Overview
overview
10Static
static
7.rsync/a/a
ubuntu-20.04-amd64
10.rsync/a/init0
ubuntu-20.04-amd64
6.rsync/a/kswapd0
ubuntu-20.04-amd64
10.rsync/a/run
ubuntu-20.04-amd64
3.rsync/a/stop
ubuntu-20.04-amd64
10.rsync/b/a
ubuntu-20.04-amd64
7.rsync/b/run
ubuntu-20.04-amd64
7.rsync/b/stop
ubuntu-20.04-amd64
6.rsync/c/blitz
ubuntu-20.04-amd64
1.rsync/c/blitz32
ubuntu-20.04-amd64
3.rsync/c/blitz64
ubuntu-20.04-amd64
3.rsync/c/go
ubuntu-20.04-amd64
3.rsync/c/run
ubuntu-20.04-amd64
6.rsync/c/start
ubuntu-20.04-amd64
9.rsync/c/stop
ubuntu-20.04-amd64
6Analysis
-
max time kernel
600s -
max time network
601s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240221-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240221-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
15-04-2024 16:01
Behavioral task
behavioral1
Sample
.rsync/a/a
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral2
Sample
.rsync/a/init0
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral3
Sample
.rsync/a/kswapd0
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral4
Sample
.rsync/a/run
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral5
Sample
.rsync/a/stop
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral6
Sample
.rsync/b/a
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral7
Sample
.rsync/b/run
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral8
Sample
.rsync/b/stop
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral9
Sample
.rsync/c/blitz
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral10
Sample
.rsync/c/blitz32
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral11
Sample
.rsync/c/blitz64
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral12
Sample
.rsync/c/go
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral13
Sample
.rsync/c/run
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral14
Sample
.rsync/c/start
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral15
Sample
.rsync/c/stop
Resource
ubuntu2004-amd64-20240221-en
General
-
Target
.rsync/b/a
-
Size
157B
-
MD5
17dfec62acb9bc298bb333fbe391f486
-
SHA1
960fdc0a9c8dd4879c96ec76f69a9dedc6ec9795
-
SHA256
dc43fdfbb5f7e8ecc80353dcd85889c0c08483c99acbce35b3ed8f399c936920
-
SHA512
21d49249ca656d3f6ce7a77876796590ae66d31963a6cdf65bb294ca45372e68686f8f7fd846035ed53f1155962447a8054bf2ea081e02fbb4b3fa1b6e376881
Malware Config
Signatures
-
Changes its process name 2 IoCs
Processes:
perlperldescription ioc pid Process Changes the process name, possibly in an attempt to hide itself rsync 2010 perl Changes the process name, possibly in an attempt to hide itself rsync 2015 perl -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads CPU attributes 1 TTPs 19 IoCs
Processes:
pkillpkillpspspspspkillpkillpkillpkillpspspspspspkillpkillpkillpsdescription ioc Process File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online ps -
Reads runtime system information 64 IoCs
Reads data from /proc virtual filesystem.
Processes:
killallpspspspspskillallpkillpkillpskillallpspkillpspskillallkillallpkillpkillpskillallkillallpkillpkillpkilldescription ioc Process File opened for reading /proc/20/stat killall File opened for reading /proc/77/stat ps File opened for reading /proc/574/status ps File opened for reading /proc/505/stat ps File opened for reading /proc/1429/status ps File opened for reading /proc/1037/status ps File opened for reading /proc/263/cmdline ps File opened for reading /proc/1453/cmdline ps File opened for reading /proc/666/stat killall File opened for reading /proc/158/stat killall File opened for reading /proc/171/stat killall File opened for reading /proc/9/cmdline pkill File opened for reading /proc/75/cmdline pkill File opened for reading /proc/783/stat ps File opened for reading /proc/695/cmdline ps File opened for reading /proc/1093/status ps File opened for reading /proc/20/cmdline ps File opened for reading /proc/1453/stat killall File opened for reading /proc/1046/stat killall File opened for reading /proc/1502/status pkill File opened for reading /proc/4/status ps File opened for reading /proc/1413/cmdline ps File opened for reading /proc/921/status pkill File opened for reading /proc/118/status ps File opened for reading /proc/911/cmdline ps File opened for reading /proc/274/stat killall File opened for reading /proc/12/stat killall File opened for reading /proc/567/status ps File opened for reading /proc/445/status ps File opened for reading /proc/1414/status pkill File opened for reading /proc/89/status pkill File opened for reading /proc/12/status pkill File opened for reading /proc/24/cmdline ps File opened for reading /proc/445/cmdline ps File opened for reading /proc/1502/status ps File opened for reading /proc/1550/status ps File opened for reading /proc/1414/cmdline pkill File opened for reading /proc/1489/status pkill File opened for reading /proc/168/stat killall File opened for reading /proc/1101/stat killall File opened for reading /proc/1093/stat killall File opened for reading /proc/1476/stat killall File opened for reading /proc/1042/status ps File opened for reading /proc/918/cmdline pkill File opened for reading /proc/567/stat killall File opened for reading /proc/10/stat killall File opened for reading /proc/1418/status pkill File opened for reading /proc/177/cmdline pkill File opened for reading /proc/766/cmdline pkill File opened for reading /proc/118/cmdline ps File opened for reading /proc/1420/stat ps File opened for reading /proc/13/cmdline pkill File opened for reading /proc/695/stat killall File opened for reading /proc/537/cmdline pkill File opened for reading /proc/1101/cmdline ps File opened for reading /proc/1416/cmdline ps File opened for reading /proc/537/stat ps File opened for reading /proc/788/cmdline pkill File opened for reading /proc/1113/status pkill File opened for reading /proc/1012/stat ps File opened for reading /proc/445/stat ps File opened for reading /proc/960/status ps File opened for reading /proc/1420/cmdline pkill File opened for reading /proc/1420/cmdline pkill -
Writes file to tmp directory 3 IoCs
Malware often drops required files in the /tmp directory.
