Malware Analysis Report

2025-01-23 14:51

Sample ID 240830-wj2xjsxhpq
Target exe3
SHA256 18e2b7df374a838a57ebf3186b13a26e523cf964afde50b7ba765ed4d5509670
Tags
antivm evasion
score
6/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
6/10

SHA256

18e2b7df374a838a57ebf3186b13a26e523cf964afde50b7ba765ed4d5509670

Threat Level: Shows suspicious behavior

The file exe3 was found to be: Shows suspicious behavior.

Malicious Activity Summary

antivm evasion

Checks mountinfo of local process

Reads hardware information

Reads list of loaded kernel modules

Checks CPU configuration

Enumerates kernel/hardware configuration

Reads runtime system information

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-30 17:57

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-30 17:57

Reported

2024-08-30 18:00

Platform

ubuntu1804-amd64-20240729-en

Max time kernel

140s

Max time network

148s

Command Line

[/tmp/exe3]

Signatures

Checks mountinfo of local process

antivm
Description Indicator Process Target
File opened for reading /proc/1/mountinfo /tmp/exe3 N/A

Reads hardware information

Description Indicator Process Target
File opened for reading /sys/class/dmi/id/product_uuid /tmp/exe3 N/A

Reads list of loaded kernel modules

evasion
Description Indicator Process Target
File opened for reading /proc/modules /tmp/exe3 N/A

Checks CPU configuration

antivm
Description Indicator Process Target
File opened for reading /proc/cpuinfo /tmp/exe3 N/A

Enumerates kernel/hardware configuration

Description Indicator Process Target
File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size /tmp/exe3 N/A

Reads runtime system information

Description Indicator Process Target
File opened for reading /proc/stat /tmp/exe3 N/A
File opened for reading /proc/bus/pci/devices /tmp/exe3 N/A
File opened for reading /proc/self/status /tmp/exe3 N/A
File opened for reading /proc/1/environ /tmp/exe3 N/A
File opened for reading /proc/self/cgroup /tmp/exe3 N/A
File opened for reading /proc/filesystems /tmp/exe3 N/A
File opened for reading /proc/1/stat /tmp/exe3 N/A
File opened for reading /proc/1/comm /tmp/exe3 N/A

Processes

/tmp/exe3

[/tmp/exe3]

Network

Country Destination Domain Proto
GB 185.125.188.62:443 tcp
GB 185.125.188.62:443 tcp
US 151.101.65.91:443 tcp
US 151.101.65.91:443 tcp
CN 47.94.20.102:443 tcp
N/A 224.0.0.251:5353 udp
GB 84.17.50.9:443 tcp
CN 101.201.69.42:443 tcp
CN 47.94.202.137:443 tcp
CN 47.94.193.44:443 tcp
CN 47.94.227.15:443 tcp
CN 47.94.20.102:443 tcp
CN 101.201.69.42:443 tcp
CN 47.94.202.137:443 tcp
CN 47.94.193.44:443 tcp
CN 47.94.227.15:443 tcp
CN 47.94.20.102:443 tcp
CN 101.201.69.42:443 tcp
CN 47.94.202.137:443 tcp
CN 47.94.193.44:443 tcp
CN 47.94.227.15:443 tcp

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-30 17:57

Reported

2024-08-30 18:00

Platform

ubuntu2004-amd64-20240611-en

Max time kernel

140s

Max time network

149s

Command Line

[/tmp/exe3]

Signatures

Checks mountinfo of local process

antivm
Description Indicator Process Target
File opened for reading /proc/1/mountinfo /tmp/exe3 N/A

Reads hardware information

Description Indicator Process Target
File opened for reading /sys/class/dmi/id/product_uuid /tmp/exe3 N/A

Reads list of loaded kernel modules

evasion
Description Indicator Process Target
File opened for reading /proc/modules /tmp/exe3 N/A

Checks CPU configuration

antivm
Description Indicator Process Target
File opened for reading /proc/cpuinfo /tmp/exe3 N/A

Enumerates kernel/hardware configuration

Description Indicator Process Target
File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size /tmp/exe3 N/A

Reads runtime system information

Description Indicator Process Target
File opened for reading /proc/1/comm /tmp/exe3 N/A
File opened for reading /proc/stat /tmp/exe3 N/A
File opened for reading /proc/bus/pci/devices /tmp/exe3 N/A
File opened for reading /proc/self/status /tmp/exe3 N/A
File opened for reading /proc/1/environ /tmp/exe3 N/A
File opened for reading /proc/self/cgroup /tmp/exe3 N/A
File opened for reading /proc/filesystems /tmp/exe3 N/A
File opened for reading /proc/1/stat /tmp/exe3 N/A

Processes

/tmp/exe3

[/tmp/exe3]

