Resubmissions

22-10-2024 02:07

241022-cka1nssfkj 10

Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    ubuntu-22.04_amd64
  • resource
    ubuntu2204-amd64-20240611-en
  • resource tags

    arch:amd64arch:i386image:ubuntu2204-amd64-20240611-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system
  • submitted
    22-10-2024 02:07

General

  • Target

    The-MALWARE-Repo-master/Botnets/FritzFrog/90b61cc77bb2d726219fd00ae2d0ecdf6f0fe7078529e87b7ec8e603008232d5

  • Size

    8.7MB

  • MD5

    100bff2f4ee4d88b005bb016daa04fe6

  • SHA1

    36e5f8f70890601aa2adaffb203afd06516097f0

  • SHA256

    90b61cc77bb2d726219fd00ae2d0ecdf6f0fe7078529e87b7ec8e603008232d5

  • SHA512

    a1cb52bc6edaa7f8bb216d2a5f3deb0b8468c64b43931ef570c05e6a9872c63f00aff50d69686fdc2ea25d3d83da4bf9d78f5e6910643163570d0bd6279c6e16

  • SSDEEP

    98304:wRINZeR9Zy031d3eDi2dZQT3/S1GVlOre53ziKZ7Xk:wRINZeR9Zx1CFDQD/SQVlOrKr

Malware Config

Signatures

  • Adds new SSH keys 1 TTPs 1 IoCs

    Linux special file to hold SSH keys. The threat actor may add new keys for further remote access.

  • Deletes itself 1 IoCs
  • Deletes log files 1 TTPs 1 IoCs

    Deletes log files on the system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Virtualization/Sandbox Evasion: Time Based Evasion 1 TTPs 15 IoCs

    Adversaries may detect and evade virtualized environments and sandboxes.