Processes:
astopdescription ioc Process File opened for modification /tmp/.rsync/b/dir.dir a File opened for modification /tmp/.rsync/b/sync a File opened for modification /tmp/.rsync/b/.out stop
Processes
-
/tmp/.rsync/b/a/tmp/.rsync/b/a1⤵
- Writes file to tmp directory
PID:1476 -
/usr/bin/catcat dir.dir2⤵PID:1477
-
-
/tmp/.rsync/b/stop./stop2⤵PID:1479
-
-
/usr/bin/chmodchmod u+x sync2⤵PID:1480
-
-
/usr/bin/chmodchmod u+x stop2⤵PID:1481
-
-
/usr/bin/chmodchmod u+x ps2⤵PID:1482
-
-
/usr/bin/chmodchmod u+x run2⤵PID:1483
-
-
/tmp/.rsync/b/run./run2⤵PID:1484
-
/usr/bin/sleepsleep 53⤵PID:1486
-
-
/usr/bin/nohupnohup ./stop3⤵PID:1485
-
-
/tmp/.rsync/b/stop./stop3⤵
- Writes file to tmp directory
PID:1485 -
/usr/bin/killallkillall -9 rsync4⤵
- Reads runtime system information
PID:1487
-
-
/usr/bin/killallkillall -9 sync4⤵
- Reads runtime system information
PID:1488
-
-
/usr/bin/killallkillall -9 perl4⤵
- Reads runtime system information
PID:1492
-
-
/usr/bin/killallkillall -9 ps4⤵
- Reads runtime system information
PID:1493
-
-
/usr/bin/killallkillall -9 pool4⤵
- Reads runtime system information
PID:1494
-
-
/usr/bin/killallkillall -9 nginx4⤵
- Reads runtime system information
PID:1495
-
-
/usr/bin/killallkillall -9 ecryptfs4⤵PID:1496
-
-
/usr/bin/killallkillall -9 xmr4⤵
- Reads runtime system information
PID:1497
-
-
/usr/bin/pkillpkill -9 ps4⤵
- Reads CPU attributes
PID:1498
-
-
/usr/bin/pkillpkill -9 pool4⤵
- Reads CPU attributes
- Reads runtime system information
PID:1499
-
-
/usr/bin/pkillpkill -9 nginx4⤵
- Reads CPU attributes
- Reads runtime system information
PID:1500
-
-
/usr/bin/pkillpkill -9 ecryptfs4⤵
- Reads CPU attributes
- Reads runtime system information
PID:1509
-
-
/usr/bin/pkillpkill -9 xmr4⤵
- Reads CPU attributes
- Reads runtime system information
PID:1511
-
-
/usr/bin/pkillpkill -9 sync4⤵
- Reads CPU attributes
- Reads runtime system information
PID:1512
-
-
/usr/bin/pkillpkill -9 rsync4⤵
- Reads CPU attributes
- Reads runtime system information
PID:1571
-
-
/usr/bin/pkillpkill -9 perl4⤵
- Reads CPU attributes
- Reads runtime system information
PID:1572
-
-
/usr/bin/pkillpkill -9 ps4⤵
- Reads CPU attributes
- Reads runtime system information
PID:1573
-
-
/usr/bin/rmrm -rf .proc .out4⤵PID:1574
-
-
-
/usr/bin/perlperl3⤵
- Changes its process name
PID:2010 -
/usr/local/sbin/unameuname -a4⤵PID:2011
-
-
/usr/local/bin/unameuname -a4⤵PID:2011
-
-
/usr/sbin/unameuname -a4⤵PID:2011
-
-
/usr/bin/unameuname -a4⤵PID:2011
-
-
-
/usr/bin/base64base64 --decode3⤵PID:2009
-
-
/usr/bin/perlperl3⤵
- Changes its process name
PID:2015 -
/usr/local/sbin/unameuname -a4⤵PID:2016
-
-
/usr/local/bin/unameuname -a4⤵PID:2016
-
-
