Analysis
-
max time kernel
149s -
max time network
128s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240226-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240226-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
04-05-2024 10:10
Behavioral task
behavioral1
Sample
f57f99f56834d73211bac97f4ec2dc5c
Resource
ubuntu1804-amd64-20240226-en
General
-
Target
f57f99f56834d73211bac97f4ec2dc5c
-
Size
1.1MB
-
MD5
f57f99f56834d73211bac97f4ec2dc5c
-
SHA1
314fff2c301fb120ce100e812e3ef4b31580551d
-
SHA256
a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60
-
SHA512
c2785a0b3231ccd5c217f6ec38aa8ca3ece2cc3a3364a3271582ba49cf9ac8a5dfd163765c6284ba72c9bd4e711cc059ba328e6a7ad0b1adeb7e85447b9350a8
-
SSDEEP
24576:4vRE7caCfKGPqVEDNLFxKsfa1I+gIGYuuCol7r:4vREKfPqVE5jKsfa1RHGVo7r
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
Processes:
resource yara_rule /usr/bin/bsd-port/recei family_mrblack -
Executes dropped EXE 2 IoCs
Processes:
receioracleioc pid process /usr/bin/bsd-port/recei 1567 recei /usr/bin/oracle 1589 oracle -
Processes:
f57f99f56834d73211bac97f4ec2dc5creceidescription ioc process File opened for modification /etc/init.d/VsystemsshMmt f57f99f56834d73211bac97f4ec2dc5c File opened for modification /etc/init.d/selinux recei -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
Processes:
f57f99f56834d73211bac97f4ec2dc5cdescription ioc process File opened for reading /proc/net/route f57f99f56834d73211bac97f4ec2dc5c -
Write file to user bin folder 1 TTPs 8 IoCs
Processes:
f57f99f56834d73211bac97f4ec2dc5ccpreceicpcpcpcpdescription ioc process File opened for modification /usr/bin/bsd-port/udevd.conf f57f99f56834d73211bac97f4ec2dc5c File opened for modification /usr/bin/bsd-port/recei cp File opened for modification /usr/bin/bsd-port/recei.conf recei File opened for modification /usr/bin/oracle cp File opened for modification /usr/bin/dpkgd/ps cp File opened for modification /usr/bin/dpkgd/lsof cp File opened for modification /usr/bin/lsof cp File opened for modification /usr/bin/bsd-port/recei.conf f57f99f56834d73211bac97f4ec2dc5c -
Writes file to system bin folder 1 TTPs 1 IoCs
Processes:
cpdescription ioc process File opened for modification /bin/ps cp -
Checks CPU configuration 1 TTPs 2 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
f57f99f56834d73211bac97f4ec2dc5creceidescription ioc process File opened for reading /proc/cpuinfo f57f99f56834d73211bac97f4ec2dc5c File opened for reading /proc/cpuinfo recei -
Reads system network configuration 1 TTPs 4 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
f57f99f56834d73211bac97f4ec2dc5creceidescription ioc process File opened for reading /proc/net/arp f57f99f56834d73211bac97f4ec2dc5c File opened for reading /proc/net/dev f57f99f56834d73211bac97f4ec2dc5c File opened for reading /proc/net/dev recei File opened for reading /proc/net/route f57f99f56834d73211bac97f4ec2dc5c -
Reads runtime system information 17 IoCs
Reads data from /proc virtual filesystem.
Processes:
mkdircpmkdirreceif57f99f56834d73211bac97f4ec2dc5ccpinsmodmkdircpmkdircpcpinsmodmkdircpdescription ioc process File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/stat recei File opened for reading /proc/stat f57f99f56834d73211bac97f4ec2dc5c File opened for reading /proc/filesystems cp File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/meminfo recei File opened for reading /proc/filesystems mkdir File opened for reading /proc/meminfo f57f99f56834d73211bac97f4ec2dc5c File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp -
Writes file to tmp directory 8 IoCs
Malware often drops required files in the /tmp directory.
