Analysis
-
max time kernel
149s -
max time network
131s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240221-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240221-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
04-05-2024 20:29
Behavioral task
behavioral1
Sample
7d1343b3ab670b162fb2ce8854f01167.elf
Resource
ubuntu2004-amd64-20240221-en
General
-
Target
7d1343b3ab670b162fb2ce8854f01167.elf
-
Size
1.1MB
-
MD5
7d1343b3ab670b162fb2ce8854f01167
-
SHA1
de95e608dd0e97d5eca90b6b6d747465980d4857
-
SHA256
6674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23
-
SHA512
22ff942fcaabe8a63919a53bf68642dd45943ef3c24e558b18d51ca5c4c0209be653ec268f9d0f64b5634e9dd3e32f7eacdb746fd2263907c0f8f33d89dd91be
-
SSDEEP
24576:4vRE7caCfKGPqVEDNLFxKsfawI+gIGYuuCol7r:4vREKfPqVE5jKsfawRHGVo7r
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
resource yara_rule behavioral1/files/fstream-4.dat family_mrblack -
Executes dropped EXE 2 IoCs
ioc pid Process /usr/bin/bsd-port/knerl 1959 knerl /usr/bin/pythno 1983 pythno -
description ioc Process File opened for modification /etc/init.d/VsystemsshMdt 7d1343b3ab670b162fb2ce8854f01167.elf File opened for modification /etc/init.d/selinux knerl -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route 7d1343b3ab670b162fb2ce8854f01167.elf -
Write file to user bin folder 1 TTPs 9 IoCs
description ioc Process File opened for modification /usr/bin/bsd-port/knerl.conf knerl File opened for modification /usr/bin/pythno cp File opened for modification /usr/bin/ps cp File opened for modification /usr/bin/bsd-port/knerl.conf 7d1343b3ab670b162fb2ce8854f01167.elf File opened for modification /usr/bin/bsd-port/udevd.conf 7d1343b3ab670b162fb2ce8854f01167.elf File opened for modification /usr/bin/bsd-port/knerl cp File opened for modification /usr/bin/dpkgd/lsof cp File opened for modification /usr/bin/dpkgd/ps cp File opened for modification /usr/bin/lsof cp -
Writes file to system bin folder 1 TTPs 2 IoCs
description ioc Process File opened for modification /bin/lsof cp File opened for modification /bin/ps cp -
Checks CPU configuration 1 TTPs 2 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo 7d1343b3ab670b162fb2ce8854f01167.elf File opened for reading /proc/cpuinfo knerl -
Reads system network configuration 1 TTPs 4 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route 7d1343b3ab670b162fb2ce8854f01167.elf File opened for reading /proc/net/arp 7d1343b3ab670b162fb2ce8854f01167.elf File opened for reading /proc/net/dev knerl File opened for reading /proc/net/dev 7d1343b3ab670b162fb2ce8854f01167.elf -
Reads runtime system information 24 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/stat knerl File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems mkdir File opened for reading /proc/sys/kernel/version knerl File opened for reading /proc/filesystems mkdir File opened for reading /proc/meminfo 7d1343b3ab670b162fb2ce8854f01167.elf File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/sys/kernel/version 7d1343b3ab670b162fb2ce8854f01167.elf File opened for reading /proc/filesystems cp File opened for reading /proc/sys/kernel/version pythno File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/stat 7d1343b3ab670b162fb2ce8854f01167.elf File opened for reading /proc/filesystems cp File opened for reading /proc/meminfo knerl File opened for reading /proc/filesystems cp -
Writes file to tmp directory 8 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/idus.log 7d1343b3ab670b162fb2ce8854f01167.elf File opened for modification /tmp/apsh.conf 7d1343b3ab670b162fb2ce8854f01167.elf File opened for modification /tmp/vga.conf 7d1343b3ab670b162fb2ce8854f01167.elf File opened for modification /tmp/notify.file 7d1343b3ab670b162fb2ce8854f01167.elf File opened for modification /tmp/conf.n 7d1343b3ab670b162fb2ce8854f01167.elf File opened for modification /tmp/idus.log pythno File opened for modification /tmp/notify.file pythno File opened for modification /tmp/vga.conf pythno
