Analysis
-
max time kernel
149s -
max time network
149s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240221-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240221-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
20-03-2024 02:37
Behavioral task
behavioral1
Sample
be9ce96a9612ff32bc0deae2ffed9f15116b644ec106d1906fe44a6776595291.elf
Resource
ubuntu2004-amd64-20240221-en
General
-
Target
be9ce96a9612ff32bc0deae2ffed9f15116b644ec106d1906fe44a6776595291.elf
-
Size
1.2MB
-
MD5
5ac9924723ee51a34999132cbd369213
-
SHA1
8bb17a17dc4a7885978c0161d7be2b0274a42466
-
SHA256
be9ce96a9612ff32bc0deae2ffed9f15116b644ec106d1906fe44a6776595291
-
SHA512
f0d1a0ca422c99b37c286b8d6b7b15ad48c6fc0991974623dfbe9c580499e868d36c771aa2d57b1784d515c4cc5524e846e20f5b252f6079b6f71c35c8ae389a
-
SSDEEP
24576:e845rGHu6gVJKG75oFpA0VWeX4R2y1q2rJp0:745vRVJKGtSA0VWeoIu9p0
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
resource yara_rule behavioral1/files/fstream-4.dat family_mrblack -
Executes dropped EXE 2 IoCs
ioc pid Process /usr/bin/bsd-port/getty 1842 getty /usr/bin/.sshd 1866 .sshd -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc File opened for reading /proc/cpuinfo -
description ioc File opened for modification /etc/init.d/DbSecuritySpt File opened for modification /etc/init.d/selinux -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc File opened for reading /proc/net/route -
Write file to user bin folder 1 TTPs 10 IoCs
description ioc Process File opened for modification /usr/bin/bsd-port/getty.lock Process not Found File opened for modification /usr/bin/bsd-port/udevd.lock Process not Found File opened for modification /usr/bin/bsd-port/getty cp File opened for modification /usr/bin/dpkgd/ps cp File opened for modification /usr/bin/lsof cp File opened for modification /usr/bin/ss cp File opened for modification /usr/bin/.sshd cp File opened for modification /usr/bin/dpkgd/lsof cp File opened for modification /usr/bin/dpkgd/ss cp File opened for modification /usr/bin/ps cp -
Writes file to system bin folder 1 TTPs 3 IoCs
description ioc Process File opened for modification /bin/ss cp File opened for modification /bin/lsof cp File opened for modification /bin/ps cp -
Reads system network configuration 1 TTPs 3 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc File opened for reading /proc/net/dev File opened for reading /proc/net/route File opened for reading /proc/net/arp -
Reads runtime system information 35 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/cmdline insmod File opened for reading /proc/sys/kernel/version be9ce96a9612ff32bc0deae2ffed9f15116b644ec106d1906fe44a6776595291.elf File opened for reading /proc/filesystems mkdir File opened for reading /proc/stat Process not Found File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/sys/kernel/version getty File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/sys/kernel/version .sshd File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/meminfo Process not Found File opened for reading /proc/filesystems mkdir -
Writes file to tmp directory 5 IoCs
Malware often drops required files in the /tmp directory.
description ioc File opened for modification /tmp/moni.lod File opened for modification /tmp/bill.lock File opened for modification /tmp/gates.lod File opened for modification /tmp/notify.file File opened for modification /tmp/conf.n
Processes
-
/tmp/be9ce96a9612ff32bc0deae2ffed9f15116b644ec106d1906fe44a6776595291.elf/tmp/be9ce96a9612ff32bc0deae2ffed9f15116b644ec106d1906fe44a6776595291.elf1⤵
- Reads runtime system information
PID:1482
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt"1⤵PID:1686
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt2⤵PID:1687
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt"1⤵PID:1688
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt2⤵PID:1689
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt"1⤵PID:1690
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt2⤵PID:1691
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt"1⤵PID:1692
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt2⤵PID:1693
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt"1⤵PID:1694
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt2⤵PID:1695
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"1⤵PID:1834
-
/usr/bin/mkdirmkdir -p /usr/bin/bsd-port2⤵
- Reads runtime system information
PID:1835
