Overview
overview
10Static
static
10The-MALWAR...ot.exe
windows7-x64
10The-MALWAR...ot.exe
windows10-2004-x64
10The-MALWAR...ll.exe
windows7-x64
10The-MALWAR...ll.exe
windows10-2004-x64
10The-MALWAR...BS.exe
windows7-x64
10The-MALWAR...BS.exe
windows10-2004-x64
10The-MALWAR...in.exe
windows7-x64
7The-MALWAR...in.exe
windows10-2004-x64
7The-MALWAR....A.exe
windows7-x64
7The-MALWAR....A.exe
windows10-2004-x64
7The-MALWAR....A.exe
windows7-x64
10The-MALWAR....A.exe
windows10-2004-x64
10The-MALWAR....A.dll
windows7-x64
7The-MALWAR....A.dll
windows10-2004-x64
6TheG0df2th...t.docm
windows7-x64
10TheG0df2th...t.docm
windows10-2004-x64
10The-MALWAR...r.xlsm
windows7-x64
10The-MALWAR...r.xlsm
windows10-2004-x64
10The-MALWAR...36c859
ubuntu-20.04-amd64
8The-MALWAR...caa742
ubuntu-20.04-amd64
8The-MALWAR...c1a732
ubuntu-20.04-amd64
8The-MALWAR...57c046
ubuntu-20.04-amd64
8The-MALWAR...4cde86
ubuntu-20.04-amd64
8The-MALWAR...460a01
ubuntu-20.04-amd64
8The-MALWAR...ece0c5
ubuntu-18.04-amd64
8The-MALWAR...257619
ubuntu-18.04-amd64
8The-MALWAR...fbcc59
ubuntu-18.04-amd64
8The-MALWAR...54f69c
ubuntu-18.04-amd64
8The-MALWAR...d539a6
ubuntu-20.04-amd64
8The-MALWAR...4996dd
ubuntu-20.04-amd64
8The-MALWAR...8232d5
ubuntu-20.04-amd64
8The-MALWAR...66b948
ubuntu-18.04-amd64
8Analysis
-
max time kernel
152s -
max time network
159s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240221-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240221-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
03-03-2024 03:21
Static task
static1
Behavioral task
behavioral1
Sample
The-MALWARE-Repo-master/Banking-Malware/DanaBot.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
The-MALWARE-Repo-master/Banking-Malware/DanaBot.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Dridex.JhiSharp.dll.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Dridex.JhiSharp.dll.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexDroppedVBS.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexDroppedVBS.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexLoader.bin.exe
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexLoader.bin.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
The-MALWARE-Repo-master/Banking-Malware/Zloader.xlsm
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
The-MALWARE-Repo-master/Banking-Malware/Zloader.xlsm
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/001eb377f0452060012124cb214f658754c7488ccb82e23ec56b2f45a636c859
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral20
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/041bc20ca8ac3161098cbc976e67e3c0f1b672ad36ecbe22fd21cbd53bcaa742
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral21
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/0ab8836efcaa62c7daac314e0b7ab1679319b2901578fd9e95ec3476b4c1a732
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral22
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/103b8404dc64c9a44511675981a09fd01395ee837452d114f1350c295357c046
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral23
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/2378e76aba1ad6e0c937fb39989217bf0de616fdad4726c0f4233bf5414cde86
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral24
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral25
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/3205603282a636979a55aa1e1be518cd3adcbbe491745d996ceb4b5a4dece0c5
Resource
ubuntu1804-amd64-20240226-en
Behavioral task
behavioral26
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/453468b86856665f2cc0e0e71668c0b6aac8b14326c623995ba5963f22257619
Resource
ubuntu1804-amd64-20240226-en
Behavioral task
behavioral27
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/5fb29fb0136978b9ccf60750af09cec74a257a0ca9c47159ca74dbba21fbcc59
Resource
ubuntu1804-amd64-20240226-en
Behavioral task
behavioral28
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/6fe6808b9cfe654f526108ec61cb5211bb6601d28e192cadf06102073b54f69c
Resource
ubuntu1804-amd64-20240226-en
Behavioral task
behavioral29
