Analysis
-
max time kernel
149s -
max time network
147s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240226-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240226-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
19-03-2024 16:12
Behavioral task
behavioral1
Sample
65533.exe.elf
Resource
ubuntu1804-amd64-20240226-en
General
-
Target
65533.exe.elf
-
Size
1.2MB
-
MD5
5ac9924723ee51a34999132cbd369213
-
SHA1
8bb17a17dc4a7885978c0161d7be2b0274a42466
-
SHA256
be9ce96a9612ff32bc0deae2ffed9f15116b644ec106d1906fe44a6776595291
-
SHA512
f0d1a0ca422c99b37c286b8d6b7b15ad48c6fc0991974623dfbe9c580499e868d36c771aa2d57b1784d515c4cc5524e846e20f5b252f6079b6f71c35c8ae389a
-
SSDEEP
24576:e845rGHu6gVJKG75oFpA0VWeX4R2y1q2rJp0:745vRVJKGtSA0VWeoIu9p0
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
Processes:
resource yara_rule /usr/bin/bsd-port/getty family_mrblack -
Executes dropped EXE 2 IoCs
Processes:
getty.sshdioc pid process /usr/bin/bsd-port/getty 1623 getty /usr/bin/.sshd 1650 .sshd -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
-
Processes:
description ioc File opened for modification /etc/init.d/DbSecuritySpt File opened for modification /etc/init.d/selinux -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/net/route -
Write file to user bin folder 1 TTPs 8 IoCs
Processes:
cpcpcpcpcpcpdescription ioc File opened for modification /usr/bin/bsd-port/getty.lock File opened for modification /usr/bin/bsd-port/udevd.lock File opened for modification /usr/bin/bsd-port/getty cp File opened for modification /usr/bin/.sshd cp File opened for modification /usr/bin/dpkgd/ps cp File opened for modification /usr/bin/dpkgd/ss cp File opened for modification /usr/bin/dpkgd/lsof cp File opened for modification /usr/bin/lsof cp -
Writes file to system bin folder 1 TTPs 2 IoCs
Processes:
cpcpdescription ioc process File opened for modification /bin/ps cp File opened for modification /bin/ss cp -
Reads system network configuration 1 TTPs 3 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
description ioc File opened for reading /proc/net/arp File opened for reading /proc/net/dev File opened for reading /proc/net/route -
Reads runtime system information 23 IoCs
Reads data from /proc virtual filesystem.
Processes:
mkdircpcpmkdirmkdircpcpmkdirmkdirinsmodinsmodcpmkdircpcpmkdircpmkdirmkdirmkdirmkdirdescription ioc process File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/meminfo File opened for reading /proc/cmdline insmod File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/stat File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir -
Writes file to tmp directory 5 IoCs
Malware often drops required files in the /tmp directory.
Processes:
description ioc File opened for modification /tmp/moni.lod File opened for modification /tmp/bill.lock File opened for modification /tmp/gates.lod File opened for modification /tmp/notify.file File opened for modification /tmp/conf.n
Processes
-
/tmp/65533.exe.elf/tmp/65533.exe.elf1⤵PID:1582
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt"1⤵PID:1605
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt2⤵PID:1606
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt"1⤵PID:1607
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt2⤵PID:1608
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt"1⤵PID:1609
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt2⤵PID:1610
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt"1⤵PID:1611
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt2⤵PID:1612
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt"1⤵PID:1613
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt2⤵PID:1614
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"1⤵PID:1615
-
/bin/mkdirmkdir -p /usr/bin/bsd-port2⤵
- Reads runtime system information
PID:1616
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"1⤵PID:1617
-
/bin/mkdirmkdir -p /usr/bin/bsd-port2⤵
- Reads runtime system information
PID:1618
-
/bin/shsh -c "cp -f /tmp/65533.exe.elf /usr/bin/bsd-port/getty"1⤵PID:1619
-
/bin/cpcp -f /tmp/65533.exe.elf /usr/bin/bsd-port/getty2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1620
-
/bin/shsh -c /usr/bin/bsd-port/getty1⤵PID:1622
-
/usr/bin/bsd-port/getty/usr/bin/bsd-port/getty2⤵
- Executes dropped EXE
PID:1623
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1625
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1626
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1627
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1628
-
/bin/shsh -c "cp -f /tmp/65533.exe.elf /usr/bin/.sshd"1⤵PID:1629
-
/bin/cpcp -f /tmp/65533.exe.elf /usr/bin/.sshd2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1630
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"1⤵PID:1631
-
/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux2⤵PID:1632
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"1⤵PID:1633
-
/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux2⤵PID:1634
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"1⤵PID:1635
-
/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux2⤵PID:1636
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"1⤵PID:1637
-
/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux2⤵PID:1638
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"1⤵PID:1639
-
/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux2⤵PID:1640
