Resubmissions

22-10-2024 02:07

241022-cka1nssfkj 10

Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20240611-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    22-10-2024 02:07

General

  • Target

    The-MALWARE-Repo-master/Botnets/FritzFrog/7f18e5b5b7645a80a0d44adf3fecdafcbf937bfe30a4cfb965a1421e034996dd

  • Size

    8.7MB

  • MD5

    b2e0eede7b18253dccd0d44ebb5db85a

  • SHA1

    ee5db9590090efd5549e1c17ec1ee956ef1ed3d1

  • SHA256

    7f18e5b5b7645a80a0d44adf3fecdafcbf937bfe30a4cfb965a1421e034996dd

  • SHA512

    5608fe7bde5072de7c98bacfe7beb928e6073be87c0fbccd8075c808d9a7c642abe254f6eb620d627f5324e35821fc9b41a31970264abcc472adfbe2c214a9fe

  • SSDEEP

    98304:zbc+G4RTwJg0GTvmF3D4cQ1XmkPF0ihOehaOE3Ok7Xk:zbc+G4RTwJGOzfQYkPGihOekj

Malware Config

Signatures

  • Adds new SSH keys 1 TTPs 1 IoCs

    Linux special file to hold SSH keys. The threat actor may add new keys for further remote access.

  • Deletes itself 1 IoCs
  • Deletes log files 1 TTPs 1 IoCs

    Deletes log files on the system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Virtualization/Sandbox Evasion: Time Based Evasion 1 TTPs 15 IoCs

    Adversaries may detect and evade virtualized environments and sandboxes.

  • Checks CPU configuration 1 TTPs 1 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads CPU attributes 1 TTPs 30 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 1 IoCs

    Adversaries may gather information about the network configuration of a system.

Processes

  • /tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/7f18e5b5b7645a80a0d44adf3fecdafcbf937bfe30a4cfb965a1421e034996dd
    /tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/7f18e5b5b7645a80a0d44adf3fecdafcbf937bfe30a4cfb965a1421e034996dd
    1⤵
    • Adds new SSH keys
    • Deletes itself
    • Deletes log files
    • Reads runtime system information
    PID:1497
    • /bin/uname
      uname -a
      2⤵
        PID:1511
      • /bin/cat
        cat /proc/cpuinfo
        2⤵
        • Checks CPU configuration
        PID:1512
      • /bin/cat
        cat /etc/issue
        2⤵
          PID:1513
        • /usr/bin/free
          free -m
          2⤵
          • Reads CPU attributes
          • Reads runtime system information
          PID:1514
        • /usr/bin/uptime
          uptime
          2⤵
          • Virtualization/Sandbox Evasion: Time Based Evasion
          • Reads CPU attributes
          PID:1515
        • /bin/journalctl
          journalctl -S "@0" -u sshd
          2⤵
          • Reads runtime system information
          PID:1516
        • /bin/cat
          cat "/var/log/auth*"
          2⤵
            PID:1517
          • /bin/zcat
            zcat "/var/log/auth*"
            2⤵
              PID:1518
            • /bin/gzip
              gzip -cd "/var/log/auth*"
              2⤵
              • System Network Configuration Discovery
              PID:1518
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              • Reads runtime system information
              PID:1519
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              • Reads runtime system information
              PID:1520
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              PID:1521
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              PID:1522
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              PID:1525
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              PID:1526
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              • Reads runtime system information
              PID:1527
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              PID:1528
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              PID:1529
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              PID:1530
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              PID:1531
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              PID:1532
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              PID:1533
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              PID:1534
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              PID:1535
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              PID:1536
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              • Reads runtime system information
              PID:1537
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              PID:1538
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              PID:1539
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              PID:1540
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              PID:1541
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              PID:1542
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              PID:1543
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              • Reads runtime system information
              PID:1544
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              PID:1545
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              • Reads runtime system information
              PID:1546
            • /usr/bin/free
              free -m
              2⤵
              • Reads CPU attributes
              PID:1547
            • /usr/bin/uptime
              uptime
              2⤵
              • Virtualization/Sandbox Evasion: Time Based Evasion
              • Reads CPU attributes
              PID:1548

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • /root/.ssh/authorized_keys

            Filesize

            381B

            MD5

            9da18d38b6dd4c4aa84642378d63fa89

            SHA1

            c5a976691e4b5963b5e760044f22cc9685268db6

            SHA256

            43062900b2539d8d1f67f30fa7042c56b53541f63875b5f0de5d8fbde0e0a8bf

            SHA512

            222b20b5b2ff8956c13dbac1f8d3f81435613b751913d65f4c4082ea9c1a7c8ae91be17a24ef4ae0c708bfe09daab552bb209615714d70acfaaed89c536c71b3