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/7745b070943e910e8807e3521ac7b7a01401d131bf6c18a63433f8177ed539a6
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral30
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/7f18e5b5b7645a80a0d44adf3fecdafcbf937bfe30a4cfb965a1421e034996dd
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral31
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/90b61cc77bb2d726219fd00ae2d0ecdf6f0fe7078529e87b7ec8e603008232d5
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral32
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948
Resource
ubuntu1804-amd64-20240226-en
General
-
Target
The-MALWARE-Repo-master/Botnets/FritzFrog/30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01
-
Size
8.6MB
-
MD5
819b0fdb2b9c8a440b734a7b72522f12
-
SHA1
f3aff7e1c44d21508eb60797211570c84a53597a
-
SHA256
30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01
-
SHA512
fee2c0dbbc91e2486e409e8b6a877c6ec500e6c7c0491d4c44d37006c30de79b95dd4640c7c8c8efcc920abccbdb659a590fde1e2526126279b7486778d08b5a
-
SSDEEP
98304:zhPTaS9ki2kJxOU/ci9Z6uHFg3+QIEvRihdF7Xk:dPTaS9kitnEi9Z6uHq3+XE8z
Malware Config
Signatures
-
Adds new SSH keys 2 IoCs
Linux special file to hold SSH keys. The threat actor may add new keys for further remote access.
description ioc Process File opened for modification /root/.ssh/authorized_keys 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File opened for modification /root/.ssh/authorized_keys Process not Found -
Deletes itself 1 IoCs
pid Process 1531 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 -
Reads EFI boot settings 1 IoCs
Reads EFI boot settings from the efivars filesystem, may contain security secrets or sensitive data.
description ioc Process File opened for reading /sys/firmware/efi/efivars/SystemdOptions-8cf2644b-4b0b-428f-9387-6d876050dc67 journalctl -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo cat -
Deletes log files 1 TTPs 2 IoCs
Deletes log files on the system.
description ioc Process File deleted /var/log/tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File deleted /var/log/tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 Process not Found -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads CPU attributes 1 TTPs 30 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/online uptime File opened for reading /sys/devices/system/cpu/online uptime File opened for reading /sys/devices/system/cpu/online free File opened for reading /sys/devices/system/cpu/online free File opened for reading /sys/devices/system/cpu/online free File opened for reading /sys/devices/system/cpu/online free File opened for reading /sys/devices/system/cpu/online uptime File opened for reading /sys/devices/system/cpu/online free File opened for reading /sys/devices/system/cpu/online free File opened for reading /sys/devices/system/cpu/online uptime File opened for reading /sys/devices/system/cpu/online uptime File opened for reading /sys/devices/system/cpu/online free File opened for reading /sys/devices/system/cpu/online uptime File opened for reading /sys/devices/system/cpu/online free File opened for reading /sys/devices/system/cpu/online uptime File opened for reading /sys/devices/system/cpu/online uptime File opened for reading /sys/devices/system/cpu/online free File opened for reading /sys/devices/system/cpu/online free File opened for reading /sys/devices/system/cpu/online free File opened for reading /sys/devices/system/cpu/online free File opened for reading /sys/devices/system/cpu/online uptime File opened for reading /sys/devices/system/cpu/online free File opened for reading /sys/devices/system/cpu/online uptime File opened for reading /sys/devices/system/cpu/online uptime File opened for reading /sys/devices/system/cpu/online uptime File opened for reading /sys/devices/system/cpu/online uptime File opened for reading /sys/devices/system/cpu/online uptime File opened for reading /sys/devices/system/cpu/online free File opened for reading /sys/devices/system/cpu/online uptime File opened for reading /sys/devices/system/cpu/online free -
