Analysis
-
max time kernel
149s -
max time network
147s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240221-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240221-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
05-05-2024 19:48
Behavioral task
behavioral1
Sample
a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elf
Resource
ubuntu2004-amd64-20240221-en
General
-
Target
a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elf
-
Size
1.1MB
-
MD5
f57f99f56834d73211bac97f4ec2dc5c
-
SHA1
314fff2c301fb120ce100e812e3ef4b31580551d
-
SHA256
a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60
-
SHA512
c2785a0b3231ccd5c217f6ec38aa8ca3ece2cc3a3364a3271582ba49cf9ac8a5dfd163765c6284ba72c9bd4e711cc059ba328e6a7ad0b1adeb7e85447b9350a8
-
SSDEEP
24576:4vRE7caCfKGPqVEDNLFxKsfa1I+gIGYuuCol7r:4vREKfPqVE5jKsfa1RHGVo7r
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
Processes:
resource yara_rule /usr/bin/bsd-port/recei family_mrblack -
Executes dropped EXE 2 IoCs
Processes:
receioracleioc pid process /usr/bin/bsd-port/recei 1956 recei /usr/bin/oracle 1985 oracle -
Processes:
a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elfreceidescription ioc process File opened for modification /etc/init.d/VsystemsshMmt a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elf File opened for modification /etc/init.d/selinux recei -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
Processes:
a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elfdescription ioc process File opened for reading /proc/net/route a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elf -
Write file to user bin folder 1 TTPs 9 IoCs
Processes:
a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elfcpcpcpcpreceicpcpdescription ioc process File opened for modification /usr/bin/bsd-port/recei.conf a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elf File opened for modification /usr/bin/bsd-port/recei cp File opened for modification /usr/bin/oracle cp File opened for modification /usr/bin/dpkgd/lsof cp File opened for modification /usr/bin/lsof cp File opened for modification /usr/bin/bsd-port/udevd.conf a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elf File opened for modification /usr/bin/bsd-port/recei.conf recei File opened for modification /usr/bin/dpkgd/ps cp File opened for modification /usr/bin/ps cp -
Writes file to system bin folder 1 TTPs 2 IoCs
Processes:
cpcpdescription ioc process File opened for modification /bin/lsof cp File opened for modification /bin/ps cp -
Checks CPU configuration 1 TTPs 2 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
receia7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elfdescription ioc process File opened for reading /proc/cpuinfo recei File opened for reading /proc/cpuinfo a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elf -
Reads system network configuration 1 TTPs 4 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elfreceidescription ioc process File opened for reading /proc/net/dev a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elf File opened for reading /proc/net/route a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elf File opened for reading /proc/net/arp a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elf File opened for reading /proc/net/dev recei -
Reads runtime system information 24 IoCs
Reads data from /proc virtual filesystem.
Processes:
cpmkdira7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elfreceimkdiroracleinsmodcpcpmkdircpmkdircpmkdirinsmodmkdircpcpmkdircpdescription ioc process File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/meminfo a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elf File opened for reading /proc/sys/kernel/version recei File opened for reading /proc/filesystems mkdir File opened for reading /proc/sys/kernel/version oracle File opened for reading /proc/stat a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elf File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/stat recei File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/meminfo recei File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/sys/kernel/version a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elf -
Writes file to tmp directory 8 IoCs
Malware often drops required files in the /tmp directory.