Processes:
f57f99f56834d73211bac97f4ec2dc5coracledescription ioc process File opened for modification /tmp/appd.conf f57f99f56834d73211bac97f4ec2dc5c File opened for modification /tmp/Dest.cfg f57f99f56834d73211bac97f4ec2dc5c File opened for modification /tmp/notify.file f57f99f56834d73211bac97f4ec2dc5c File opened for modification /tmp/conf.n f57f99f56834d73211bac97f4ec2dc5c File opened for modification /tmp/appd.log oracle File opened for modification /tmp/notify.file oracle File opened for modification /tmp/Dest.cfg oracle File opened for modification /tmp/appd.log f57f99f56834d73211bac97f4ec2dc5c
Processes
-
/tmp/f57f99f56834d73211bac97f4ec2dc5c/tmp/f57f99f56834d73211bac97f4ec2dc5c1⤵
- Modifies init.d
- Reads system routing table
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
- Writes file to tmp directory
PID:1536 -
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMmt /etc/rc1.d/S97VsystemsshMmt"2⤵PID:1551
-
/bin/lnln -s /etc/init.d/VsystemsshMmt /etc/rc1.d/S97VsystemsshMmt3⤵PID:1552
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMmt /etc/rc2.d/S97VsystemsshMmt"2⤵PID:1553
-
/bin/lnln -s /etc/init.d/VsystemsshMmt /etc/rc2.d/S97VsystemsshMmt3⤵PID:1554
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMmt /etc/rc3.d/S97VsystemsshMmt"2⤵PID:1555
-
/bin/lnln -s /etc/init.d/VsystemsshMmt /etc/rc3.d/S97VsystemsshMmt3⤵PID:1556
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMmt /etc/rc4.d/S97VsystemsshMmt"2⤵PID:1557
-
/bin/lnln -s /etc/init.d/VsystemsshMmt /etc/rc4.d/S97VsystemsshMmt3⤵PID:1558
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMmt /etc/rc5.d/S97VsystemsshMmt"2⤵PID:1559
-
/bin/lnln -s /etc/init.d/VsystemsshMmt /etc/rc5.d/S97VsystemsshMmt3⤵PID:1560
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"2⤵PID:1561
-
/bin/mkdirmkdir -p /usr/bin/bsd-port3⤵
- Reads runtime system information
PID:1562
-
-
-
/bin/shsh -c "cp -f /tmp/f57f99f56834d73211bac97f4ec2dc5c /usr/bin/bsd-port/recei"2⤵PID:1563
-
/bin/cpcp -f /tmp/f57f99f56834d73211bac97f4ec2dc5c /usr/bin/bsd-port/recei3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1564
-
-
-
/bin/shsh -c /usr/bin/bsd-port/recei2⤵PID:1566
-
/usr/bin/bsd-port/recei/usr/bin/bsd-port/recei3⤵
- Executes dropped EXE
- Modifies init.d
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
PID:1567 -
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"4⤵PID:1573
-
/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux5⤵PID:1574
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"4⤵PID:1575
-
/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux5⤵PID:1576
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"4⤵PID:1577
-
/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux5⤵PID:1578
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"4⤵PID:1579
-
/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux5⤵PID:1580
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"4⤵PID:1581
-
/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux5⤵PID:1582
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"4⤵PID:1583
-
/bin/mkdirmkdir -p /usr/bin/dpkgd5⤵
- Reads runtime system information
PID:1584
-
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"4⤵PID:1585
-
/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1586
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1593
-
/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1594
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/recei /bin/ps"4⤵PID:1595
-
/bin/cpcp -f /usr/bin/bsd-port/recei /bin/ps5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1597
-
-
-
/bin/shsh -c "chmod 0755 /bin/ps"4⤵PID:1598
