Malware Analysis Report

2025-04-03 19:18

Sample ID 241029-q9k4tsvlfz
Target main (3).cs
SHA256 898d74c69d452013bdd9864c5b4b030cc6caa1ab90699cd0e6f39758b52f87e2
Tags
antivm discovery
score
4/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
4/10

SHA256

898d74c69d452013bdd9864c5b4b030cc6caa1ab90699cd0e6f39758b52f87e2

Threat Level: Likely benign

The file main (3).cs was found to be: Likely benign.

Malicious Activity Summary

antivm discovery

Checks CPU configuration

Reads CPU attributes

Changes its process name

Enumerates kernel/hardware configuration

Reads runtime system information

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-10-29 13:57

Signatures

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-10-29 13:57

Reported

2024-10-29 14:03

Platform

debian9-mipsbe-20240729-en

Max time kernel

13s

Command Line

[nodejs /tmp/main (3).js]

Signatures

Changes its process name

Description Indicator Process Target
Changes the process name, possibly in an attempt to hide itself V8 WorkerThread /usr/bin/nodejs N/A
Changes the process name, possibly in an attempt to hide itself V8 WorkerThread /usr/bin/nodejs N/A
Changes the process name, possibly in an attempt to hide itself V8 WorkerThread /usr/bin/nodejs N/A
Changes the process name, possibly in an attempt to hide itself V8 WorkerThread /usr/bin/nodejs N/A

Checks CPU configuration

antivm
Description Indicator Process Target
File opened for reading /proc/cpuinfo /usr/bin/nodejs N/A

Processes

/usr/bin/nodejs

[nodejs /tmp/main (3).js]

Network

N/A

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-10-29 13:57

Reported

2024-10-29 14:03

Platform

debian9-mipsel-20240611-en

Max time kernel

18s

Command Line

[nodejs /tmp/main (3).js]

Signatures

Changes its process name

Description Indicator Process Target
Changes the process name, possibly in an attempt to hide itself V8 WorkerThread /usr/bin/nodejs N/A
Changes the process name, possibly in an attempt to hide itself V8 WorkerThread /usr/bin/nodejs N/A
Changes the process name, possibly in an attempt to hide itself V8 WorkerThread /usr/bin/nodejs N/A
Changes the process name, possibly in an attempt to hide itself V8 WorkerThread /usr/bin/nodejs N/A

Checks CPU configuration

antivm
Description Indicator Process Target
File opened for reading /proc/cpuinfo /usr/bin/nodejs N/A

Processes

/usr/bin/nodejs

[nodejs /tmp/main (3).js]

Network

N/A

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-10-29 13:57

Reported

2024-10-29 14:03

Platform

ubuntu1804-amd64-20240611-en

Max time kernel

0s

Max time network

181s

Command Line

[node /tmp/main (3).js]

Signatures

Enumerates kernel/hardware configuration

discovery
Description Indicator Process Target
File opened for reading /sys/fs/cgroup/memory/memory.limit_in_bytes /usr/bin/node N/A

Reads runtime system information

discovery
Description Indicator Process Target
File opened for reading /proc/meminfo /usr/bin/node N/A

Processes

/usr/bin/node

[node /tmp/main (3).js]