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"1⤵PID:1641
-
/bin/mkdirmkdir -p /usr/bin/dpkgd2⤵
- Reads runtime system information
PID:1642
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"1⤵PID:1643
-
/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1644
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1645
-
/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1646
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1647
-
/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1651
-
/bin/shsh -c /usr/bin/.sshd1⤵PID:1649
-
/usr/bin/.sshd/usr/bin/.sshd2⤵
- Executes dropped EXE
PID:1650
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ps"1⤵PID:1652
-
/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ps2⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1653
-
/bin/shsh -c "chmod 0755 /bin/ps"1⤵PID:1654
-
/bin/chmodchmod 0755 /bin/ps2⤵PID:1655
-
/bin/shsh -c "cp -f /bin/ss /usr/bin/dpkgd/ss"1⤵PID:1656
-
/bin/cpcp -f /bin/ss /usr/bin/dpkgd/ss2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1657
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1658
-
/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1659
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1660
-
/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1661
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ss"1⤵PID:1662
-
/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ss2⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1663
-
/bin/shsh -c "chmod 0755 /bin/ss"1⤵PID:1664
-
/bin/chmodchmod 0755 /bin/ss2⤵PID:1665
-
/bin/shsh -c "cp -f /usr/bin/lsof /usr/bin/dpkgd/lsof"1⤵PID:1666
-
/bin/cpcp -f /usr/bin/lsof /usr/bin/dpkgd/lsof2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1667
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1668
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1669
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1670
-
/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1671
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/lsof"1⤵PID:1672
-
/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/lsof2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1673
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"1⤵PID:1674
-
/bin/chmodchmod 0755 /usr/bin/lsof2⤵PID:1675
-
/bin/shsh -c "insmod /usr/bin/bsd-port/xpacket.ko"1⤵PID:1678
-
/sbin/insmodinsmod /usr/bin/bsd-port/xpacket.ko2⤵
- Reads runtime system information
PID:1679
-
/bin/shsh -c "insmod /tmp/xpacket.ko"1⤵PID:1684
-
/sbin/insmodinsmod /tmp/xpacket.ko2⤵
- Reads runtime system information
PID:1685
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31B
MD57654a8bcecf2f062c8fb8fa5e125cc64
SHA1f0843a354f6562e3e1ef017d0821c21dff791885
SHA25624609aa546669a836d35b1503de1cc8d6aa4d2a8b86acd091fe7e6005290e7f6
SHA512c3db1a99c1ec163dd21d4b6f06619e9180985b350a11e0e9ef56cba7ff0dc1413b0c84d6a6269602acdb251d0d725844642b69b615eeb7e04654229359684d7a
-
Filesize
36B
MD5993cc15058142d96c3daf7852c3d5ee8
SHA10950b8b391b04dd3895ea33cd3141543ebd2525d
SHA2568171d077918611803d93088409f220c66fae1c670b297e1aa5d8cbd548ce9208
SHA5120c4256c00a3710f97e92581b552682b36b62afc35fe72622c491323c618c19ea62611ac04ccafc3dfcde2254a2ebbd93b69b66795b16e36332293bed83adb928
-
Filesize
4B
MD55129a5ddcd0dcd755232baa04c231698
SHA1b2a3625de074749ed626d2c2fdf5342d7757a850
SHA256e52522a505f68250e81747aa5386c5c60196c1680f1c89762ab1ab0fbaae39b8
SHA51227f36a56ba7f81569a7edcada4b457648cef41168a85cadf11c6e649295b110569e060047c624376a3dd8372edf153ae15c954cce7e308e8f826884a707d12c9
-
Filesize
4B
MD5831c2f88a604a07ca94314b56a4921b8
SHA1e4fb11694cd7bab54173d1d9664eb70b6b6b8a14
SHA256df6822cd01387e05c8ea01eae408dacae839ebf27c2ce1ffa3b6a0b7f3f0ffa1
SHA51210a3f9ea81f15a045197d0afa900930081489c363acb934d7aa3125c1f32540dea17e0d47612a70fcf3707c35573372033214ffdb9314e5c636a2d0f45920a9d
-
Filesize
18B
MD5dbf0cae3ba557b2fe0a5f3bc7821243c
SHA1861e81be40ee86062a7f85c9cf2d4b51615f55e6
SHA2565d826086f60d2c5eae7d702efa59b156b20e10a1b0d5b16eec99bfeb2f289109
SHA512917ac571cfd6a84073a3f0a587a6b4939e57ca776b7d63e42e5973524be7f5d40c170f00c06512e1350c2a1c78876b20cbc7bdf7f74d6f58f979ea14a0976fae
-
Filesize
1.2MB
MD55ac9924723ee51a34999132cbd369213
SHA18bb17a17dc4a7885978c0161d7be2b0274a42466
SHA256be9ce96a9612ff32bc0deae2ffed9f15116b644ec106d1906fe44a6776595291
SHA512f0d1a0ca422c99b37c286b8d6b7b15ad48c6fc0991974623dfbe9c580499e868d36c771aa2d57b1784d515c4cc5524e846e20f5b252f6079b6f71c35c8ae389a
-
Filesize
159KB
MD5e093dc78225e2a0a25e3b137c1c1e442
SHA1c29497cfaae729eb576875e4fdfa400640ab16be
SHA2561190f4dbc7be174de8fd4096c9bf7a28eebfac937d308b7cc533be4a1240d26e
SHA512fe1cc7a65327732eaaee89f427c10239ba822430e34177842f4681068d78d404b1830d808a2a71b1efcc5f126c6d8c053512237421173aaa150e215a672da6f0
-
Filesize
130KB
MD5558edc26f8a38fa9788220b9af8a73e7
SHA13024d44e580e9c67f32f6c585d50e2a6cc9a7cac
SHA256b76435c80333d2c1fd18e0e7682f1c9dfb5da8d507e93e3c416f54b481c428d5
SHA512edaa425b441044f015e8f68fffa1664e42372d00dd0e7b0924d24ce947aa8e5f96b3bdc326fa2f8b978e3fcf638a1ceca45a223735db73f1607df66990feb56f
-
Filesize
136KB
MD51dc929b5f2cd12fe6a2fe71140d2a9e3
SHA1f9995a92bb201b1b7738a39a38570ef0c40b52d2
SHA256418aae1da62554afe9f260866267af328fd761b3fd6f90f0ea53d543e2fefc38
SHA512fbed011c595084548db440dfbe485b7d27032a44a6ae9e141fe43f31c8c524ff9347135ab035deb441fca99e5a3794f7bb9194f148aa2f60f1547a7c67d47373