Resubmissions

22-10-2024 02:07

241022-cka1nssfkj 10

Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    ubuntu-24.04_amd64
  • resource
    ubuntu2404-amd64-20240729-en
  • resource tags

    arch:amd64arch:i386image:ubuntu2404-amd64-20240729-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system
  • submitted
    22-10-2024 02:07

General

  • Target

    The-MALWARE-Repo-master/Botnets/FritzFrog/001eb377f0452060012124cb214f658754c7488ccb82e23ec56b2f45a636c859

  • Size

    8.7MB

  • MD5

    799c965e0a5a132ec2263d5fea0b0e1c

  • SHA1

    a15c5a706122fabdef1989c893c72c6530fedcb4

  • SHA256

    001eb377f0452060012124cb214f658754c7488ccb82e23ec56b2f45a636c859

  • SHA512

    6c481a855ee6f81dd388c8a4623e519bfbb9f496dada93672360f0a7476fb2b32fd261324156fd4729cef3cbe13f0a8b5862fe47b6db1860d0d67a77283b5ad8

  • SSDEEP

    98304:VqGMOLT5E2Dy8Ji6LrDl3bTMsEplZ1GW5w+Aw:wGMOLTmaHjLXl3bTMsEpf1x5

Malware Config

Signatures

  • Adds new SSH keys 1 TTPs 1 IoCs

    Linux special file to hold SSH keys. The threat actor may add new keys for further remote access.

  • Deletes itself 1 IoCs
  • Deletes log files 1 TTPs 1 IoCs

    Deletes log files on the system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Virtualization/Sandbox Evasion: Time Based Evasion 1 TTPs 15 IoCs

    Adversaries may detect and evade virtualized environments and sandboxes.

  • Checks CPU configuration 1 TTPs 1 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Enumerates kernel/hardware configuration 1 TTPs 1 IoCs