  • Checks CPU configuration 1 TTPs 1 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads CPU attributes 1 TTPs 30 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 4 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/90b61cc77bb2d726219fd00ae2d0ecdf6f0fe7078529e87b7ec8e603008232d5
    /tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/90b61cc77bb2d726219fd00ae2d0ecdf6f0fe7078529e87b7ec8e603008232d5
    1⤵
    • Adds new SSH keys
    • Deletes itself
    • Deletes log files
    • Reads runtime system information
    • Writes file to tmp directory
    PID:1566
    • /usr/bin/uname
      uname -a
      2⤵
        PID:1576
      • /usr/bin/cat
        cat /proc/cpuinfo
        2⤵
        • Checks CPU configuration
        PID:1580
      • /usr/bin/cat
        cat /etc/issue
        2⤵
          PID:1581
        • /usr/bin/free
          free -m
          2⤵
          • Reads CPU attributes
          PID:1582
        • /usr/bin/uptime
          uptime
          2⤵
          • Virtualization/Sandbox Evasion: Time Based Evasion
          • Reads CPU attributes
          • Reads runtime system information
          PID:1583
        • /usr/bin/journalctl
          journalctl -S "@0" -u sshd
          2⤵
            PID:1584
          • /usr/bin/cat
            cat "/var/log/auth*"
            2⤵
              PID:1585
            • /usr/bin/zcat
              zcat "/var/log/auth*"
              2⤵
                PID:1586
              • /usr/local/sbin/gzip
                gzip -cd "/var/log/auth*"
                2⤵
                • System Network Configuration Discovery
                PID:1586
              • /usr/local/bin/gzip
                gzip -cd "/var/log/auth*"
                2⤵
                • System Network Configuration Discovery
                PID:1586
              • /usr/sbin/gzip
                gzip -cd "/var/log/auth*"
                2⤵
                • System Network Configuration Discovery
                PID:1586
              • /usr/bin/gzip
                gzip -cd "/var/log/auth*"
                2⤵
                • System Network Configuration Discovery
                PID:1586
              • /usr/bin/free
                free -m
                2⤵
                • Reads CPU attributes
                PID:1587
              • /usr/bin/uptime
                uptime
                2⤵
                • Virtualization/Sandbox Evasion: Time Based Evasion
                • Reads CPU attributes
                PID:1588
              • /usr/bin/free
                free -m
                2⤵
                • Reads CPU attributes
                PID:1589
              • /usr/bin/uptime
                uptime
                2⤵
                • Virtualization/Sandbox Evasion: Time Based Evasion
                • Reads CPU attributes
                • Reads runtime system information
                PID:1590
              • /usr/bin/free
                free -m
                2⤵
                • Reads CPU attributes
                • Reads runtime system information
                PID:1593
              • /usr/bin/uptime
                uptime
                2⤵
                • Virtualization/Sandbox Evasion: Time Based Evasion
                • Reads CPU attributes
                PID:1594
              • /usr/bin/free
                free -m
                2⤵
                • Reads CPU attributes
                • Reads runtime system information
                PID:1595
              • /usr/bin/uptime
                uptime
                2⤵
                • Virtualization/Sandbox Evasion: Time Based Evasion
                • Reads CPU attributes
                PID:1596
              • /usr/bin/free
                free -m
                2⤵
                • Reads CPU attributes
                PID:1597
              • /usr/bin/uptime
                uptime
                2⤵
                • Virtualization/Sandbox Evasion: Time Based Evasion
                • Reads CPU attributes
                PID:1598
              • /usr/bin/free
                free -m
                2⤵
                • Reads CPU attributes
                • Reads runtime system information
                PID:1605
              • /usr/bin/uptime
                uptime
                2⤵
                • Virtualization/Sandbox Evasion: Time Based Evasion
                • Reads CPU attributes
                • Reads runtime system information
                PID:1606
              • /usr/bin/free
                free -m
                2⤵
                • Reads CPU attributes
                • Reads runtime system information
                PID:1607
              • /usr/bin/uptime
                uptime
                2⤵
                • Virtualization/Sandbox Evasion: Time Based Evasion
                • Reads CPU attributes
                • Reads runtime system information
                PID:1608
              • /usr/bin/free
                free -m
                2⤵
                • Reads CPU attributes
                PID:1609
              • /usr/bin/uptime
                uptime
                2⤵
                • Virtualization/Sandbox Evasion: Time Based Evasion
                • Reads CPU attributes
                PID:1610
              • /usr/bin/free
                free -m
                2⤵
                • Reads CPU attributes
                • Reads runtime system information
                PID:1611
              • /usr/bin/uptime
                uptime
                2⤵
                • Virtualization/Sandbox Evasion: Time Based Evasion
                • Reads CPU attributes
                PID:1612
              • /usr/bin/free
                free -m
                2⤵
                • Reads CPU attributes
                PID:1613
              • /usr/bin/uptime
                uptime
                2⤵
                • Virtualization/Sandbox Evasion: Time Based Evasion
                • Reads CPU attributes
                • Reads runtime system information
                PID:1614
              • /usr/bin/free
                free -m
                2⤵
                • Reads CPU attributes
                PID:1615
              • /usr/bin/uptime
                uptime
                2⤵
                • Virtualization/Sandbox Evasion: Time Based Evasion
                • Reads CPU attributes
                • Reads runtime system information
                PID:1616
              • /usr/bin/free
                free -m
                2⤵
                • Reads CPU attributes
                • Reads runtime system information
                PID:1620
              • /usr/bin/uptime
                uptime
                2⤵
                • Virtualization/Sandbox Evasion: Time Based Evasion
                • Reads CPU attributes
                • Reads runtime system information
                PID:1621
              • /usr/bin/free
                free -m
                2⤵
                • Reads CPU attributes
                PID:1622
              • /usr/bin/uptime
                uptime
                2⤵
                • Virtualization/Sandbox Evasion: Time Based Evasion
                • Reads CPU attributes
                PID:1623
              • /usr/bin/free
                free -m
                2⤵
                • Reads CPU attributes
                PID:1624
              • /usr/bin/uptime
                uptime
                2⤵
                • Virtualization/Sandbox Evasion: Time Based Evasion
                • Reads CPU attributes
                • Reads runtime system information
                PID:1625

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • /tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/nc

              Filesize

              8.7MB

              MD5

              100bff2f4ee4d88b005bb016daa04fe6

              SHA1

              36e5f8f70890601aa2adaffb203afd06516097f0

              SHA256

              90b61cc77bb2d726219fd00ae2d0ecdf6f0fe7078529e87b7ec8e603008232d5

              SHA512

              a1cb52bc6edaa7f8bb216d2a5f3deb0b8468c64b43931ef570c05e6a9872c63f00aff50d69686fdc2ea25d3d83da4bf9d78f5e6910643163570d0bd6279c6e16