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"1⤵PID:1836
-
/usr/bin/mkdirmkdir -p /usr/bin/bsd-port2⤵
- Reads runtime system information
PID:1837
-
-
/bin/shsh -c "cp -f /tmp/be9ce96a9612ff32bc0deae2ffed9f15116b644ec106d1906fe44a6776595291.elf /usr/bin/bsd-port/getty"1⤵PID:1838
-
/usr/bin/cpcp -f /tmp/be9ce96a9612ff32bc0deae2ffed9f15116b644ec106d1906fe44a6776595291.elf /usr/bin/bsd-port/getty2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1839
-
-
/bin/shsh -c /usr/bin/bsd-port/getty1⤵PID:1841
-
/usr/bin/bsd-port/getty/usr/bin/bsd-port/getty2⤵
- Executes dropped EXE
- Reads runtime system information
PID:1842
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1844
-
/usr/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1845
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1846
-
/usr/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1847
-
-
/bin/shsh -c "cp -f /tmp/be9ce96a9612ff32bc0deae2ffed9f15116b644ec106d1906fe44a6776595291.elf /usr/bin/.sshd"1⤵PID:1848
-
/usr/bin/cpcp -f /tmp/be9ce96a9612ff32bc0deae2ffed9f15116b644ec106d1906fe44a6776595291.elf /usr/bin/.sshd2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1849
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"1⤵PID:1850
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux2⤵PID:1851
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"1⤵PID:1852
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux2⤵PID:1853
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"1⤵PID:1854
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux2⤵PID:1855
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"1⤵PID:1856
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux2⤵PID:1857
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"1⤵PID:1858
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux2⤵PID:1859
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"1⤵PID:1860
-
/usr/bin/mkdirmkdir -p /usr/bin/dpkgd2⤵
- Reads runtime system information
PID:1861
-
-
/bin/shsh -c "cp -f /bin/lsof /usr/bin/dpkgd/lsof"1⤵PID:1862
-
/usr/bin/cpcp -f /bin/lsof /usr/bin/dpkgd/lsof2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1863
-
-
/bin/shsh -c /usr/bin/.sshd1⤵PID:1865
-
/usr/bin/.sshd/usr/bin/.sshd2⤵
- Executes dropped EXE
- Reads runtime system information
PID:1866
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1867
-
/usr/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1868
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1869
-
/usr/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1870
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/lsof"1⤵PID:1871
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /bin/lsof2⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1872
-
-
/bin/shsh -c "chmod 0755 /bin/lsof"1⤵PID:1873
-
/usr/bin/chmodchmod 0755 /bin/lsof2⤵PID:1874
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"1⤵PID:1875
-
/usr/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1876
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1877
-
/usr/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1878
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1879
-
/usr/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1880
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ps"1⤵PID:1881
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ps2⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1882
-
-
/bin/shsh -c "chmod 0755 /bin/ps"1⤵PID:1883
-
/usr/bin/chmodchmod 0755 /bin/ps2⤵PID:1884
-
-
/bin/shsh -c "cp -f /bin/ss /usr/bin/dpkgd/ss"1⤵PID:1885
-
/usr/bin/cpcp -f /bin/ss /usr/bin/dpkgd/ss2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1886
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1887
-
/usr/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1888
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1889
-
/usr/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1890
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ss"1⤵PID:1891
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ss2⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1892
-
-
/bin/shsh -c "chmod 0755 /bin/ss"1⤵PID:1893
-
/usr/bin/chmodchmod 0755 /bin/ss2⤵PID:1894
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1895
-
/usr/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1896
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1897
-
/usr/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1898