/usr/sbin/unameuname -a4⤵PID:2016
-
-
/usr/bin/unameuname -a4⤵PID:2016
-
-
-
/usr/bin/base64base64 --decode3⤵PID:2014
-
-
-
/usr/bin/grepgrep -v grep1⤵PID:1516
-
/usr/bin/grepgrep ps1⤵PID:1515
-
/usr/bin/awkawk "{print \$1}"1⤵PID:1517
-
/usr/bin/psps x1⤵
- Reads CPU attributes
- Reads runtime system information
PID:1514
-
/usr/bin/awkawk "{print \$1}"1⤵PID:1526
-
/usr/bin/grepgrep -v grep1⤵PID:1525
-
/usr/bin/grepgrep sync1⤵PID:1524
-
/usr/bin/psps x1⤵
- Reads CPU attributes
- Reads runtime system information
PID:1523
-
/usr/bin/grepgrep nginx1⤵PID:1529
-
/usr/bin/awkawk "{print \$1}"1⤵PID:1531
-
/usr/bin/grepgrep -v grep1⤵PID:1530
-
/usr/bin/psps x1⤵
- Reads CPU attributes
- Reads runtime system information
PID:1528
-
/usr/bin/awkawk "{print \$1}"1⤵PID:1539
-
/usr/bin/grepgrep -v grep1⤵PID:1538
-
/usr/bin/grepgrep ecryptfs1⤵PID:1537
-
/usr/bin/psps x1⤵
- Reads CPU attributes
- Reads runtime system information
PID:1536
-
/usr/bin/awkawk "{print \$1}"1⤵PID:1544
-
/usr/bin/grepgrep -v grep1⤵PID:1543
-
/usr/bin/grepgrep xmr1⤵PID:1542
-
/usr/bin/psps x1⤵
- Reads CPU attributes
- Reads runtime system information
PID:1541
-
/usr/bin/grepgrep -v grep1⤵PID:1550
-
/usr/bin/awkawk "{print \$1}"1⤵PID:1551
-
/usr/bin/grepgrep perl1⤵PID:1549
-
/usr/bin/psps x1⤵
- Reads CPU attributes
- Reads runtime system information
PID:1548
-
/usr/bin/psps x1⤵
- Reads CPU attributes
- Reads runtime system information
PID:1554
-
/usr/bin/grepgrep rsync1⤵PID:1555
-
/usr/bin/grepgrep -v grep1⤵PID:1556
-
/usr/bin/awkawk "{print \$1}"1⤵PID:1557
-
/usr/bin/grepgrep rsync1⤵PID:1560
-
/usr/bin/awkawk "{print \$2}"1⤵PID:1561
-
/usr/bin/psps -ef1⤵
- Reads CPU attributes
- Reads runtime system information
PID:1559
-
/usr/bin/grepgrep sync1⤵PID:1565
-
/usr/bin/awkawk "{print \$2}"1⤵PID:1566
-
/usr/bin/psps -ef1⤵
- Reads CPU attributes
- Reads runtime system information
PID:1564
-
/usr/bin/awkawk "{print \$2}"1⤵PID:1570
-
/usr/bin/grepgrep ps1⤵PID:1569
-
/usr/bin/psps -ef1⤵
- Reads CPU attributes
- Reads runtime system information
PID:1568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14B
MD5e21fb1889e57316ccbd97f98e1282a54
SHA1ee8de521fb7ae11f81615ce31a45b5f7a79feee8
SHA2568e0465a977658aca8fe06bec84742ed7c298db88cba64fc87de85409c6c909e8
SHA5123ac5bf18363442ea8e4f478b2595a5e13199d80378c82f2ffeacb03cf64cf30c5e82c9a618d2a0f2d9d5386aeb1576e154e654eb20fc6967a43472f3f5047445
-
Filesize
33B
MD5a0eea5d0b1c4743cc7b8c798399581e0
SHA1bf30ba5824c9ec612aa4654eb895e3cb738b4e18
SHA2567602dd04cbfa214345d0ae0b2ee26ed6475ea4d9053575cb99e29b956f536d0e
SHA5129e70bc0608f42b83712d5e2911d21e6ab627c830d0ae4b8fa5e0eeea6555bc4cce49d7fafdea28a1888b55b28461cab34153dee3746bc084c1e8a296f849d06f