Enumerates kernel/hardware configuration 1 TTPs 1 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
description ioc Process File opened for reading /sys/firmware/efi/efivars/SystemdOptions-8cf2644b-4b0b-428f-9387-6d876050dc67 journalctl -
Reads runtime system information 64 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/177/cmdline 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File opened for reading /proc/loadavg uptime File opened for reading /proc/1497/stat Process not Found File opened for reading /proc/118/cmdline 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File opened for reading /proc/654/cmdline 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File opened for reading /proc/138/stat Process not Found File opened for reading /proc/505/cmdline Process not Found File opened for reading /proc/15/cmdline 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File opened for reading /proc/1503/cmdline 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File opened for reading /proc/1103/cmdline Process not Found File opened for reading /proc/516/stat 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File opened for reading /proc/uptime uptime File opened for reading /proc/loadavg uptime File opened for reading /proc/1456/cmdline 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File opened for reading /proc/455/cmdline 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File opened for reading /proc/162/cmdline 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File opened for reading /proc/592/cmdline Process not Found File opened for reading /proc/1059/cmdline Process not Found File opened for reading /proc/1140/cmdline Process not Found File opened for reading /proc/sys/kernel/osrelease free File opened for reading /proc/87/cmdline 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File opened for reading /proc/16/stat 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File opened for reading /proc/85/cmdline Process not Found File opened for reading /proc/1072/cmdline Process not Found File opened for reading /proc/765/cmdline Process not Found File opened for reading /proc/sys/kernel/osrelease uptime File opened for reading /proc/74/cmdline 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File opened for reading /proc/158/stat 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File opened for reading /proc/538/stat Process not Found File opened for reading /proc/446/stat 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File opened for reading /proc/1152/cmdline 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File opened for reading /proc/626/stat Process not Found File opened for reading /proc/910/stat 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File opened for reading /proc/174/stat Process not Found File opened for reading /proc/561/stat Process not Found File opened for reading /proc/self/auxv free File opened for reading /proc/174/cmdline Process not Found File opened for reading /proc/441/cmdline 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File opened for reading /proc/697/cmdline 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File opened for reading /proc/12/stat 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File opened for reading /proc/265/cmdline Process not Found File opened for reading /proc/1415/cmdline 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File opened for reading /proc/679/stat 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File opened for reading /proc/586/cmdline Process not Found File opened for reading /proc/1531/stat Process not Found File opened for reading /proc/79/stat 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File opened for reading /proc/1/environ journalctl File opened for reading /proc/sys/kernel/osrelease uptime File opened for reading /proc/sys/kernel/osrelease free File opened for reading /proc/503/cmdline Process not Found File opened for reading /proc/71/cmdline 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File opened for reading /proc/11/stat 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File