678
-
-
/bin/shsh -c "chmod 0755 /bin/ss"1⤵PID:1679
-
/bin/chmodchmod 0755 /bin/ss2⤵PID:1680
-
-
/bin/shsh -c "cp -f /usr/bin/lsof /usr/bin/dpkgd/lsof"1⤵PID:1681
-
/bin/cpcp -f /usr/bin/lsof /usr/bin/dpkgd/lsof2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1682
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1683
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1684
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1685
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1686
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/lsof"1⤵PID:1687
-
/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/lsof2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1688
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"1⤵PID:1689
-
/bin/chmodchmod 0755 /usr/bin/lsof2⤵PID:1690
-
-
/bin/shsh -c "insmod /usr/bin/bsd-port/xpacket.ko"1⤵PID:1693
-
/sbin/insmodinsmod /usr/bin/bsd-port/xpacket.ko2⤵
- Reads runtime system information
PID:1694
-
-
/bin/shsh -c "insmod /tmp/xpacket.ko"1⤵PID:1704
-
/sbin/insmodinsmod /tmp/xpacket.ko2⤵
- Reads runtime system information
PID:1705
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54B
MD535312a5ff7698f985920a95cb84dda44
SHA1661601935430b7305875b58ceb35b3720266fcff
SHA256ae1887348e10ffa3ad3e9fe75827ae07bba7fdbac124cc578dd61edb2284edd8
SHA51281f684253a86909c471be22462f4fc9c6e888a9b5e119c4257a3bd9dc4a0f7080e1a8b55db8e98e7e50268ac63fde1f5ab88d7266ee8223aeb06175c4770b76e
-
Filesize
4B
MD59c19a2aa1d84e04b0bd4bc888792bd1e
SHA1037880d210451b590c3a5229ea350645724e7e15
SHA256191024c47d6c2b3c24a570326b7e29f09652ec8bc2bb1779d95783e8753d12db
SHA512fbc7830e289b19696b7b6e01ae6d7e5403d144d417e380e47c29ea17db59c765ae7aa4a47cf885b6af0df831a8c98d5f99a40c35d121854ba273dd4afab24f93
-
Filesize
4B
MD58303a79b1e19a194f1875981be5bdb6f
SHA12bd746386e7303c37c516ce228d22b96e3bac1f5
SHA25670399d63b169b1ae4b8c6e7ae9a75df6dbf0d7776e55545bdf6c46c97ef59185
SHA51288cd9d500192656aadde9359332fcb3d623536fb0ec4c2b9baa06c385909c1e235bc01b48a826ab30d640787a9c39397b1ca61e07770b7ee49d684fbccbeb71b
-
Filesize
41B
MD5b6126e27d553bb8ca4adaf684bc0deae
SHA12c5371f5391828b3be3234213ad48b2ac61309c2
SHA256c82a39dc799a5791c185ac3a3653168a6438df97630a469ac920c6cd7499b714
SHA5124c2039a3b83bbd8085972be5a11c9d5fce761a6320d3dcc512099be84e959d3037d906b2c3016502b95154e4c0be70bc99d1917a4fa2e6264501e1c671b466a0
-
Filesize
73B
MD5bc3d1eda60efd931e11fa4f15262756b
SHA1a3bee4d06049a6e4445e4468ddfbb672770aa633
SHA256781d3443e6433c0579b2336d907a8023bc7b131812572b95701153bcc048ff8f
SHA51207809620ff0662a6279d1f88caef5f9d14ebfb994aa13d305e8613967be42a7628b5f196dc2745404144d6ee0ba82f0d0b4243d452ee4488b1ae738c87ed2911
-
Filesize
1.2MB
MD5cb084b73d800c005e5a3cf4f299f032a
SHA1770fca135b25594e77480cdca7116366be2ba91d
SHA256036a2f04ab56b5e7098c7d866eb21307011b812f126793159be1c853a6a54796
SHA5121b7476baa62f8388f933e2e15473bca928abf0d1128d551ca21a8d1b6615b04f2660f77bcf406df939d31c9916d42900a5c3dec50ebfa40ce1340ae545e41234
-
Filesize
159KB
MD5e093dc78225e2a0a25e3b137c1c1e442
SHA1c29497cfaae729eb576875e4fdfa400640ab16be
SHA2561190f4dbc7be174de8fd4096c9bf7a28eebfac937d308b7cc533be4a1240d26e
SHA512fe1cc7a65327732eaaee89f427c10239ba822430e34177842f4681068d78d404b1830d808a2a71b1efcc5f126c6d8c053512237421173aaa150e215a672da6f0
-
Filesize
130KB
MD5558edc26f8a38fa9788220b9af8a73e7
SHA13024d44e580e9c67f32f6c585d50e2a6cc9a7cac
SHA256b76435c80333d2c1fd18e0e7682f1c9dfb5da8d507e93e3c416f54b481c428d5
SHA512edaa425b441044f015e8f68fffa1664e42372d00dd0e7b0924d24ce947aa8e5f96b3bdc326fa2f8b978e3fcf638a1ceca45a223735db73f1607df66990feb56f
-
Filesize
136KB
MD51dc929b5f2cd12fe6a2fe71140d2a9e3
SHA1f9995a92bb201b1b7738a39a38570ef0c40b52d2
SHA256418aae1da62554afe9f260866267af328fd761b3fd6f90f0ea53d543e2fefc38
SHA512fbed011c595084548db440dfbe485b7d27032a44a6ae9e141fe43f31c8c524ff9347135ab035deb441fca99e5a3794f7bb9194f148aa2f60f1547a7c67d47373