-
/bin/chmodchmod 0755 /bin/ps5⤵PID:1599
-
-
-
/bin/shsh -c "cp -f /usr/bin/lsof /usr/bin/dpkgd/lsof"4⤵PID:1600
-
/bin/cpcp -f /usr/bin/lsof /usr/bin/dpkgd/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1601
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1603
-
/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1604
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/recei /usr/bin/lsof"4⤵PID:1605
-
/bin/cpcp -f /usr/bin/bsd-port/recei /usr/bin/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1606
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"4⤵PID:1607
-
/bin/chmodchmod 0755 /usr/bin/lsof5⤵PID:1608
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"4⤵PID:1609
-
/sbin/insmodinsmod /usr/lib/xpacket.ko5⤵
- Reads runtime system information
PID:1610
-
-
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"2⤵PID:1569
-
/bin/mkdirmkdir -p /usr/bin3⤵
- Reads runtime system information
PID:1570
-
-
-
/bin/shsh -c "cp -f /tmp/f57f99f56834d73211bac97f4ec2dc5c /usr/bin/oracle"2⤵PID:1571
-
/bin/cpcp -f /tmp/f57f99f56834d73211bac97f4ec2dc5c /usr/bin/oracle3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1572
-
-
-
/bin/shsh -c /usr/bin/oracle2⤵PID:1588
-
/usr/bin/oracle/usr/bin/oracle3⤵
- Executes dropped EXE
- Writes file to tmp directory
PID:1589
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"2⤵PID:1591
-
/sbin/insmodinsmod /usr/lib/xpacket.ko3⤵
- Reads runtime system information
PID:1592
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50B
MD5ac48e192ce6b235893e50c1a26bbb21e
SHA1a5e978664ec5bf735fe8bd17c5ff391eb3bca1fc
SHA2565b5a477e3e86e581aa3fd2cfa9db44cd8ff631df829fa13f5f006554a67a44fd
SHA512209691cd0d76f5462e91b96231b6c6ad605635b9614b66a62e11bf8f033577cb18fe993545308754c8026ceab7bfc690f4f4e1f94a244e2f7709ae2d7b8ca339
-
Filesize
36B
MD557cde9c165195cfb90c212057795ed49
SHA1d77d9895306eb09ad9b54588fb7998c79c671563
SHA2563e3488e9c63dfadffd594301e2192418b158238bfb8f83d6702123d72892cf36
SHA512de9af53a508167cbbb820a99c2742918ec5b8c83877b77e43e4b441019311685647f47fb4666ba53ecef4e6a2d5514eb67981d471ddf173b04848609b3c0c00d
-
Filesize
4B
MD5d1a69640d53a32a9fb13e93d1c8f3104
SHA1ad896e3ecf46771003093f24b88cd72af2225023
SHA2566a27eece1c1658b237aede5c6c2b8af51d235ca08b2f7963b67d99caa7a12395
SHA512100604d883bb248a24436fea1542cf81636e693256e0f0e8943c3cbdf7aa89bf759ddad050d1c3c487c07b00258dc0e6eefbc04d7109d7a788e2f8b98a9e3894
-
Filesize
37B
MD534f067f9c16045488cde0423f677db91
SHA1f68da0e6f11625d09829636593c0aa6b775e2eaa
SHA256f533d367aa85b7b278edc504daa15709520646f51bb2873e4156efc4916cf6a9
SHA512c3a817d3e5b6fe3ad0f0122cd58f349b16ed02a26f6fa325b911db58623a12b1cabbae1f17eeab2bc4d1643a4363d9a37264e3a029d6c5c0d599db2131e94563
-
Filesize
1.1MB
MD5f57f99f56834d73211bac97f4ec2dc5c
SHA1314fff2c301fb120ce100e812e3ef4b31580551d
SHA256a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60
SHA512c2785a0b3231ccd5c217f6ec38aa8ca3ece2cc3a3364a3271582ba49cf9ac8a5dfd163765c6284ba72c9bd4e711cc059ba328e6a7ad0b1adeb7e85447b9350a8
-
Filesize
159KB
MD5e093dc78225e2a0a25e3b137c1c1e442
SHA1c29497cfaae729eb576875e4fdfa400640ab16be
SHA2561190f4dbc7be174de8fd4096c9bf7a28eebfac937d308b7cc533be4a1240d26e
SHA512fe1cc7a65327732eaaee89f427c10239ba822430e34177842f4681068d78d404b1830d808a2a71b1efcc5f126c6d8c053512237421173aaa150e215a672da6f0
-
Filesize
130KB
MD5558edc26f8a38fa9788220b9af8a73e7
SHA13024d44e580e9c67f32f6c585d50e2a6cc9a7cac
SHA256b76435c80333d2c1fd18e0e7682f1c9dfb5da8d507e93e3c416f54b481c428d5
SHA512edaa425b441044f015e8f68fffa1664e42372d00dd0e7b0924d24ce947aa8e5f96b3bdc326fa2f8b978e3fcf638a1ceca45a223735db73f1607df66990feb56f