Processes
-
/tmp/7d1343b3ab670b162fb2ce8854f01167.elf/tmp/7d1343b3ab670b162fb2ce8854f01167.elf1⤵
- Modifies init.d
- Reads system routing table
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
- Writes file to tmp directory
PID:1484 -
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMdt /etc/rc1.d/S97VsystemsshMdt"2⤵PID:1906
-
/usr/bin/lnln -s /etc/init.d/VsystemsshMdt /etc/rc1.d/S97VsystemsshMdt3⤵PID:1907
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMdt /etc/rc2.d/S97VsystemsshMdt"2⤵PID:1908
-
/usr/bin/lnln -s /etc/init.d/VsystemsshMdt /etc/rc2.d/S97VsystemsshMdt3⤵PID:1909
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMdt /etc/rc3.d/S97VsystemsshMdt"2⤵PID:1910
-
/usr/bin/lnln -s /etc/init.d/VsystemsshMdt /etc/rc3.d/S97VsystemsshMdt3⤵PID:1911
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMdt /etc/rc4.d/S97VsystemsshMdt"2⤵PID:1912
-
/usr/bin/lnln -s /etc/init.d/VsystemsshMdt /etc/rc4.d/S97VsystemsshMdt3⤵PID:1913
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMdt /etc/rc5.d/S97VsystemsshMdt"2⤵PID:1914
-
/usr/bin/lnln -s /etc/init.d/VsystemsshMdt /etc/rc5.d/S97VsystemsshMdt3⤵PID:1915
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"2⤵PID:1916
-
/usr/bin/mkdirmkdir -p /usr/bin/bsd-port3⤵
- Reads runtime system information
PID:1917
-
-
-
/bin/shsh -c "cp -f /tmp/7d1343b3ab670b162fb2ce8854f01167.elf /usr/bin/bsd-port/knerl"2⤵PID:1918
-
/usr/bin/cpcp -f /tmp/7d1343b3ab670b162fb2ce8854f01167.elf /usr/bin/bsd-port/knerl3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1919
-
-
-
/bin/shsh -c /usr/bin/bsd-port/knerl2⤵PID:1958
-
/usr/bin/bsd-port/knerl/usr/bin/bsd-port/knerl3⤵
- Executes dropped EXE
- Modifies init.d
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
PID:1959 -
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"4⤵PID:1967
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux5⤵PID:1968
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"4⤵PID:1969
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux5⤵PID:1970
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"4⤵PID:1971
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux5⤵PID:1972
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"4⤵PID:1973
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux5⤵PID:1974
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"4⤵PID:1975
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux5⤵PID:1976
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"4⤵PID:1977
-
/usr/bin/mkdirmkdir -p /usr/bin/dpkgd5⤵
- Reads runtime system information
PID:1978
-
-
-
/bin/shsh -c "cp -f /bin/lsof /usr/bin/dpkgd/lsof"4⤵PID:1979
-
/usr/bin/cpcp -f /bin/lsof /usr/bin/dpkgd/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1980
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1987
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1988
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/knerl /bin/lsof"4⤵PID:1989
-
/usr/bin/cpcp -f /usr/bin/bsd-port/knerl /bin/lsof5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1991
-
-
-
/bin/shsh -c "chmod 0755 /bin/lsof"4⤵PID:1994
-
/usr/bin/chmodchmod 0755 /bin/lsof5⤵PID:1995
-
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"4⤵PID:1997
-
/usr/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1999
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:2002
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:2003
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/knerl /bin/ps"4⤵PID:2004
-
/usr/bin/cpcp -f /usr/bin/bsd-port/knerl /bin/ps5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:2005
-
-
-
/bin/shsh -c "chmod 0755 /bin/ps"4⤵PID:2006
-
/usr/bin/chmodchmod 0755 /bin/ps5⤵PID:2007
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:2008
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:2009
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/knerl /usr/bin/lsof"4⤵PID:2010
-
