Analysis
-
max time kernel
149s -
max time network
153s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231215-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
20-02-2024 06:01
Behavioral task
behavioral1
Sample
cfaaf70ca32d5ff133378cc0cfdc0cd5f27d91abf6853404df57208a8a7d3de4.elf
Resource
ubuntu1804-amd64-20231215-en
General
-
Target
cfaaf70ca32d5ff133378cc0cfdc0cd5f27d91abf6853404df57208a8a7d3de4.elf
-
Size
1.2MB
-
MD5
abc66fbc294358fb5ca8c4dd2f3e42cf
-
SHA1
a89a5999f2f6c37e1316f748767113b9b211cb3e
-
SHA256
cfaaf70ca32d5ff133378cc0cfdc0cd5f27d91abf6853404df57208a8a7d3de4
-
SHA512
ac1e4b3e8190625e5a54ae078081b61e39f717c22392441f67590167f015598ba36c4a186889d715ca52cd727d2e140e98504bc70c203718e754a20e4c90f5af
-
SSDEEP
24576:e845rGHu6gVJKG75oFpA0VWeX4g2y1q2rJp0:745vRVJKGtSA0VWeoXu9p0
Malware Config
Signatures
-
MrBlack trojan 2 IoCs
resource yara_rule behavioral1/files/fstream-4.dat family_mrblack behavioral1/files/fstream-6.dat family_mrblack -
Executes dropped EXE 2 IoCs
ioc pid Process /usr/bin/bsd-port/getty 1565 getty /usr/bin/.sshd 1589 .sshd -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc File opened for reading /proc/cpuinfo -
description ioc File opened for modification /etc/init.d/DbSecuritySpt File opened for modification /etc/init.d/selinux -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc File opened for reading /proc/net/route -
Write file to user bin folder 1 TTPs 9 IoCs
description ioc Process File opened for modification /usr/bin/bsd-port/udevd.lock Process not Found File opened for modification /usr/bin/.sshd cp File opened for modification /usr/bin/dpkgd/ss cp File opened for modification /usr/bin/dpkgd/lsof cp File opened for modification /usr/bin/lsof cp File opened for modification /usr/bin/bsd-port/conf.n Process not Found File opened for modification /usr/bin/bsd-port/getty.lock Process not Found File opened for modification /usr/bin/bsd-port/getty cp File opened for modification /usr/bin/dpkgd/ps cp -
Writes file to system bin folder 1 TTPs 2 IoCs
description ioc Process File opened for modification /bin/ps cp File opened for modification /bin/ss cp -
Reads system network configuration 1 TTPs 3 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc File opened for reading /proc/net/arp File opened for reading /proc/net/dev File opened for reading /proc/net/route -
Reads runtime system information 23 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/meminfo Process not Found File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/stat Process not Found File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems cp File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp -
Writes file to tmp directory 5 IoCs
Malware often drops required files in the /tmp directory.
description ioc File opened for modification /tmp/moni.lod File opened for modification /tmp/bill.lock File opened for modification /tmp/gates.lod File opened for modification /tmp/notify.file File opened for modification /tmp/conf.n
Processes
-
/tmp/cfaaf70ca32d5ff133378cc0cfdc0cd5f27d91abf6853404df57208a8a7d3de4.elf/tmp/cfaaf70ca32d5ff133378cc0cfdc0cd5f27d91abf6853404df57208a8a7d3de4.elf1⤵PID:1532
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt"1⤵PID:1547
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt2⤵PID:1548
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt"1⤵PID:1549
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt2⤵PID:1550
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt"1⤵PID:1551
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt2⤵PID:1552
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt"1⤵PID:1553
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt2⤵PID:1554
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt"1⤵PID:1555
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt2⤵PID:1556
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"1⤵PID:1557
-