opened for reading /proc/138/stat 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File opened for reading /proc/586/stat 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01 File opened for reading /proc/1096/cmdline Process not Found File opened for reading /proc/sys/kernel/osrelease uptime File opened for reading /proc/1178/cmdline Process not Found File opened for reading /proc/meminfo free File opened for reading /proc/270/cmdline Process not Found File opened for reading /proc/meminfo free File opened for reading /proc/1072/stat Process not Found File opened for reading /proc/uptime uptime File opened for reading /proc/3/cmdline Process not Found File opened for reading /proc/956/cmdline 30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01
Processes
-
/tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01/tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a011⤵
- Adds new SSH keys
- Deletes itself
- Deletes log files
- Reads runtime system information
PID:1531 -
/usr/bin/unameuname -a2⤵PID:1584
-
-
/usr/bin/catcat /proc/cpuinfo2⤵
- Checks CPU configuration
PID:1689
-
-
/usr/bin/catcat /etc/issue2⤵PID:1690
-
-
/usr/bin/freefree -m2⤵
- Reads CPU attributes
PID:1692
-
-
/usr/bin/uptimeuptime2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1695
-
-
/usr/bin/journalctljournalctl -S "@0" -u sshd2⤵
- Reads EFI boot settings
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:1716
-
-
/usr/bin/freefree -m2⤵
- Reads CPU attributes
PID:1964
-
-
/usr/bin/uptimeuptime2⤵
- Reads CPU attributes
PID:1965
-
-
/usr/bin/freefree -m2⤵
- Reads CPU attributes
PID:2076
-
-
/usr/bin/uptimeuptime2⤵
- Reads CPU attributes
- Reads runtime system information
PID:2077
-
-
/usr/bin/freefree -m2⤵
- Reads CPU attributes
PID:2078
-
-
/usr/bin/uptimeuptime2⤵
- Reads CPU attributes
- Reads runtime system information
PID:2079
-
-
/usr/bin/freefree -m2⤵
- Reads CPU attributes
- Reads runtime system information
PID:2088
-
-
/usr/bin/uptimeuptime2⤵
- Reads CPU attributes
- Reads runtime system information
PID:2089
-
-
/usr/bin/catcat "/var/log/auth*"1⤵PID:1737
-
/usr/bin/zcatzcat "/var/log/auth*"1⤵PID:1740
-
/usr/local/sbin/gzipgzip -cd "/var/log/auth*"1⤵PID:1740
-
/usr/local/bin/gzipgzip -cd "/var/log/auth*"1⤵PID:1740
-
/usr/sbin/gzipgzip -cd "/var/log/auth*"1⤵PID:1740
-
/usr/bin/gzipgzip -cd "/var/log/auth*"1⤵PID:1740
-
/usr/bin/freefree -m1⤵
- Reads CPU attributes
- Reads runtime system information
PID:2057
-
/usr/bin/uptimeuptime1⤵
- Reads CPU attributes
- Reads runtime system information
PID:2058
-
/usr/bin/freefree -m1⤵
- Reads CPU attributes
PID:2086
-
/usr/bin/uptimeuptime1⤵
- Reads CPU attributes
PID:2087
-
/usr/bin/freefree -m1⤵
- Reads CPU attributes
- Reads runtime system information
PID:2090
-
/usr/bin/uptimeuptime1⤵
- Reads CPU attributes
PID:2091
-
/usr/bin/freefree -m1⤵
- Reads CPU attributes
PID:2092
-
/usr/bin/uptimeuptime1⤵
- Reads CPU attributes
PID:2093
-
/usr/bin/freefree -m1⤵
- Reads CPU attributes
PID:2094
-
/usr/bin/uptimeuptime1⤵
- Reads CPU attributes
PID:2095
-
/usr/bin/freefree -m1⤵
- Reads CPU attributes
PID:2096
-
/usr/bin/uptimeuptime1⤵
- Reads CPU attributes
PID:2097
-
/usr/bin/freefree -m1⤵
- Reads CPU attributes
PID:2098
-
/usr/bin/uptimeuptime1⤵
- Reads CPU attributes
PID:2099
-
/usr/bin/freefree -m1⤵
- Reads CPU attributes
PID:2101
-
/usr/bin/uptimeuptime1⤵
- Reads CPU attributes
PID:2102
-
/usr/bin/freefree -m1⤵
- Reads CPU attributes
- Reads runtime system information
PID:2103
-
/usr/bin/uptimeuptime1⤵
- Reads CPU attributes
- Reads runtime system information
PID:2104
-
/usr/bin/freefree -m1⤵
- Reads CPU attributes
- Reads runtime system information
PID:2105
-
/usr/bin/uptimeuptime1⤵
- Reads CPU attributes
PID:2106
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381B
MD59da18d38b6dd4c4aa84642378d63fa89
SHA1c5a976691e4b5963b5e760044f22cc9685268db6
SHA25643062900b2539d8d1f67f30fa7042c56b53541f63875b5f0de5d8fbde0e0a8bf
SHA512222b20b5b2ff8956c13dbac1f8d3f81435613b751913d65f4c4082ea9c1a7c8ae91be17a24ef4ae0c708bfe09daab552bb209615714d70acfaaed89c536c71b3