Overview
overview
6Static
static
1CHINA-APT-.../dlump
ubuntu-18.04-amd64
CHINA-APT-.../dlump
debian-9-armhf
CHINA-APT-.../dlump
debian-9-mips
CHINA-APT-.../dlump
debian-9-mipsel
CHINA-APT-...l1/ccc
ubuntu-22.04-amd64
1CHINA-APT-...l1/kde
ubuntu-22.04-amd64
6CHINA-APT-.../udevd
ubuntu-24.04-amd64
6CHINA-APT-...ile.sh
ubuntu-18.04-amd64
CHINA-APT-...ile.sh
debian-9-armhf
CHINA-APT-...ile.sh
debian-9-mips
CHINA-APT-...ile.sh
debian-9-mipsel
CHINA-APT-...p/a.js
windows7-x64
3CHINA-APT-...p/a.js
windows10-2004-x64
3CHINA-APT-...yy1.js
windows7-x64
3CHINA-APT-...yy1.js
windows10-2004-x64
3CHINA-APT-...gin.js
windows7-x64
3CHINA-APT-...gin.js
windows10-2004-x64
3CHINA-APT-...l1/kde
ubuntu-24.04-amd64
6CHINA-APT-.../udevd
ubuntu-24.04-amd64
6CHINA-APT-...nux.so
ubuntu-22.04-amd64
1CHINA-APT-...m/dbus
ubuntu-24.04-amd64
6Analysis
-
max time kernel
146s -
max time network
132s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20240523-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
21-11-2024 12:22
Static task
static1
Behavioral task
behavioral1
Sample
CHINA-APT-Trojan/etc/init.d/dlump
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
CHINA-APT-Trojan/etc/init.d/dlump
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
CHINA-APT-Trojan/etc/init.d/dlump
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
CHINA-APT-Trojan/etc/init.d/dlump
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral5
Sample
CHINA-APT-Trojan/home/www/.Xl1/ccc
Resource
ubuntu2204-amd64-20240522.1-en
Behavioral task
behavioral6
Sample
CHINA-APT-Trojan/home/www/.Xl1/kde
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral7
Sample
CHINA-APT-Trojan/home/www/.Xl1/udevd
Resource
ubuntu2404-amd64-20240729-en
Behavioral task
behavioral8
Sample
CHINA-APT-Trojan/home/www/.profile.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral9
Sample
CHINA-APT-Trojan/home/www/.profile.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral10
Sample
CHINA-APT-Trojan/home/www/.profile.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral11
Sample
CHINA-APT-Trojan/home/www/.profile.sh
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral12
Sample
CHINA-APT-Trojan/home/www/tomcat/webapps/WEB-INF/attache_temp/a.js
Resource
win7-20241023-en
Behavioral task
behavioral13
Sample
CHINA-APT-Trojan/home/www/tomcat/webapps/WEB-INF/attache_temp/a.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
CHINA-APT-Trojan/home/www/tomcat/webapps/img/yy1.js
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
CHINA-APT-Trojan/home/www/tomcat/webapps/img/yy1.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
CHINA-APT-Trojan/home/www/tomcat/webapps/login.js
Resource
win7-20241023-en
Behavioral task
behavioral17
Sample
CHINA-APT-Trojan/home/www/tomcat/webapps/login.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
CHINA-APT-Trojan/usr/bin/.Xl1/kde
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral19
Sample
CHINA-APT-Trojan/usr/bin/.Xl1/udevd
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral20
Sample
CHINA-APT-Trojan/usr/lib/libselinux.so
Resource
ubuntu2204-amd64-20240729-en
Behavioral task
behavioral21
Sample
CHINA-APT-Trojan/usr/lib64/gdm/.gdm/dbus
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
CHINA-APT-Trojan/usr/lib64/gdm/.gdm/dbus
-
Size
190KB
-
MD5
2251bc7910fe46fd0baf8bc05599bdcf
-
SHA1
0fef89711da11c550d3914debc0e663f5d2fb86c
-
SHA256
cff20753e36a4c942dc4dab5a91fd621a42330e17a89185a5b7262280bcd9263
-
SHA512
b5436c9f330cf32aeda31bc80ad375d4a1500c2a37f7317e70bd533fe4e6bae209da63f7ef623e0b05d6b4a03af54e93371afb3538754b9b195311496faa226c
-
SSDEEP
3072:sCktP9yEwFeIY0kRyxAuSnjL1Jo1q0+DNRJtlxaERyFzKr1Z70oh:sRPIEANY1RDXe8DNlYs
Malware Config
Signatures
-
Reads list of loaded kernel modules 1 TTPs 1 IoCs
Reads the list of currently loaded kernel modules, possibly to detect virtual environments.
