Analysis
-
max time kernel
149s -
max time network
150s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240226-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240226-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
05-05-2024 19:46
Behavioral task
behavioral1
Sample
6674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23.elf
Resource
ubuntu1804-amd64-20240226-en
General
-
Target
6674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23.elf
-
Size
1.1MB
-
MD5
7d1343b3ab670b162fb2ce8854f01167
-
SHA1
de95e608dd0e97d5eca90b6b6d747465980d4857
-
SHA256
6674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23
-
SHA512
22ff942fcaabe8a63919a53bf68642dd45943ef3c24e558b18d51ca5c4c0209be653ec268f9d0f64b5634e9dd3e32f7eacdb746fd2263907c0f8f33d89dd91be
-
SSDEEP
24576:4vRE7caCfKGPqVEDNLFxKsfawI+gIGYuuCol7r:4vREKfPqVE5jKsfawRHGVo7r
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
resource yara_rule behavioral1/files/fstream-4.dat family_mrblack -
Executes dropped EXE 2 IoCs
ioc pid Process /usr/bin/bsd-port/knerl 1570 knerl /usr/bin/pythno 1590 pythno -
description ioc Process File opened for modification /etc/init.d/VsystemsshMdt 6674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23.elf File opened for modification /etc/init.d/selinux knerl -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route 6674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23.elf -
Write file to user bin folder 1 TTPs 8 IoCs
description ioc Process File opened for modification /usr/bin/pythno cp File opened for modification /usr/bin/dpkgd/ps cp File opened for modification /usr/bin/dpkgd/lsof cp File opened for modification /usr/bin/lsof cp File opened for modification /usr/bin/bsd-port/knerl.conf 6674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23.elf File opened for modification /usr/bin/bsd-port/udevd.conf 6674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23.elf File opened for modification /usr/bin/bsd-port/knerl cp File opened for modification /usr/bin/bsd-port/knerl.conf knerl -
Writes file to system bin folder 1 TTPs 1 IoCs
description ioc Process File opened for modification /bin/ps cp -
Checks CPU configuration 1 TTPs 2 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo 6674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23.elf File opened for reading /proc/cpuinfo knerl -
Reads system network configuration 1 TTPs 4 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/dev 6674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23.elf File opened for reading /proc/net/dev knerl File opened for reading /proc/net/route 6674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23.elf File opened for reading /proc/net/arp 6674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23.elf -
Reads runtime system information 17 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/stat knerl File opened for reading /proc/filesystems mkdir File opened for reading /proc/meminfo 6674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23.elf File opened for reading /proc/filesystems cp File opened for reading /proc/stat 6674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23.elf File opened for reading /proc/filesystems cp File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/meminfo knerl -
Writes file to tmp directory 8 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/idus.log 6674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23.elf File opened for modification /tmp/apsh.conf 6674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23.elf File opened for modification /tmp/vga.conf 6674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23.elf File opened for modification /tmp/notify.file 6674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23.elf File opened for modification /tmp/conf.n 6674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23.elf File opened for modification /tmp/idus.log pythno File opened for modification /tmp/notify.file pythno File opened for modification /tmp/vga.conf pythno
Processes
-
/tmp/6674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23.elf/tmp/6674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23.elf1⤵
- Modifies init.d
- Reads system routing table
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
- Writes file to tmp directory
PID:1548 -
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMdt /etc/rc1.d/S97VsystemsshMdt"2⤵PID:1554
-
/bin/lnln -s /etc/init.d/VsystemsshMdt /etc/rc1.d/S97VsystemsshMdt3⤵PID:1555
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMdt /etc/rc2.d/S97VsystemsshMdt"2⤵PID:1556
-
/bin/lnln -s /etc/init.d/VsystemsshMdt /etc/rc2.d/S97VsystemsshMdt3⤵PID:1557
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMdt /etc/rc3.d/S97VsystemsshMdt"2⤵PID:1558
-
/bin/lnln -s /etc/init.d/VsystemsshMdt /etc/rc3.d/S97VsystemsshMdt3⤵PID:1559
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMdt /etc/rc4.d/S97VsystemsshMdt"2⤵PID:1560
-
/bin/lnln -s /etc/init.d/VsystemsshMdt /etc/rc4.d/S97VsystemsshMdt3⤵PID:1561
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMdt /etc/rc5.d/S97VsystemsshMdt"2⤵PID:1562
-
/bin/lnln -s /etc/init.d/VsystemsshMdt /etc/rc5.d/S97VsystemsshMdt3⤵PID:1563
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"2⤵PID:1564
-
/bin/mkdirmkdir -p /usr/bin/bsd-port3⤵
- Reads runtime system information
PID:1565
-
-
-
/bin/shsh -c "cp -f /tmp/6674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23.elf /usr/bin/bsd-port/knerl"2⤵PID:1566
-
/bin/cpcp -f /tmp/6674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23.elf /usr/bin/bsd-port/knerl3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1567