Processes:
a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elforacledescription ioc process File opened for modification /tmp/notify.file a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elf File opened for modification /tmp/conf.n a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elf File opened for modification /tmp/appd.log oracle File opened for modification /tmp/notify.file oracle File opened for modification /tmp/Dest.cfg oracle File opened for modification /tmp/appd.log a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elf File opened for modification /tmp/appd.conf a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elf File opened for modification /tmp/Dest.cfg a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elf
Processes
-
/tmp/a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elf/tmp/a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elf1⤵
- Modifies init.d
- Reads system routing table
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
- Writes file to tmp directory
PID:1469 -
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMmt /etc/rc1.d/S97VsystemsshMmt"2⤵PID:1902
-
/usr/bin/lnln -s /etc/init.d/VsystemsshMmt /etc/rc1.d/S97VsystemsshMmt3⤵PID:1903
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMmt /etc/rc2.d/S97VsystemsshMmt"2⤵PID:1904
-
/usr/bin/lnln -s /etc/init.d/VsystemsshMmt /etc/rc2.d/S97VsystemsshMmt3⤵PID:1905
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMmt /etc/rc3.d/S97VsystemsshMmt"2⤵PID:1906
-
/usr/bin/lnln -s /etc/init.d/VsystemsshMmt /etc/rc3.d/S97VsystemsshMmt3⤵PID:1907
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMmt /etc/rc4.d/S97VsystemsshMmt"2⤵PID:1908
-
/usr/bin/lnln -s /etc/init.d/VsystemsshMmt /etc/rc4.d/S97VsystemsshMmt3⤵PID:1909
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMmt /etc/rc5.d/S97VsystemsshMmt"2⤵PID:1910
-
/usr/bin/lnln -s /etc/init.d/VsystemsshMmt /etc/rc5.d/S97VsystemsshMmt3⤵PID:1911
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"2⤵PID:1912
-
/usr/bin/mkdirmkdir -p /usr/bin/bsd-port3⤵
- Reads runtime system information
PID:1913
-
-
-
/bin/shsh -c "cp -f /tmp/a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elf /usr/bin/bsd-port/recei"2⤵PID:1914
-
/usr/bin/cpcp -f /tmp/a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elf /usr/bin/bsd-port/recei3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1915
-
-
-
/bin/shsh -c /usr/bin/bsd-port/recei2⤵PID:1955
-
/usr/bin/bsd-port/recei/usr/bin/bsd-port/recei3⤵
- Executes dropped EXE
- Modifies init.d
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
PID:1956 -
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"4⤵PID:1968
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux5⤵PID:1969
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"4⤵PID:1970
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux5⤵PID:1971
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"4⤵PID:1972
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux5⤵PID:1973
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"4⤵PID:1974
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux5⤵PID:1975
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"4⤵PID:1976
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux5⤵PID:1977
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"4⤵PID:1978
-
/usr/bin/mkdirmkdir -p /usr/bin/dpkgd5⤵
- Reads runtime system information
PID:1979
-
-
-
/bin/shsh -c "cp -f /bin/lsof /usr/bin/dpkgd/lsof"4⤵PID:1980
-
/usr/bin/cpcp -f /bin/lsof /usr/bin/dpkgd/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1981
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1982
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1988
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/recei /bin/lsof"4⤵PID:1990
-
/usr/bin/cpcp -f /usr/bin/bsd-port/recei /bin/lsof5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1991
-
-
-
/bin/shsh -c "chmod 0755 /bin/lsof"4⤵PID:1993
-
/usr/bin/chmodchmod 0755 /bin/lsof5⤵PID:1995
-
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"4⤵PID:1997
-
/usr/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1999
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:2002
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:2004