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 185.125.188.62:443 tcp
GB 185.125.188.62:443 tcp
US 151.101.1.91:443 tcp
US 151.101.1.91:443 tcp
GB 195.181.164.14:443 tcp
US 1.1.1.1:53 spocs.getpocket.com udp
US 1.1.1.1:53 spocs.getpocket.com udp
US 1.1.1.1:53 getpocket.cdn.mozilla.net udp
US 1.1.1.1:53 getpocket.cdn.mozilla.net udp
US 1.1.1.1:53 prod.ads.prod.webservices.mozgcp.net udp
US 34.120.5.221:443 getpocket.cdn.mozilla.net tcp
US 1.1.1.1:53 shavar.prod.mozaws.net udp
US 1.1.1.1:53 prod.remote-settings.prod.webservices.mozgcp.net udp
US 1.1.1.1:53 tracking-protection.cdn.mozilla.net udp
US 1.1.1.1:53 tracking-protection.cdn.mozilla.net udp
US 1.1.1.1:53 tracking-protection.prod.mozaws.net udp
US 34.120.158.37:443 tracking-protection.cdn.mozilla.net tcp
US 34.120.158.37:443 tracking-protection.cdn.mozilla.net tcp
US 34.120.158.37:443 tracking-protection.cdn.mozilla.net tcp
US 34.120.158.37:443 tracking-protection.cdn.mozilla.net tcp
US 1.1.1.1:53 firefox-settings-attachments.cdn.mozilla.net udp
US 1.1.1.1:53 firefox-settings-attachments.cdn.mozilla.net udp
US 1.1.1.1:53 attachments.prod.remote-settings.prod.webservices.mozgcp.net udp
US 34.117.121.53:443 firefox-settings-attachments.cdn.mozilla.net tcp
US 34.120.158.37:443 tracking-protection.cdn.mozilla.net tcp
US 34.120.158.37:443 tracking-protection.cdn.mozilla.net tcp
US 34.120.158.37:443 tracking-protection.cdn.mozilla.net tcp
US 34.120.158.37:443 tracking-protection.cdn.mozilla.net tcp
US 34.120.158.37:443 tracking-protection.cdn.mozilla.net tcp
US 1.1.1.1:53 classroom.google.com udp
US 1.1.1.1:53 classroom.google.com udp
GB 142.250.187.238:80 classroom.google.com tcp
GB 142.250.187.238:443 classroom.google.com tcp
US 1.1.1.1:53 accounts.google.com udp
US 1.1.1.1:53 accounts.google.com udp
GB 142.250.187.238:443 classroom.google.com udp
GB 74.125.71.84:443 accounts.google.com tcp
GB 74.125.71.84:443 accounts.google.com udp
US 1.1.1.1:53 edu.google.com udp
US 1.1.1.1:53 edu.google.com udp
GB 216.58.204.78:443 edu.google.com tcp
GB 216.58.204.78:443 edu.google.com udp
US 1.1.1.1:53 lh3.googleusercontent.com udp
US 1.1.1.1:53 lh3.googleusercontent.com udp
US 1.1.1.1:53 ajax.googleapis.com udp
US 1.1.1.1:53 ajax.googleapis.com udp
GB 216.58.204.65:443 lh3.googleusercontent.com tcp
GB 172.217.16.234:443 ajax.googleapis.com tcp
GB 172.217.16.234:443 ajax.googleapis.com tcp
GB 172.217.16.234:443 ajax.googleapis.com tcp
GB 172.217.16.234:443 ajax.googleapis.com tcp
GB 172.217.16.234:443 ajax.googleapis.com tcp
GB 216.58.204.65:443 lh3.googleusercontent.com udp
GB 172.217.16.234:443 ajax.googleapis.com udp
US 1.1.1.1:53 www.google.com udp
US 1.1.1.1:53 www.google.com udp
GB 216.58.212.228:443 www.google.com tcp
GB 216.58.212.228:443 www.google.com udp
US 1.1.1.1:53 prod.balrog.prod.cloudops.mozgcp.net udp
US 1.1.1.1:53 location.services.mozilla.com udp
US 1.1.1.1:53 location.services.mozilla.com udp
US 1.1.1.1:53 prod.classify-client.prod.webservices.mozgcp.net udp
US 1.1.1.1:53 archive.mozilla.org udp
US 1.1.1.1:53 archive.mozilla.org udp
US 34.117.35.28:443 archive.mozilla.org tcp
US 1.1.1.1:53 ciscobinary.openh264.org udp
US 1.1.1.1:53 ciscobinary.openh264.org udp
GB 88.221.134.209:80 ciscobinary.openh264.org tcp
US 34.117.35.28:443 archive.mozilla.org udp
US 35.190.72.216:443 location.services.mozilla.com tcp
US 35.190.72.216:443 location.services.mozilla.com udp
US 1.1.1.1:53 connectivity-check.ubuntu.com udp
US 1.1.1.1:53 connectivity-check.ubuntu.com udp
GB 185.125.190.98:80 connectivity-check.ubuntu.com tcp

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-10-29 13:57

Reported

2024-10-29 14:03

Platform

debian9-armhf-20240611-en

Max time kernel

10s

Command Line

[node /tmp/main (3).js]

Signatures

Checks CPU configuration

antivm
Description Indicator Process Target
File opened for reading /proc/cpuinfo /usr/bin/node N/A

Reads CPU attributes

discovery
Description Indicator Process Target
File opened for reading /sys/devices/system/cpu/online /usr/bin/node N/A

Enumerates kernel/hardware configuration

discovery
Description Indicator Process Target
File opened for reading /sys/fs/cgroup/memory/memory.limit_in_bytes /usr/bin/node N/A

Reads runtime system information

discovery
Description Indicator Process Target
File opened for reading /proc/meminfo /usr/bin/node N/A

Processes

/usr/bin/node

[node /tmp/main (3).js]

Network

N/A

Files

N/A