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
CN 47.94.20.102:443 tcp
US 1.1.1.1:53 connectivity-check.ubuntu.com udp
CN 101.201.69.42:443 tcp
CN 47.94.202.137:443 tcp
CN 47.94.193.44:443 tcp
CN 47.94.227.15:443 tcp
CN 47.94.20.102:443 tcp
CN 101.201.69.42:443 tcp
CN 47.94.202.137:443 tcp
CN 47.94.193.44:443 tcp
CN 47.94.227.15:443 tcp
CN 47.94.20.102:443 tcp
CN 101.201.69.42:443 tcp
CN 47.94.202.137:443 tcp
CN 47.94.193.44:443 tcp
US 1.1.1.1:53 connectivity-check.ubuntu.com udp
CN 47.94.227.15:443 tcp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-08-30 17:57

Reported

2024-08-30 18:00

Platform

ubuntu2204-amd64-20240522.1-en

Max time kernel

140s

Max time network

148s

Command Line

[/tmp/exe3]

Signatures

Checks mountinfo of local process

antivm
Description Indicator Process Target
File opened for reading /proc/1/mountinfo /tmp/exe3 N/A

Reads hardware information

Description Indicator Process Target
File opened for reading /sys/class/dmi/id/product_uuid /tmp/exe3 N/A

Reads list of loaded kernel modules

evasion
Description Indicator Process Target
File opened for reading /proc/modules /tmp/exe3 N/A

Checks CPU configuration

antivm
Description Indicator Process Target
File opened for reading /proc/cpuinfo /tmp/exe3 N/A

Enumerates kernel/hardware configuration

Description Indicator Process Target
File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size /tmp/exe3 N/A

Reads runtime system information

Description Indicator Process Target
File opened for reading /proc/stat /tmp/exe3 N/A
File opened for reading /proc/bus/pci/devices /tmp/exe3 N/A
File opened for reading /proc/self/status /tmp/exe3 N/A
File opened for reading /proc/1/environ /tmp/exe3 N/A
File opened for reading /proc/self/cgroup /tmp/exe3 N/A
File opened for reading /proc/filesystems /tmp/exe3 N/A
File opened for reading /proc/1/stat /tmp/exe3 N/A
File opened for reading /proc/1/comm /tmp/exe3 N/A

Processes

/tmp/exe3

[/tmp/exe3]

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
CN 47.94.20.102:443 tcp
CN 101.201.69.42:443 tcp
CN 47.94.202.137:443 tcp
CN 47.94.193.44:443 tcp
CN 47.94.227.15:443 tcp
CN 47.94.20.102:443 tcp
CN 101.201.69.42:443 tcp
CN 47.94.202.137:443 tcp
CN 47.94.193.44:443 tcp
CN 47.94.227.15:443 tcp
CN 47.94.20.102:443 tcp
CN 101.201.69.42:443 tcp
CN 47.94.202.137:443 tcp
CN 47.94.193.44:443 tcp
CN 47.94.227.15:443 tcp

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-08-30 17:57

Reported

2024-08-30 18:00

Platform

ubuntu2404-amd64-20240523-en

Max time kernel

140s

Max time network

148s

Command Line

[/tmp/exe3]

Signatures

Checks mountinfo of local process

antivm
Description Indicator Process Target
File opened for reading /proc/1/mountinfo /tmp/exe3 N/A

Reads hardware information

Description Indicator Process Target
File opened for reading /sys/class/dmi/id/product_uuid /tmp/exe3 N/A

Reads list of loaded kernel modules

evasion
Description Indicator Process Target
File opened for reading /proc/modules /tmp/exe3 N/A

Checks CPU configuration

antivm
Description Indicator Process Target
File opened for reading /proc/cpuinfo /tmp/exe3 N/A

Enumerates kernel/hardware configuration

Description Indicator Process Target
File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size /tmp/exe3 N/A

Reads runtime system information

Description Indicator Process Target
File opened for reading /proc/self/status /tmp/exe3 N/A
File opened for reading /proc/1/environ /tmp/exe3 N/A
File opened for reading /proc/self/cgroup /tmp/exe3 N/A
File opened for reading /proc/filesystems /tmp/exe3 N/A
File opened for reading /proc/1/stat /tmp/exe3 N/A
File opened for reading /proc/1/comm /tmp/exe3 N/A
File opened for reading /proc/stat /tmp/exe3 N/A
File opened for reading /proc/bus/pci/devices /tmp/exe3 N/A

Processes

/tmp/exe3

[/tmp/exe3]

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
CN 47.94.20.102:443 tcp
CN 101.201.69.42:443 tcp
CN 47.94.202.137:443 tcp
CN 47.94.193.44:443 tcp
CN 47.94.227.15:443 tcp
CN 47.94.20.102:443 tcp
CN 101.201.69.42:443 tcp
CN 47.94.202.137:443 tcp
CN 47.94.193.44:443 tcp
CN 47.94.227.15:443 tcp
CN 47.94.20.102:443 tcp
CN 101.201.69.42:443 tcp
CN 47.94.202.137:443 tcp
CN 47.94.193.44:443 tcp
CN 47.94.227.15:443 tcp

Files

N/A