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/recei /bin/ps"4⤵PID:2005
-
/usr/bin/cpcp -f /usr/bin/bsd-port/recei /bin/ps5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:2006
-
-
-
/bin/shsh -c "chmod 0755 /bin/ps"4⤵PID:2007
-
/usr/bin/chmodchmod 0755 /bin/ps5⤵PID:2008
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:2009
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:2010
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/recei /usr/bin/lsof"4⤵PID:2011
-
/usr/bin/cpcp -f /usr/bin/bsd-port/recei /usr/bin/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:2012
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"4⤵PID:2013
-
/usr/bin/chmodchmod 0755 /usr/bin/lsof5⤵PID:2014
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:2015
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:2016
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/recei /usr/bin/ps"4⤵PID:2017
-
/usr/bin/cpcp -f /usr/bin/bsd-port/recei /usr/bin/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:2018
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/ps"4⤵PID:2019
-
/usr/bin/chmodchmod 0755 /usr/bin/ps5⤵PID:2020
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"4⤵PID:2021
-
/usr/sbin/insmodinsmod /usr/lib/xpacket.ko5⤵
- Reads runtime system information
PID:2022
-
-
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"2⤵PID:1958
-
/usr/bin/mkdirmkdir -p /usr/bin3⤵
- Reads runtime system information
PID:1959
-
-
-
/bin/shsh -c "cp -f /tmp/a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elf /usr/bin/oracle"2⤵PID:1960
-
/usr/bin/cpcp -f /tmp/a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60.elf /usr/bin/oracle3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1961
-
-
-
/bin/shsh -c /usr/bin/oracle2⤵PID:1984
-
/usr/bin/oracle/usr/bin/oracle3⤵
- Executes dropped EXE
- Reads runtime system information
- Writes file to tmp directory
PID:1985
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"2⤵PID:1987
-
/usr/sbin/insmodinsmod /usr/lib/xpacket.ko3⤵
- Reads runtime system information
PID:1989
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86B
MD594441f26a96fed150c54c0730980e833
SHA1fd7c55a6d22e821e8d16f3ff7071e5543eb952af
SHA25694806a3bb573a02242cbcc3a39def2f453d13d4cd5ff2e70182e1e7274fcf19a
SHA512a2d8c41534d13ce651bdf56d25216eee11f045fcc4c12906b29cb259152750d598171fa9051eb52c629e1742bf5366b915d94c9b05ce11679112e9e8ae9e6c64
-
Filesize
36B
MD557cde9c165195cfb90c212057795ed49
SHA1d77d9895306eb09ad9b54588fb7998c79c671563
SHA2563e3488e9c63dfadffd594301e2192418b158238bfb8f83d6702123d72892cf36
SHA512de9af53a508167cbbb820a99c2742918ec5b8c83877b77e43e4b441019311685647f47fb4666ba53ecef4e6a2d5514eb67981d471ddf173b04848609b3c0c00d
-
Filesize
4B
MD542ffcf057e133f94c1b7b5cf543ef3bd
SHA12e8d241fa2ca9957d1b8fab2a3d479f07a2c963b
SHA25657fb0303e4a6845cd7a1484ee9773c218975e9c9a763114e668259498cad2f30
SHA51212982a6930795eb2ab22c73a1be4a057d7b041aa16cb9c92d2a4ba99be34082dadb7411a553af4fef6b734aec660eee394b975f06ef34091139334a98b9ad9ca
-
Filesize
73B
MD5fbd31737dca441cd054904845fe35f96
SHA137d9a9392ceb7d28bf399491e3d08701b44bbb85
SHA256a5d433d18ca0be1eda233343ce1b7864e8c0fb8560e592047663bbea9c52948a
SHA5122f3ff8f59b15c4dbb939749fbe585a78ab7fa69addbf28d561815c692c36ec51b70e46e3393d02cebc48ac40098fac25f2a6c81f763c684ce4863efae813381b
-
Filesize
1.1MB
MD5f57f99f56834d73211bac97f4ec2dc5c
SHA1314fff2c301fb120ce100e812e3ef4b31580551d
SHA256a7d548bcb9a58a58b5dfb9f059b302131fc0107a094f1fbb53c7d525b9327b60
SHA512c2785a0b3231ccd5c217f6ec38aa8ca3ece2cc3a3364a3271582ba49cf9ac8a5dfd163765c6284ba72c9bd4e711cc059ba328e6a7ad0b1adeb7e85447b9350a8
-
Filesize
171KB
MD5061386937ec7acf924438a2643a32be0
SHA101a044b9e58839bea3e58c66cb32acc16241bf91
SHA2568a26bbae9eb85aa98ef29cfe5b0a291234db6eb394c3e0c2841983dcf7dda959
SHA5122de2e56ac4c32f47b4a1945ccfb0db378e6d59019ee8004e3e5d2ec8935efb5aa8ee14b8a0b21c61a267e195d42a3232a6dcade8720de06118fd579277f59db7
-
Filesize
134KB
MD5d194576b899af45b1d2a448612ec21e5
SHA1492f7d8f28cd4397ce22fcf0d8bf3304ea93465a
SHA256a8cf81f3a1137c999c3cf336507ce120b3065e633ade01db6280d427b7d986ca
SHA512b323babd9580b91772cde29c9f22ae75b27f5ce8ce0268a48ca41713c3545dd72409932a5c48f6af66ac6e43127eb5461d1f686bd667fa1b0e56a1564db3c539