    Reads contents of /sys virtual filesystem to enumerate system information.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 4 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/001eb377f0452060012124cb214f658754c7488ccb82e23ec56b2f45a636c859
    /tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/001eb377f0452060012124cb214f658754c7488ccb82e23ec56b2f45a636c859
    1⤵
    • Adds new SSH keys
    • Deletes itself
    • Deletes log files
    • Enumerates kernel/hardware configuration
    • Reads runtime system information
    • Writes file to tmp directory
    PID:2532
    • /usr/bin/uname
      uname -a
      2⤵
        PID:2547
      • /usr/bin/cat
        cat /proc/cpuinfo
        2⤵
        • Checks CPU configuration
        PID:2548
      • /usr/bin/cat
        cat /etc/issue
        2⤵
          PID:2549
        • /usr/bin/free
          free -m
          2⤵
            PID:2550
          • /usr/bin/uptime
            uptime
            2⤵
            • Virtualization/Sandbox Evasion: Time Based Evasion
            • Reads runtime system information
            PID:2551
          • /usr/bin/journalctl
            journalctl -S "@0" -u sshd
            2⤵
              PID:2552
            • /usr/bin/cat
              cat "/var/log/auth*"
              2⤵
                PID:2554
              • /usr/bin/zcat
                zcat "/var/log/auth*"
                2⤵
                  PID:2555
                • /usr/local/sbin/gzip
                  gzip -cd "/var/log/auth*"
                  2⤵
                  • System Network Configuration Discovery
                  PID:2555
                • /usr/local/bin/gzip
                  gzip -cd "/var/log/auth*"
                  2⤵
                  • System Network Configuration Discovery
                  PID:2555
                • /usr/sbin/gzip
                  gzip -cd "/var/log/auth*"
                  2⤵
                  • System Network Configuration Discovery
                  PID:2555
                • /usr/bin/gzip
                  gzip -cd "/var/log/auth*"
                  2⤵
                  • System Network Configuration Discovery
                  PID:2555
                • /usr/bin/free
                  free -m
                  2⤵
                    PID:2556
                  • /usr/bin/uptime
                    uptime
                    2⤵
                    • Virtualization/Sandbox Evasion: Time Based Evasion
                    PID:2557
                  • /usr/bin/free
                    free -m
                    2⤵
                      PID:2558
                    • /usr/bin/uptime
                      uptime
                      2⤵
                      • Virtualization/Sandbox Evasion: Time Based Evasion
                      • Reads runtime system information
                      PID:2559
                    • /usr/bin/free
                      free -m
                      2⤵
                      • Reads runtime system information
                      PID:2563
                    • /usr/bin/uptime
                      uptime
                      2⤵
                      • Virtualization/Sandbox Evasion: Time Based Evasion
                      PID:2564
                    • /usr/bin/free
                      free -m
                      2⤵
                      • Reads runtime system information
                      PID:2565
                    • /usr/bin/uptime
                      uptime
                      2⤵
                      • Virtualization/Sandbox Evasion: Time Based Evasion
                      PID:2566
                    • /usr/bin/free
                      free -m
                      2⤵
                        PID:2567
                      • /usr/bin/uptime
                        uptime
                        2⤵
                        • Virtualization/Sandbox Evasion: Time Based Evasion
                        PID:2568
                      • /usr/bin/free
                        free -m
                        2⤵
                          PID:2569
                        • /usr/bin/uptime
                          uptime
                          2⤵
                          • Virtualization/Sandbox Evasion: Time Based Evasion
                          PID:2570
                        • /usr/bin/free
                          free -m
                          2⤵
                            PID:2572
                          • /usr/bin/uptime
                            uptime
                            2⤵
                            • Virtualization/Sandbox Evasion: Time Based Evasion
                            PID:2573
                          • /usr/bin/free
                            free -m
                            2⤵
                              PID:2574
                            • /usr/bin/uptime
                              uptime
                              2⤵
                              • Virtualization/Sandbox Evasion: Time Based Evasion
                              PID:2575
                            • /usr/bin/free
                              free -m
                              2⤵
                                PID:2576
                              • /usr/bin/uptime
                                uptime
                                2⤵
                                • Virtualization/Sandbox Evasion: Time Based Evasion
                                PID:2577
                              • /usr/bin/free
                                free -m
                                2⤵
                                  PID:2578
                                • /usr/bin/uptime
                                  uptime
                                  2⤵
                                  • Virtualization/Sandbox Evasion: Time Based Evasion
                                  • Reads runtime system information
                                  PID:2579
                                • /usr/bin/free
                                  free -m
                                  2⤵
                                    PID:2580
                                  • /usr/bin/uptime
                                    uptime
                                    2⤵
                                    • Virtualization/Sandbox Evasion: Time Based Evasion
                                    • Reads runtime system information
                                    PID:2581
                                  • /usr/bin/free
                                    free -m
                                    2⤵
                                      PID:2597
                                    • /usr/bin/uptime
                                      uptime
                                      2⤵
                                      • Virtualization/Sandbox Evasion: Time Based Evasion
                                      PID:2598
                                    • /usr/bin/free
                                      free -m
                                      2⤵
                                        PID:2602
                                      • /usr/bin/uptime
                                        uptime
                                        2⤵
                                        • Virtualization/Sandbox Evasion: Time Based Evasion
                                        • Reads runtime system information
                                        PID:2603
                                      • /usr/bin/free
                                        free -m
                                        2⤵
                                          PID:2604
                                        • /usr/bin/uptime
                                          uptime
                                          2⤵
                                          • Virtualization/Sandbox Evasion: Time Based Evasion
                                          PID:2605

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • /tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/nc

                                        Filesize

                                        8.7MB

                                        MD5

                                        799c965e0a5a132ec2263d5fea0b0e1c

                                        SHA1

                                        a15c5a706122fabdef1989c893c72c6530fedcb4

                                        SHA256

                                        001eb377f0452060012124cb214f658754c7488ccb82e23ec56b2f45a636c859

                                        SHA512

                                        6c481a855ee6f81dd388c8a4623e519bfbb9f496dada93672360f0a7476fb2b32fd261324156fd4729cef3cbe13f0a8b5862fe47b6db1860d0d67a77283b5ad8