description ioc Process File opened for reading /proc/modules lsmod -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself [scsi_eh_7] 2437 dbus -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo cat -
Creates .desktop file 2 TTPs 1 IoCs
Linux desktops like GNOME require .desktop files to register applications. Sometimes abused by malware for persistence.
description ioc Process File opened for modification /root/.config/autostart/gnome-control.desktop dbus -
Enumerates kernel/hardware configuration 1 TTPs 64 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
description ioc Process File opened for reading /sys/module/nfnetlink/holders lsmod File opened for reading /sys/module/parport_pc lsmod File opened for reading /sys/module/polyval_clmulni/refcnt lsmod File opened for reading /sys/module/ghash_clmulni_intel/coresize lsmod File opened for reading /sys/module/aesni_intel/coresize lsmod File opened for reading /sys/module/compression lsmod File opened for reading /sys/module/dm_multipath/holders lsmod File opened for reading /sys/module/ppdev/holders lsmod File opened for reading /sys/module/hid_generic lsmod File opened for reading /sys/module/polyval_clmulni lsmod File opened for reading /sys/module/mac_hid lsmod File opened for reading /sys/module/hid_generic/coresize lsmod File opened for reading /sys/module/crct10dif_pclmul/coresize lsmod File opened for reading /sys/module/btrfs/holders lsmod File opened for reading /sys/module/libcrc32c/holders lsmod File opened for reading /sys/module/hid_generic/refcnt lsmod File opened for reading /sys/module/pata_acpi/holders lsmod File opened for reading /sys/module/aesni_intel/holders lsmod File opened for reading /sys/module/btrfs/refcnt lsmod File opened for reading /sys/module/async_tx/holders lsmod File opened for reading /sys/module/raid1 lsmod File opened for reading /sys/module/crct10dif_pclmul lsmod File opened for reading /sys/module/serio_raw/refcnt lsmod File opened for reading /sys/module/joydev/refcnt lsmod File opened for reading /sys/module/stahp/holders lsmod File opened for reading /sys/module/x_tables/holders lsmod File opened for reading /sys/module/btrfs lsmod File opened for reading /sys/module/libcrc32c/coresize lsmod File opened for reading /sys/module/ghash_clmulni_intel lsmod File opened for reading /sys/module/virtio_dma_buf lsmod File opened for reading /sys/module/floppy lsmod File opened for reading /sys/module/floppy/coresize lsmod File opened for reading /sys/module/ip_tables/coresize lsmod File opened for reading /sys/module/crypto_simd/refcnt lsmod File opened for reading /sys/module/dmi_sysfs/refcnt lsmod File opened for reading /sys/module/ip_tables/holders lsmod File opened for reading /sys/module/blake2b_generic lsmod File opened for reading /sys/module/sha1_ssse3/refcnt lsmod File opened for reading /sys/module/8139cp/holders lsmod File opened for reading /sys/module/aesni_intel/refcnt lsmod File opened for reading /sys/module/cfg80211/refcnt lsmod File opened for reading /sys/module/cryptd/refcnt lsmod File opened for reading /sys/module/floppy/holders lsmod File opened for reading /sys/module/binfmt_misc/refcnt lsmod File opened for reading /sys/module/input_leds lsmod File opened for reading /sys/module/blake2b_generic/refcnt lsmod File opened for reading /sys/module/raid6_pq/coresize lsmod File opened for reading /sys/module/raid1/holders lsmod File