Analysis
-
max time kernel
2s -
max time network
131s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240226-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240226-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
10-04-2024 11:11
General
-
Target
5b2a079690efb5f4e0944353dd883303ffd6bab4aad1f0c88b49a76ddcb28ee9
-
Size
22KB
-
MD5
3a2a08c0f98389d8def6fe82fcb3cc1b
-
SHA1
e935bbdc493017ff6b427d194c81063125705259
-
SHA256
5b2a079690efb5f4e0944353dd883303ffd6bab4aad1f0c88b49a76ddcb28ee9
-
SHA512
0201fd2d00b4fb473f1fb258d684fb7f1efa0e562b25da6cedb0c41642e49b6ee046cb19cd3d516b345042c17b1ad5d2e42bf173d5f13c479dd9b9e31c46a0b7
-
SSDEEP
384:ymdt7D0ogvSFafTZhePAp9phtIbMCfZSDFKteGGa0b0iFD8T5YYRqc2:yYt7D0oxPm7ubDRSDUeGgb0iF/ZB
Malware Config
Signatures
-
BPFDoor payload 1 IoCs
Processes:
resource yara_rule /dev/shm/kdmtmpflush family_bpfdoor_v1 -
Changes its process name 1 IoCs
Processes:
kdmtmpflushdescription ioc pid process Changes the process name, possibly in an attempt to hide itself hald-runner 1585 kdmtmpflush -
Creates Raw socket 1 IoCs
Creates a socket that captures raw packets at the device level
Processes:
pid 1586 -
Executes dropped EXE 1 IoCs
Processes:
kdmtmpflushioc pid process /dev/shm/kdmtmpflush 1585 kdmtmpflush -
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
cpdescription ioc process File opened for reading /proc/filesystems cp -
Writes file to shm directory 1 IoCs
Malware can drop malicious files in the shm directory which will run directly from RAM.
Processes:
cpdescription ioc process File opened for modification /dev/shm/kdmtmpflush cp
Processes
-
/tmp/5b2a079690efb5f4e0944353dd883303ffd6bab4aad1f0c88b49a76ddcb28ee9/tmp/5b2a079690efb5f4e0944353dd883303ffd6bab4aad1f0c88b49a76ddcb28ee91⤵PID:1578
-
/bin/shsh -c "/bin/rm -f /dev/shm/kdmtmpflush;/bin/cp /tmp/5b2a079690efb5f4e0944353dd883303ffd6bab4aad1f0c88b49a76ddcb28ee9 /dev/shm/kdmtmpflush && /bin/chmod 755 /dev/shm/kdmtmpflush && /dev/shm/kdmtmpflush --init && /bin/rm -f /dev/shm/kdmtmpflush"2⤵PID:1579
-
/bin/rm/bin/rm -f /dev/shm/kdmtmpflush3⤵PID:1580
-
-
/bin/cp/bin/cp /tmp/5b2a079690efb5f4e0944353dd883303ffd6bab4aad1f0c88b49a76ddcb28ee9 /dev/shm/kdmtmpflush3⤵
- Reads runtime system information
- Writes file to shm directory
PID:1583
-
-
/bin/chmod/bin/chmod 755 /dev/shm/kdmtmpflush3⤵PID:1584
-
-
/dev/shm/kdmtmpflush/dev/shm/kdmtmpflush --init3⤵
- Changes its process name
- Executes dropped EXE
PID:1585
-
-
/bin/rm/bin/rm -f /dev/shm/kdmtmpflush3⤵PID:1587
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD53a2a08c0f98389d8def6fe82fcb3cc1b
SHA1e935bbdc493017ff6b427d194c81063125705259
SHA2565b2a079690efb5f4e0944353dd883303ffd6bab4aad1f0c88b49a76ddcb28ee9
SHA5120201fd2d00b4fb473f1fb258d684fb7f1efa0e562b25da6cedb0c41642e49b6ee046cb19cd3d516b345042c17b1ad5d2e42bf173d5f13c479dd9b9e31c46a0b7