/usr/bin/cpcp -f /usr/bin/bsd-port/knerl /usr/bin/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:2011
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"4⤵PID:2012
-
/usr/bin/chmodchmod 0755 /usr/bin/lsof5⤵PID:2013
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:2014
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:2015
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/knerl /usr/bin/ps"4⤵PID:2016
-
/usr/bin/cpcp -f /usr/bin/bsd-port/knerl /usr/bin/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:2017
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/ps"4⤵PID:2018
-
/usr/bin/chmodchmod 0755 /usr/bin/ps5⤵PID:2019
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"4⤵PID:2020
-
/usr/sbin/insmodinsmod /usr/lib/xpacket.ko5⤵
- Reads runtime system information
PID:2021
-
-
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"2⤵PID:1961
-
/usr/bin/mkdirmkdir -p /usr/bin3⤵
- Reads runtime system information
PID:1962
-
-
-
/bin/shsh -c "cp -f /tmp/7d1343b3ab670b162fb2ce8854f01167.elf /usr/bin/pythno"2⤵PID:1963
-
/usr/bin/cpcp -f /tmp/7d1343b3ab670b162fb2ce8854f01167.elf /usr/bin/pythno3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1964
-
-
-
/bin/shsh -c /usr/bin/pythno2⤵PID:1982
-
/usr/bin/pythno/usr/bin/pythno3⤵
- Executes dropped EXE
- Reads runtime system information
- Writes file to tmp directory
PID:1983
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"2⤵PID:1985
-
/usr/sbin/insmodinsmod /usr/lib/xpacket.ko3⤵
- Reads runtime system information
PID:1986
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54B
MD57437757cf8e37ddd08b9321e6e9373c3
SHA1d2c1823eee72a73bf4770d232e898a7f2c7f85c7
SHA2567a64bce85e9827750a044f5f7c3bb4251a1c383a8ad0489d33158cd1253b8643
SHA512b71b291888bd1d9db194b2d7bded73b7af6308d801346e1fc356746953a9da62f392ce55dc4eabd4b3476024562ababdaf1582a50e7eb4bf6c9f12f116d0e92b
-
Filesize
36B
MD5caa27b819c9303446f702929874a00e8
SHA1d24199c0e376edea3f822b215148cc0dc78364bf
SHA256da9b535a14c6d9152857e211f14fb8da9056e84ba1b8d4dc27ab79c98264050b
SHA512dcd9413eb2cb24d77f637edfc00ca0bb42229a1a3b0d84e29eff94a7b91aee6ee8c126c286a4b4103e01834d1c6aec9de09ffab3927e8de8015421005f31446e
-
Filesize
4B
MD51b36ea1c9b7a1c3ad668b8bb5df7963f
SHA1d0ee345e31f83883d76b54edd9964410adbd191b
SHA2564dea5c7cb70f50322ec9d734aa4aa078be9227c05251e18991c596f387552370
SHA5124bec3153d5ed9d21e831a83767a63fb41ae6e51694df7534c8ef8e82d44eeb965dbab80069a57a93548b58449b72eadad7074a61681f3b64e0cce096c141b41e
-
Filesize
41B
MD5b254bafba40c4198c282f6fb3e7631ef
SHA1209ff641f4b6e554a3173c93d66189ad70f400dd
SHA2562b69b6e6ab6121a26aa27b54d1dedf33011881861d02bafdd8542defb1abcb8e
SHA512d6988ca3a99fef0efed08bf3b57edc9c53f642b16751cf1ba5e6f450b14c45ae08989b8b8a41451abf792882b74b2ac8b4e1f11c813c1c880b22708af6b1af82
-
Filesize
4B
MD57fb8ceb3bd59c7956b1df66729296a4c
SHA1537337c8d4656d862c12e79427c9232b5b7d803e
SHA256c010bb0f7f8f335ccb2bc4e598eee48be11f87ac60a39a1a1cb4185688857003
SHA5124731a9abe7ec220f2b73db47054a367e934e19811077445d1d16a4d2c9b3829f1a49d07dc4652d497a83cd88026a7eb2fa13fb0b645f92caae21afa29f3557c3
-
Filesize
1.1MB
MD57d1343b3ab670b162fb2ce8854f01167
SHA1de95e608dd0e97d5eca90b6b6d747465980d4857
SHA2566674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23
SHA51222ff942fcaabe8a63919a53bf68642dd45943ef3c24e558b18d51ca5c4c0209be653ec268f9d0f64b5634e9dd3e32f7eacdb746fd2263907c0f8f33d89dd91be
-
Filesize
171KB
MD5061386937ec7acf924438a2643a32be0
SHA101a044b9e58839bea3e58c66cb32acc16241bf91
SHA2568a26bbae9eb85aa98ef29cfe5b0a291234db6eb394c3e0c2841983dcf7dda959
SHA5122de2e56ac4c32f47b4a1945ccfb0db378e6d59019ee8004e3e5d2ec8935efb5aa8ee14b8a0b21c61a267e195d42a3232a6dcade8720de06118fd579277f59db7
-
Filesize
134KB
MD5d194576b899af45b1d2a448612ec21e5
SHA1492f7d8f28cd4397ce22fcf0d8bf3304ea93465a
SHA256a8cf81f3a1137c999c3cf336507ce120b3065e633ade01db6280d427b7d986ca
SHA512b323babd9580b91772cde29c9f22ae75b27f5ce8ce0268a48ca41713c3545dd72409932a5c48f6af66ac6e43127eb5461d1f686bd667fa1b0e56a1564db3c539