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/lsof"1⤵PID:1899
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/lsof2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1900
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"1⤵PID:1901
-
/usr/bin/chmodchmod 0755 /usr/bin/lsof2⤵PID:1902
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1903
-
/usr/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1904
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1905
-
/usr/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1906
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/ps"1⤵PID:1907
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/ps2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1908
-
-
/bin/shsh -c "chmod 0755 /usr/bin/ps"1⤵PID:1909
-
/usr/bin/chmodchmod 0755 /usr/bin/ps2⤵PID:1910
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1911
-
/usr/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1912
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1913
-
/usr/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1914
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/ss"1⤵PID:1915
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/ss2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1916
-
-
/bin/shsh -c "chmod 0755 /usr/bin/ss"1⤵PID:1917
-
/usr/bin/chmodchmod 0755 /usr/bin/ss2⤵PID:1918
-
-
/bin/shsh -c "insmod /usr/bin/bsd-port/xpacket.ko"1⤵PID:2019
-
/usr/sbin/insmodinsmod /usr/bin/bsd-port/xpacket.ko2⤵
- Reads runtime system information
PID:2020
-
-
/bin/shsh -c "insmod /tmp/xpacket.ko"1⤵PID:2027
-
/usr/sbin/insmodinsmod /tmp/xpacket.ko2⤵
- Reads runtime system information
PID:2028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86B
MD52566e7cf0a924622be39a81c3cd496ac
SHA1a78a3a411636127b2f39f49423e3ff369ce7e0dd
SHA2563b4ac7b17cadf1647e3121b80b92393a0273989b413957e75b57094778bff5ee
SHA512abd318ea82a6aaaf5c6b233f104298ee2cac1fc7213a9843033cd95c4405b081e5fe927b8352710261ac2b0710e534958262ea74e1d777d08b22ba4ff7132366
-
Filesize
36B
MD5993cc15058142d96c3daf7852c3d5ee8
SHA10950b8b391b04dd3895ea33cd3141543ebd2525d
SHA2568171d077918611803d93088409f220c66fae1c670b297e1aa5d8cbd548ce9208
SHA5120c4256c00a3710f97e92581b552682b36b62afc35fe72622c491323c618c19ea62611ac04ccafc3dfcde2254a2ebbd93b69b66795b16e36332293bed83adb928
-
Filesize
4B
MD51714726c817af50457d810aae9d27a2e
SHA1bb7e0878197e923c50408c8cccedb73e9630a7f8
SHA256b3396bcb59674d33f54fa27c6d3855f647834cfcb75b4cb98f2d279c053e83ea
SHA51270fa8703e56acbd7fb729e72c30dcf49cb714a24d7f280b26c01a615decbdd3b64da51b7f74c0d66b68d5049a7198d7010c669d5f2609af96f0b56dd19c26152
-
Filesize
4B
MD50950ca92a4dcf426067cfd2246bb5ff3
SHA19ee53d1cec0d5e0348cb88f67155a25ff80635ec
SHA25680f8ded29fa2e922c77b98ea8f229ef65ea360daf5d1c9e05b80539e502b5621
SHA5120d8f218692cb4671899a2673af970a34b39e2fabba0a8ae53b4282804ed217dbfeb71a96756733b0f019b0640c292c427d1e0b4bc6f5cacdd252dd0d1c50abcc
-
Filesize
73B
MD571ac2431ef135ea0bb3a82deb9d83fa4
SHA1971275333911a515887072862df9543864d43cff
SHA256ac6016f4790b500a4500be5ef7e04d091c8955dab66aff13a2f5595ed6e4d88e
SHA512c34a7945abf442603d5c8875b76d928622423ffdedb0896809e049945303a8646982558343af216d4ad204002a3d11ebbc1cbc4ac096ec905e5e4951d612bc0e
-
Filesize
1.2MB
MD55ac9924723ee51a34999132cbd369213
SHA18bb17a17dc4a7885978c0161d7be2b0274a42466
SHA256be9ce96a9612ff32bc0deae2ffed9f15116b644ec106d1906fe44a6776595291
SHA512f0d1a0ca422c99b37c286b8d6b7b15ad48c6fc0991974623dfbe9c580499e868d36c771aa2d57b1784d515c4cc5524e846e20f5b252f6079b6f71c35c8ae389a
-
Filesize
171KB
MD5061386937ec7acf924438a2643a32be0
SHA101a044b9e58839bea3e58c66cb32acc16241bf91
SHA2568a26bbae9eb85aa98ef29cfe5b0a291234db6eb394c3e0c2841983dcf7dda959
SHA5122de2e56ac4c32f47b4a1945ccfb0db378e6d59019ee8004e3e5d2ec8935efb5aa8ee14b8a0b21c61a267e195d42a3232a6dcade8720de06118fd579277f59db7
-
Filesize
134KB
MD5d194576b899af45b1d2a448612ec21e5
SHA1492f7d8f28cd4397ce22fcf0d8bf3304ea93465a
SHA256a8cf81f3a1137c999c3cf336507ce120b3065e633ade01db6280d427b7d986ca
SHA512b323babd9580b91772cde29c9f22ae75b27f5ce8ce0268a48ca41713c3545dd72409932a5c48f6af66ac6e43127eb5461d1f686bd667fa1b0e56a1564db3c539
-
Filesize
164KB
MD551d83131b398a97dd38555ba57084721
SHA17d392a87f7db787dfa85fbcdf2a5ba6f0b59b4ed
SHA256e429f9d16a4cd64593b94dee8309a427fe8ca57765bf0d2e7b822efd123fe768
SHA512adc7137df75410c2535986c1e86c2e92e58f9bee70094f72f1f7adf3db125720ce281eb3f48474b0e192d672e96cbb1bc6e1ef6b26b10bf76a412c4516948216