opened for reading /sys/module/hid lsmod File opened for reading /sys/module/polyval_generic/refcnt lsmod File opened for reading /sys/module/usbdev/initstate rmmod File opened for reading /sys/module/crypto_simd/holders lsmod File opened for reading /sys/module/virtio_gpu lsmod File opened for reading /sys/module/cfg80211 lsmod File opened for reading /sys/module/dm_multipath/coresize lsmod File opened for reading /sys/module/8139too/holders lsmod File opened for reading /sys/module/sha1_ssse3 lsmod File opened for reading /sys/module/intel_rapl_msr lsmod File opened for reading /sys/module/mac_hid/refcnt lsmod File opened for reading /sys/module/usbhid/refcnt lsmod File opened for reading /sys/module/cryptd/holders lsmod File opened for reading /sys/module/binfmt_misc/coresize lsmod File opened for reading /sys/module/8139too lsmod File opened for reading /sys/module/async_xor/holders lsmod -
description ioc Process File opened for reading /proc/self/maps grep File opened for reading /proc/self/maps awk File opened for reading /proc/cmdline rmmod File opened for reading /proc/self/maps grep File opened for reading /proc/cmdline lsmod File opened for reading /proc/self/maps grep File opened for reading /proc/self/mountinfo df File opened for reading /proc/self/maps grep -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/CHINA-APT-Trojan/usr/lib64/gdm/.gdm/pid dbus
Processes
-
/tmp/CHINA-APT-Trojan/usr/lib64/gdm/.gdm/dbus/tmp/CHINA-APT-Trojan/usr/lib64/gdm/.gdm/dbus1⤵
- Changes its process name
- Creates .desktop file
- Writes file to tmp directory
PID:2418 -
/bin/shsh -c -- hostname2⤵PID:2419
-
/usr/bin/hostnamehostname3⤵PID:2421
-
-
-
/bin/shsh -c -- whoami2⤵PID:2422
-
/usr/bin/whoamiwhoami3⤵PID:2423
-
-
-
/bin/shsh -c -- "cat /proc/cpuinfo | grep \"model name\""2⤵PID:2424
-
/usr/bin/catcat /proc/cpuinfo3⤵
- Checks CPU configuration
PID:2425
-
-
/usr/bin/grepgrep "model name"3⤵
- Reads runtime system information
PID:2426
-
-
-
/bin/shsh -c -- "df -h|grep 'dev' |grep -v none|awk '/dev/{print \$6}'"2⤵PID:2427
-
/usr/bin/dfdf -h3⤵
- Reads runtime system information
PID:2428
-
-
/usr/bin/grepgrep dev3⤵
- Reads runtime system information
PID:2429
-
-
/usr/bin/grepgrep -v none3⤵
- Reads runtime system information
PID:2430
-
-
/usr/bin/awkawk "/dev/{print \$6}"3⤵
- Reads runtime system information
PID:2431
-
-
-
/bin/shsh -c -- "uname -r"2⤵PID:2432
-
/usr/bin/unameuname -r3⤵PID:2433
-
-
-
/bin/shsh -c -- "kill 25978 2>/dev/null"2⤵PID:2438
-
-
/bin/shsh -c -- "uname -r"2⤵PID:2439
-
/usr/bin/unameuname -r3⤵PID:2440
-
-
-
/bin/shsh -c -- "rmmod usbdev.ko 2>/dev/null"2⤵PID:2441
-
/usr/sbin/rmmodrmmod usbdev.ko3⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:2442
-
-
-
/bin/shsh -c -- "rm -rf ../lib/usbdev.ko"2⤵PID:2443
-
/usr/bin/rmrm -rf ../lib/usbdev.ko3⤵PID:2444
-
-
-
/bin/shsh -c -- "lsmod | grep usbdev"2⤵PID:2446
-
/usr/sbin/lsmodlsmod3⤵
- Reads list of loaded kernel modules
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:2447
-
-
/usr/bin/grepgrep usbdev3⤵
- Reads runtime system information
PID:2448
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
221B
MD55658e328db72f30402b90185541d2a2d
SHA106cd3066a817932f59d0ce9f1106a716ba9378cc
SHA256967be9747af8fceba01462bcd5a7b02d03caa1e243d534f600220eeaabad53f8
SHA512267a5d89255e3d1cc0d409c53412838c24eb940e616e73db51c60537ab952a7616b8db0b31d9fb43fd3c75bd460b20c0e34f8b8344d61695501555bf3ebc7d6b