Analysis
-
max time kernel
149s -
max time network
151s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240221-en -
submitted
01/03/2024, 00:26
Behavioral task
behavioral1
Sample
afd986e0754c07002e764f8038a5fbf8
Resource
ubuntu2004-amd64-20240221-en
General
-
Target
afd986e0754c07002e764f8038a5fbf8
-
Size
8.2MB
-
MD5
afd986e0754c07002e764f8038a5fbf8
-
SHA1
bc18d23c16bbbadd6aa4ba226ff9cac0a9aafa20
-
SHA256
71eed0656bcb2ca1f2f6af4cf073e14f17dadec7af9cd93153299c0fd4aa07c0
-
SHA512
7ae76dd88f22ecc529d07606dba5cddd89f733980dccbed0e4dde83109775ea685d5bbc4813a5338666b12206a9ca6ffe66ff85024e76374c8c8b8c2625466ac
-
SSDEEP
49152:bK2IsqJ6+KCdOF87M6ee8ry770lDlzroschqayHQDx7XF/6jcRO8FYefPudx5zqn:vD+wFwz8raOVc76/6VfVf5rNOX
Malware Config
Signatures
-
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /var/spool/cron/crontabs/tmp.E69hu4 crontab -
Checks CPU configuration 1 TTPs 2 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo cat File opened for reading /proc/cpuinfo cat -
description ioc Process File opened for reading /proc/sys/net/core/somaxconn afd986e0754c07002e764f8038a5fbf8 File opened for reading /proc/version cat File opened for reading /proc/sys/net/core/somaxconn afd986e0754c07002e764f8038a5fbf8 File opened for reading /proc/version cat -
System Network Configuration Discovery 1 TTPs 1 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1506 crontab -
Writes file to tmp directory 3 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/.pids afd986e0754c07002e764f8038a5fbf8 File opened for modification /tmp/nip9iNeiph5chee afd986e0754c07002e764f8038a5fbf8 File opened for modification /tmp/[stea].pid afd986e0754c07002e764f8038a5fbf8
Processes
-
/tmp/afd986e0754c07002e764f8038a5fbf8/tmp/afd986e0754c07002e764f8038a5fbf81⤵
- Reads runtime system information
- Writes file to tmp directory
PID:1482 -
/usr/bin/catcat /proc/version2⤵
- Reads runtime system information
PID:1490
-
-
/usr/bin/catcat /proc/cpuinfo2⤵
- Checks CPU configuration
PID:1492
-
-
/usr/bin/unameuname -a2⤵PID:1494
-
-
/usr/bin/getconfgetconf LONG_BIT2⤵PID:1495
-
-
/tmp/afd986e0754c07002e764f8038a5fbf8"[stea]"2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:1496 -
/usr/bin/catcat /proc/version3⤵
- Reads runtime system information
PID:1500
-
-
/usr/bin/catcat /proc/cpuinfo3⤵
- Checks CPU configuration
PID:1502
-
-
/usr/bin/unameuname -a3⤵PID:1503
-
-
/usr/bin/getconfgetconf LONG_BIT3⤵PID:1505
-
-
/usr/bin/crontab/usr/bin/crontab /tmp/nip9iNeiph5chee3⤵
- Creates/modifies Cron job
- System Network Configuration Discovery
PID:1506
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD51415db70fe9ddb119e23e9b2808cde38
SHA1e9c340478ebb17ed024e217d7013275de0fabf8a
SHA256d732f39159e67eb62327ae853dfec69db69ec85b23a8b1f840db1959d32acced
SHA5125c8b6ebcd1482c6906bcff847818ea47403d35dc8c0ac73cb6398d05f641cfea17cf9c6ef823fabd35e7d1e891ac982388eb0e96084cc24df8ce54866934b2c6
-
Filesize
66B
MD5bc64d6fb2b1d3531e6373ff6cf4abafb
SHA160b6cab271d14dea85e2da664c0388a2cf558162
SHA2565b55450a9fc311ad13cd47f4b4e69e86d154103804a531bd98ffade16cd49db3
SHA512af7019fcb4b5dcc4571c2910c6bd3d327ce08e850a8ffc3450e7cade3e62449c44f0df47169b1a6461470c308e072021eb685e0655896bbf1562f18c011ce00e
-
Filesize
260B
MD524547fff4cabe798e23f9d7f03db42d3
SHA14d4e311e6653c8d981647ac6d40fb44339cf0059
SHA2565f6b794feaeb88509aa3c0476e4beeaf0fcc7e1780fb67bfe0ca79e11add5670
SHA5121f92233244eab88eb4d3bd35c265dd118d310b5d4fbe092e24b34f0fc0690a5663c669772802d8b567beec6ae376956eb2d7243e4c0f55cfaa84a7fbd192b972