/bin/mkdirmkdir -p /usr/bin/bsd-port2⤵
- Reads runtime system information
PID:1558
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"1⤵PID:1559
-
/bin/mkdirmkdir -p /usr/bin/bsd-port2⤵
- Reads runtime system information
PID:1560
-
-
/bin/shsh -c "cp -f /tmp/cfaaf70ca32d5ff133378cc0cfdc0cd5f27d91abf6853404df57208a8a7d3de4.elf /usr/bin/bsd-port/getty"1⤵PID:1561
-
/bin/cpcp -f /tmp/cfaaf70ca32d5ff133378cc0cfdc0cd5f27d91abf6853404df57208a8a7d3de4.elf /usr/bin/bsd-port/getty2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1562
-
-
/bin/shsh -c /usr/bin/bsd-port/getty1⤵PID:1564
-
/usr/bin/bsd-port/getty/usr/bin/bsd-port/getty2⤵
- Executes dropped EXE
PID:1565
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1567
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1568
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1569
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1570
-
-
/bin/shsh -c "cp -f /tmp/cfaaf70ca32d5ff133378cc0cfdc0cd5f27d91abf6853404df57208a8a7d3de4.elf /usr/bin/.sshd"1⤵PID:1571
-
/bin/cpcp -f /tmp/cfaaf70ca32d5ff133378cc0cfdc0cd5f27d91abf6853404df57208a8a7d3de4.elf /usr/bin/.sshd2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1572
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"1⤵PID:1573
-
/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux2⤵PID:1574
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"1⤵PID:1575
-
/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux2⤵PID:1576
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"1⤵PID:1577
-
/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux2⤵PID:1578
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"1⤵PID:1579
-
/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux2⤵PID:1580
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"1⤵PID:1581
-
/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux2⤵PID:1582
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"1⤵PID:1583
-
/bin/mkdirmkdir -p /usr/bin/dpkgd2⤵
- Reads runtime system information
PID:1584
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"1⤵PID:1585
-
/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1586
-
-
/bin/shsh -c /usr/bin/.sshd1⤵PID:1588
-
/usr/bin/.sshd/usr/bin/.sshd2⤵
- Executes dropped EXE
PID:1589
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1590
-
/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1591
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1592
-
/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1593
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ps"1⤵PID:1594
-
/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ps2⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1595
-
-
/bin/shsh -c "chmod 0755 /bin/ps"1⤵PID:1596
-
/bin/chmodchmod 0755 /bin/ps2⤵PID:1597
-
-
/bin/shsh -c "cp -f /bin/ss /usr/bin/dpkgd/ss"1⤵PID:1598
-
/bin/cpcp -f /bin/ss /usr/bin/dpkgd/ss2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1599
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1600
-
/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1601
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1602
-
/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1603
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ss"1⤵PID:1604
-
/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ss2⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1605
-
-
/bin/shsh -c "chmod 0755 /bin/ss"1⤵PID:1606
-
/bin/chmodchmod 0755 /bin/ss2⤵PID:1607
-
-
/bin/shsh -c "cp -f /usr/bin/lsof /usr/bin/dpkgd/lsof"1⤵PID:1608
-
/bin/cpcp -f /usr/bin/lsof /usr/bin/dpkgd/lsof2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1609
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1610
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1611
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1612
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1613
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/lsof"1⤵PID:1614
-
