Analysis
-
max time kernel
0s -
max time network
34s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20240523-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
01-07-2024 13:44
Behavioral task
behavioral1
Sample
2024-07-01_73041d7b9a93d3cda76e2a052ac02e82_revil_sodinokibi
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
2024-07-01_73041d7b9a93d3cda76e2a052ac02e82_revil_sodinokibi
-
Size
102KB
-
MD5
73041d7b9a93d3cda76e2a052ac02e82
-
SHA1
f995852f291e2c946e15d20d020bb8e8defd317f
-
SHA256
776ea636ee33aab6b2db5f46889b027c297280db37400efb091e0d4a9001a7d7
-
SHA512
6f430874949362bf2d9d29153c0f9d0e5c53ea7bf69a44cf14c2627981d87ff0ad45fb12c26223dc33ceebf57b6113db37e347b2b4b2fa7ac037a63edc209371
-
SSDEEP
3072:db+XoBHfYu9gggwgggwgggwgggwggg2k+LoS:dphvo
Malware Config
Extracted
/tmp/systemd-private-2f7dc25f32a041608470b3e794ff7c76-systemd-resolved.service-0xCfsI/tmp/rhkrc-readme.txt
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/5BA9C4E55BA9C4E5
http://decoder.re/5BA9C4E55BA9C4E5
Signatures
-
Manipulates ESXi 2 IoCs
Manipulates ESXi.
pid Process 3658 awk 3656 sh -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads CPU attributes 1 TTPs 1 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/possible pkill -
Enumerates kernel/hardware configuration 1 TTPs 1 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
description ioc Process File opened for reading /sys/devices/system/node pkill -
Reads runtime system information 64 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/3644/cmdline pkill File opened for reading /proc/71/ctty pkill File opened for reading /proc/2843/ctty pkill File opened for reading /proc/31/cmdline pkill File opened for reading /proc/41/status pkill File opened for reading /proc/784/ctty pkill File opened for reading /proc/6/stat pkill File opened for reading /proc/24/ctty pkill File opened for reading /proc/3050/status pkill File opened for reading /proc/20/cgroup pkill File opened for reading /proc/2951/stat pkill File opened for reading /proc/383/stat pkill File opened for reading /proc/1125/stat pkill File opened for reading /proc/3141/status pkill File opened for reading /proc/3599/status pkill File opened for reading /proc/3645/status pkill File opened for reading /proc/31/stat pkill File opened for reading /proc/56/ctty pkill File opened for reading /proc/30/cgroup pkill File opened for reading /proc/123/cmdline pkill File opened for reading /proc/3050/cgroup pkill File opened for reading /proc/3/cgroup pkill File opened for reading /proc/27/cmdline pkill File opened for reading /proc/14/ctty pkill File opened for reading /proc/1092/status pkill File opened for reading /proc/3105/cgroup pkill File opened for reading /proc/3166/status pkill File opened for reading /proc/5/cgroup pkill File opened for reading /proc/13/status pkill File opened for reading /proc/200/stat pkill File opened for reading /proc/384/cgroup pkill File opened for reading /proc/202/cmdline pkill File opened for reading /proc/1053/status pkill File opened for reading /proc/3037/cgroup pkill File opened for reading /proc/593/ctty pkill File opened for reading /proc/1125/status pkill File opened for reading /proc/3110/stat pkill File opened for reading /proc/16/stat pkill File opened for reading /proc/195/cmdline pkill File opened for reading /proc/3404/stat pkill File opened for reading /proc/197/cgroup pkill File opened for reading /proc/3079/cmdline pkill File opened for reading /proc/1085/stat pkill File opened for reading /proc/1393/status pkill File opened for reading /proc/182/status pkill File opened for reading /proc/784/stat pkill File opened for reading /proc/182/cgroup pkill File opened for reading /proc/592/ctty pkill File opened for reading /proc/2830/stat pkill File opened for reading /proc/3269/stat pkill File opened for reading /proc/3291/cmdline pkill File opened for reading /proc/4/cgroup pkill File opened for reading /proc/45/status pkill File opened for reading /proc/56/status pkill File opened for reading /proc/792/ctty pkill File opened for reading /proc/1092/cgroup pkill File opened for reading /proc/2843/stat pkill File opened for reading /proc/3170/status pkill File opened for reading /proc/3417/stat pkill File opened for reading /proc/8/cgroup pkill File opened for reading /proc/25/ctty pkill File opened for reading /proc/792/cmdline pkill File opened for reading /proc/853/stat pkill File opened for reading /proc/34/status pkill -
Writes file to tmp directory 8 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/systemd-private-2f7dc25f32a041608470b3e794ff7c76-systemd-resolved.service-0xCfsI/rhkrc-readme.txt 2024-07-01_73041d7b9a93d3cda76e2a052ac02e82_revil_sodinokibi File opened for modification /tmp/systemd-private-2f7dc25f32a041608470b3e794ff7c76-systemd-logind.service-YfTO9O/tmp/rhkrc-readme.txt 2024-07-01_73041d7b9a93d3cda76e2a052ac02e82_revil_sodinokibi File opened for modification /tmp/systemd-private-2f7dc25f32a041608470b3e794ff7c76-systemd-logind.service-YfTO9O/rhkrc-readme.txt 2024-07-01_73041d7b9a93d3cda76e2a052ac02e82_revil_sodinokibi File opened for modification /tmp/systemd-private-2f7dc25f32a041608470b3e794ff7c76-ModemManager.service-mtizBM/tmp/rhkrc-readme.txt 2024-07-01_73041d7b9a93d3cda76e2a052ac02e82_revil_sodinokibi File opened for modification /tmp/systemd-private-2f7dc25f32a041608470b3e794ff7c76-ModemManager.service-mtizBM/rhkrc-readme.txt 2024-07-01_73041d7b9a93d3cda76e2a052ac02e82_revil_sodinokibi File opened for modification /tmp/2024-07-01_73041d7b9a93d3cda76e2a052ac02e82_revil_sodinokibi 2024-07-01_73041d7b9a93d3cda76e2a052ac02e82_revil_sodinokibi File opened for modification /tmp/systemd-private-2f7dc25f32a041608470b3e794ff7c76-power-profiles-daemon.service-YRMNao/tmp/rhkrc-readme.txt 2024-07-01_73041d7b9a93d3cda76e2a052ac02e82_revil_sodinokibi File opened for modification /tmp/systemd-private-2f7dc25f32a041608470b3e794ff7c76-systemd-resolved.service-0xCfsI/tmp/rhkrc-readme.txt 2024-07-01_73041d7b9a93d3cda76e2a052ac02e82_revil_sodinokibi
Processes
-
/tmp/2024-07-01_73041d7b9a93d3cda76e2a052ac02e82_revil_sodinokibi/tmp/2024-07-01_73041d7b9a93d3cda76e2a052ac02e82_revil_sodinokibi1⤵
- Writes file to tmp directory
PID:3646 -
/bin/shsh -c -- "uname -a && echo \" | \" && hostname"2⤵PID:3648
-
/usr/bin/unameuname -a3⤵PID:3649
-
-
/usr/bin/hostnamehostname3⤵PID:3650
-
-
-
/bin/shsh -c -- "uname -a && echo \" | \" && hostname"2⤵PID:3651
-
/usr/bin/unameuname -a3⤵PID:3652
-
-
/usr/bin/hostnamehostname3⤵PID:3653
-
-
-
/bin/shsh -c -- "pkill -9 vmx-*"2⤵PID:3654
-
/usr/bin/pkillpkill -9 "vmx-*"3⤵
- Reads CPU attributes
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:3655
-
-
-
/bin/shsh -c -- "esxcli --formatter=csv --format-param=fields==\"WorldID,DisplayName\" vm process list | awk -F \"\\\"*,\\\"*\" '{system(\"esxcli vm process kill --type=force --world-id=\" \$1)}'"2⤵
- Manipulates ESXi
PID:3656 -
/usr/bin/awkawk -F "\"*,\"*" "{system(\"esxcli vm process kill --type=force --world-id=\" \$1)}"3⤵
- Manipulates ESXi
PID:3658
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
/tmp/systemd-private-2f7dc25f32a041608470b3e794ff7c76-systemd-resolved.service-0xCfsI/tmp/rhkrc-readme.txt
Filesize2KB
MD50c415f3fcceb2b958692701e59e93ac1
SHA140098bf07bd0bb8bac95f0c6f184f0b286a17c25
SHA256d46966fc0e607814c372a81ee8ae327476955be6b3b79e24a10455e9a03ef36f
SHA51202bee19cdbe5af0f5ba5878db1998c17f0c413ce41f2160cd8977413bd0027404071781fe197f1c23cf434c623d8796feb37ed860bc56f289d301d1f1f5d2910