-
-
-
/bin/shsh -c /usr/bin/bsd-port/knerl2⤵PID:1569
-
/usr/bin/bsd-port/knerl/usr/bin/bsd-port/knerl3⤵
- Executes dropped EXE
- Modifies init.d
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
PID:1570 -
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"4⤵PID:1576
-
/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux5⤵PID:1577
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"4⤵PID:1578
-
/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux5⤵PID:1579
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"4⤵PID:1580
-
/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux5⤵PID:1581
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"4⤵PID:1582
-
/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux5⤵PID:1583
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"4⤵PID:1584
-
/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux5⤵PID:1585
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"4⤵PID:1586
-
/bin/mkdirmkdir -p /usr/bin/dpkgd5⤵
- Reads runtime system information
PID:1587
-
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"4⤵PID:1594
-
/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1595
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1597
-
/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1598
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/knerl /bin/ps"4⤵PID:1599
-
/bin/cpcp -f /usr/bin/bsd-port/knerl /bin/ps5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1600
-
-
-
/bin/shsh -c "chmod 0755 /bin/ps"4⤵PID:1602
-
/bin/chmodchmod 0755 /bin/ps5⤵PID:1603
-
-
-
/bin/shsh -c "cp -f /usr/bin/lsof /usr/bin/dpkgd/lsof"4⤵PID:1604
-
/bin/cpcp -f /usr/bin/lsof /usr/bin/dpkgd/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1605
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1607
-
/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1608
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/knerl /usr/bin/lsof"4⤵PID:1609
-
/bin/cpcp -f /usr/bin/bsd-port/knerl /usr/bin/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1610
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"4⤵PID:1611
-
/bin/chmodchmod 0755 /usr/bin/lsof5⤵PID:1612
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"4⤵PID:1614
-
/sbin/insmodinsmod /usr/lib/xpacket.ko5⤵
- Reads runtime system information
PID:1615
-
-
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"2⤵PID:1572
-
/bin/mkdirmkdir -p /usr/bin3⤵
- Reads runtime system information
PID:1573
-
-
-
/bin/shsh -c "cp -f /tmp/6674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23.elf /usr/bin/pythno"2⤵PID:1574
-
/bin/cpcp -f /tmp/6674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23.elf /usr/bin/pythno3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1575
-
-
-
/bin/shsh -c /usr/bin/pythno2⤵PID:1589
-
/usr/bin/pythno/usr/bin/pythno3⤵
- Executes dropped EXE
- Writes file to tmp directory
PID:1590
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"2⤵PID:1592
-
/sbin/insmodinsmod /usr/lib/xpacket.ko3⤵
- Reads runtime system information
PID:1593
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86B
MD562c50665d16111fd2bd429aee5e844c4
SHA1a20470136573862ad0b81e68d092466cf76f40a6
SHA25681561480ccebeb470642451dbf9e602dd0bc5e6819c1becf3f088e3816149e5b
SHA512afbc70357c51fbc720ee93ae18f301cbcde8eb401618b5371f39e485f733176378f174d8252df39f3b03d2fdd81ca3ae9ddd974f47eb70d07a1d42b8cf4ed36b
-
Filesize
36B
MD5caa27b819c9303446f702929874a00e8
SHA1d24199c0e376edea3f822b215148cc0dc78364bf
SHA256da9b535a14c6d9152857e211f14fb8da9056e84ba1b8d4dc27ab79c98264050b
SHA512dcd9413eb2cb24d77f637edfc00ca0bb42229a1a3b0d84e29eff94a7b91aee6ee8c126c286a4b4103e01834d1c6aec9de09ffab3927e8de8015421005f31446e
-
Filesize
4B
MD55129a5ddcd0dcd755232baa04c231698
SHA1b2a3625de074749ed626d2c2fdf5342d7757a850
SHA256e52522a505f68250e81747aa5386c5c60196c1680f1c89762ab1ab0fbaae39b8
SHA51227f36a56ba7f81569a7edcada4b457648cef41168a85cadf11c6e649295b110569e060047c624376a3dd8372edf153ae15c954cce7e308e8f826884a707d12c9
-
Filesize
73B
MD50400ed517c2462909168771fe1319605
SHA143fa6a8c8f217caaa72e1a6490d10e1fb5f3c7a2
SHA2561d1c633b317e28b55004bc325b33f4e466d08f26722d9b4618a3bb56971e0d99
SHA512d3535288a9ca00df00b27142fbc00a0f54dc8488830511f9fb3763413639eec71441f748e578e0900c5b0323de6261983f5dc0e34ed38a5b102cca81efc4a29f
-
Filesize
4B
MD5c88d8d0a6097754525e02c2246d8d27f
SHA141e842e76e8ea73f910aac95ea1ac9f0707643b2
SHA25675abf1771c0d9038e45203aa603758410f2418fd29b3fe0c25534009c579bb8e
SHA5121d6570970732ea371630b3616c00b9d65ff964eb564ac6858c4991e4d85fadc1082669fc0fd28af501cf6d08d9a253d46c1487abbbadce26c8d4934f26949f6b
-
Filesize
1.1MB
MD57d1343b3ab670b162fb2ce8854f01167
SHA1de95e608dd0e97d5eca90b6b6d747465980d4857
SHA2566674baf9b5ee9baf415ae92ed69b522bf1367cceb60cfd57ae7bc4b8e0677a23
SHA51222ff942fcaabe8a63919a53bf68642dd45943ef3c24e558b18d51ca5c4c0209be653ec268f9d0f64b5634e9dd3e32f7eacdb746fd2263907c0f8f33d89dd91be
-
Filesize
159KB
MD5e093dc78225e2a0a25e3b137c1c1e442
SHA1c29497cfaae729eb576875e4fdfa400640ab16be
SHA2561190f4dbc7be174de8fd4096c9bf7a28eebfac937d308b7cc533be4a1240d26e
SHA512fe1cc7a65327732eaaee89f427c10239ba822430e34177842f4681068d78d404b1830d808a2a71b1efcc5f126c6d8c053512237421173aaa150e215a672da6f0
-
Filesize
130KB
MD5558edc26f8a38fa9788220b9af8a73e7
SHA13024d44e580e9c67f32f6c585d50e2a6cc9a7cac
SHA256b76435c80333d2c1fd18e0e7682f1c9dfb5da8d507e93e3c416f54b481c428d5
SHA512edaa425b441044f015e8f68fffa1664e42372d00dd0e7b0924d24ce947aa8e5f96b3bdc326fa2f8b978e3fcf638a1ceca45a223735db73f1607df66990feb56f