/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/lsof2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1615
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"1⤵PID:1616
-
/bin/chmodchmod 0755 /usr/bin/lsof2⤵PID:1617
-
-
/bin/shsh -c "insmod /usr/bin/bsd-port/xpacket.ko"1⤵PID:1620
-
/sbin/insmodinsmod /usr/bin/bsd-port/xpacket.ko2⤵
- Reads runtime system information
PID:1621
-
-
/bin/shsh -c "insmod /tmp/xpacket.ko"1⤵PID:1631
-
/sbin/insmodinsmod /tmp/xpacket.ko2⤵
- Reads runtime system information
PID:1632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86B
MD5d94ed9f0c2331b7b2416044082922e6c
SHA11f51479495662529bc9879334e1eedd6c475bae0
SHA2560ae7075efa614156630b1fe267df95c9a8f6fa6a01f9ccea884aa248a1057531
SHA5124b045284d2dbd5a1709e934beb9ef1a188e65adbe95092fb0f9a65d95d7399bfff8b6bd12b953822c7856e2e7e335d8a21e6b2986e769c8a457453c27d588e8e
-
Filesize
36B
MD5993cc15058142d96c3daf7852c3d5ee8
SHA10950b8b391b04dd3895ea33cd3141543ebd2525d
SHA2568171d077918611803d93088409f220c66fae1c670b297e1aa5d8cbd548ce9208
SHA5120c4256c00a3710f97e92581b552682b36b62afc35fe72622c491323c618c19ea62611ac04ccafc3dfcde2254a2ebbd93b69b66795b16e36332293bed83adb928
-
Filesize
4B
MD5b5a1fc2085986034e448d2ccc5bb9703
SHA12c8041adcd90153af5180e4c18e22c3b161c25e8
SHA256b51e45a12fbae3d0ee2bf77f1a4f80cbf642e2b4d1c237d2c0f7053a54f6b388
SHA5122ac6bc01e772f216c8298153168105655141b62abae70c966f38b03936a56a8c3f6576c556901ebc1ad905b891692a2889fd75b9ee586de28e8f2fe7302dfc14
-
Filesize
4B
MD5f60bb6bb4c96d4df93c51bd69dcc15a0
SHA1deccc3d8f76c21f127e400870f9e1ed609090401
SHA256ae92bee5080ffa3533774ef98ec7858b08a02fed6778ab5d2043d0c64028e2d6
SHA512db46a2c75bf23f8c38f7a9234bdf013d49d6960f7c039f49fa1e1bd4f5315b290523c23b1f9479e6e1bdd1bc3e4152a747af691bb99863b24c534b880aa18af7
-
Filesize
73B
MD56814337c8b81c50bda9c7c3150d5f4ac
SHA16a3bf958761e37eed49b69763be50404088c34ec
SHA256418036e0fea2e40251e2502a7f0d470a64814c0fbd7d1e97674f965f04cfc231
SHA5125474938664de82a02f5ff62ad716c748d1db771730348e45ce3e4d0508d0d9e291f5eca3533beaa7106da9025d4b2bc6287c28832fc4a7ee5bf9c39fb0f85e80
-
Filesize
926KB
MD578e3ef7341d09b96bc001a199b256ea0
SHA1a68827054d5a0fb8b2e7e2aa7e3805b0434d795a
SHA256eec9d7e07297db1523f88073c41fd1b6c39bdffd33c6a05cd9ee9497018ab177
SHA51275b712af36b71b09dfd28fef225fc087e77f9defa65c4c47af41ba41601be850a9f5cb9eb3bdcbdd24c50669e87b2a4ec30ddae288951e6bfe577e09ac56b4c7
-
Filesize
73B
MD5d175e6ec9a642a567478bf5ff9b3114d
SHA14ab4ec54875dd552546393b5951ab5f3462df9a7
SHA256d23150c1dcfae67c893d1b4b8cc306c061c17414cf446cdde588e983ca2a5a96
SHA512a5cb935bcbe395d82c0cc6868ea8a3c5f0e8ed0093a1f5b3e25b86b8a0b2f5996e34d9003545fa7331602b25d98add74b681a2444bab1478858cfe38a10dfd53
-
Filesize
1.2MB
MD5abc66fbc294358fb5ca8c4dd2f3e42cf
SHA1a89a5999f2f6c37e1316f748767113b9b211cb3e
SHA256cfaaf70ca32d5ff133378cc0cfdc0cd5f27d91abf6853404df57208a8a7d3de4
SHA512ac1e4b3e8190625e5a54ae078081b61e39f717c22392441f67590167f015598ba36c4a186889d715ca52cd727d2e140e98504bc70c203718e754a20e4c90f5af
-
Filesize
159KB
MD5e093dc78225e2a0a25e3b137c1c1e442
SHA1c29497cfaae729eb576875e4fdfa400640ab16be
SHA2561190f4dbc7be174de8fd4096c9bf7a28eebfac937d308b7cc533be4a1240d26e
SHA512fe1cc7a65327732eaaee89f427c10239ba822430e34177842f4681068d78d404b1830d808a2a71b1efcc5f126c6d8c053512237421173aaa150e215a672da6f0
-
Filesize
130KB
MD5558edc26f8a38fa9788220b9af8a73e7
SHA13024d44e580e9c67f32f6c585d50e2a6cc9a7cac
SHA256b76435c80333d2c1fd18e0e7682f1c9dfb5da8d507e93e3c416f54b481c428d5
SHA512edaa425b441044f015e8f68fffa1664e42372d00dd0e7b0924d24ce947aa8e5f96b3bdc326fa2f8b978e3fcf638a1ceca45a223735db73f1607df66990feb56f
-
Filesize
136KB
MD51dc929b5f2cd12fe6a2fe71140d2a9e3
SHA1f9995a92bb201b1b7738a39a38570ef0c40b52d2
SHA256418aae1da62554afe9f260866267af328fd761b3fd6f90f0ea53d543e2fefc38
SHA512fbed011c595084548db440dfbe485b7d27032a44a6ae9e141fe43f31c8c524ff9347135ab035deb441fca99e5a3794f7bb9194f148aa2f60f1547a7c67d47373