Analysis
-
max time kernel
149s -
max time network
153s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240611-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
25-11-2024 09:15
Static task
static1
Behavioral task
behavioral1
Sample
1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e
Resource
ubuntu2204-amd64-20240611-en
General
-
Target
1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e
-
Size
100KB
-
MD5
d0ceffd3b00587a2c593806f9b849cef
-
SHA1
c31438ddf15aa1ef49d540cd4faa6e78b874b313
-
SHA256
1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e
-
SHA512
ccb83ebbe4d7dd58cb8a0ca5f2b8ff698c2190f3dca75c01c7b1134dfe043844c88908c6ee82024751c6ca2ed3a35b89d5237bcec12275135b8f9644d26baffa
-
SSDEEP
1536:QUx8tzU06/iuN/G13HAswGz/gxi2pm5GA1KXUjmM1j6l3h+AWwh0f:Qc8tzUS4/N/wg82pm91KXUjhj6pIAQf
Malware Config
Signatures
-
Contacts a large (27175) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 4 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
shchmodshchmodpid process 1666 sh 1667 chmod 1672 sh 1673 chmod -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450edescription ioc process File opened for modification /dev/watchdog 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e File opened for modification /dev/misc/watchdog 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e -
Checks mountinfo of local process 1 TTPs 1 IoCs
Checks mountinfo of running processes which indicate if it is running in chroot jail.
Processes:
1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450edescription ioc process File opened for reading /proc/1670/mountinfo 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e -
Creates/modifies environment variables 1 TTPs 1 IoCs
Creating/modifying environment variables is a common persistence mechanism.
Processes:
1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450edescription ioc process File opened for modification /etc/profile 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e -
Processes:
1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450edescription ioc process File opened for modification /etc/init.d/system 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e -
Modifies rc script 2 TTPs 1 IoCs
Adding/modifying system rc scripts is a common persistence mechanism.
Processes:
1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450edescription ioc process File opened for modification /etc/rc.local 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e -
Modifies systemd 2 TTPs 1 IoCs
Adds/ modifies systemd service files. Likely to achieve persistence.
Processes:
1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450edescription ioc process File opened for modification /etc/systemd/system/custom.service 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e -
Modifies Bash startup script 2 TTPs 1 IoCs
Processes:
1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450edescription ioc process File opened for modification /etc/profile 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e -
Processes:
1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450emkdirsystemctldescription ioc process File opened for reading /proc/737/cmdline 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e File opened for reading /proc/1727/status 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e File opened for reading /proc/filesystems mkdir File opened for reading /proc/1701/status 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e File opened for reading /proc/1708/status 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e File opened for reading /proc/1713/status 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e File opened for reading /proc/1712/status 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e File opened for reading /proc/1714/status 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e File opened for reading /proc/filesystems systemctl File opened for reading /proc/1699/status 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e File opened for reading /proc/1702/status 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e File opened for reading /proc/1706/status 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e File opened for reading /proc/1705/status 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e File opened for reading /proc/1707/status 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e File opened for reading /proc/1711/status 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e File opened for reading /proc/1715/status 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e File opened for reading /proc/self/status 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e File opened for reading /proc/1/cgroup 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e File opened for reading /proc/633/cmdline 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e File opened for reading /proc/1700/status 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e File opened for reading /proc/1719/status 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e File opened for reading /proc/1725/status 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e File opened for reading /proc/1690/status 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e File opened for reading /proc/1705/cmdline 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e File opened for reading /proc/1709/status 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e File opened for reading /proc/1716/status 1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e
Processes
-
/tmp/1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e/tmp/1518d9364ae6362a9dc3e7cc7d103e515ea7b1c0aaca74f80062ba9f7436450e1⤵
- Modifies Watchdog functionality
- Checks mountinfo of local process
- Creates/modifies environment variables
- Modifies init.d
- Modifies rc script
- Modifies systemd
- Modifies Bash startup script
- Reads runtime system information
PID:1590 -
/bin/shsh -c "systemctl enable custom.service >/dev/null 2>&1"2⤵PID:1597
-
/usr/bin/systemctlsystemctl enable custom.service3⤵
- Reads runtime system information
PID:1598
-
-
-
/bin/shsh -c "chmod +x /etc/init.d/system >/dev/null 2>&1"2⤵
- File and Directory Permissions Modification
PID:1666 -
/usr/bin/chmodchmod +x /etc/init.d/system3⤵
- File and Directory Permissions Modification
PID:1667
-
-
-
/bin/shsh -c "ln -s /etc/init.d/system /etc/rcS.d/S99system >/dev/null 2>&1"2⤵PID:1668
-
/usr/bin/lnln -s /etc/init.d/system /etc/rcS.d/S99system3⤵PID:1669
-
-
-
/bin/shsh -c "chmod +x /etc/init.d/sh >/dev/null 2>&1"2⤵
- File and Directory Permissions Modification
PID:1672 -
/usr/bin/chmodchmod +x /etc/init.d/sh3⤵
- File and Directory Permissions Modification
PID:1673
-
-
-
/bin/shsh -c "mkdir -p /etc/rc.d >/dev/null 2>&1"2⤵PID:1674
-
/usr/bin/mkdirmkdir -p /etc/rc.d3⤵
- Reads runtime system information
PID:1675
-
-
-
/bin/shsh -c "ln -s /etc/init.d/sh /etc/rc.d/S99sh >/dev/null 2>&1"2⤵PID:1676
-
/usr/bin/lnln -s /etc/init.d/sh /etc/rc.d/S99sh3⤵PID:1677
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4XDG Autostart Entries
1Boot or Logon Initialization Scripts
2RC Scripts
2Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Privilege Escalation
Boot or Logon Autostart Execution
4XDG Autostart Entries
1Boot or Logon Initialization Scripts
2RC Scripts
2Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109B
MD5735cae7d3cbab0f59d95f84790282103
SHA11cb77931b3097f18988016c9ceba3280a5ccb2ae
SHA256dfdd4cf729384e4ed52516ab72bd86be286c80f53d4f5b764fd2dd2a2b2c983b
SHA512998daa467c4ee63dd41515897728de70cbb9c579ca8b16c26d8e6db5edad53c6dbd6343fb10eda3dbc29b0cb1fa72a9b2653250e9027e6ee02d17726e958bbfe
-
Filesize
96B
MD5f000251d92c773cc3ee1ca22cf5f0788
SHA1e2386fe6a5f29b1e9e5ad5b38928c024f97105e6
SHA25631a77745dd3724a0691a9255738b9c87516868932e3eb992e2afafcd0574a985
SHA5120dad5adaa7742dd208596fefad53ab21c39fbf2cbe5c9958b92170d555d316f0a0b02ec5236311b869aa18e90592e81439a3a229bf1307b5daf87d87c5f493c2
-
Filesize
101B
MD53d6b6e1b05ad5d0538ccd8804bcd279b
SHA10fc061b51c225d5bea072c939de05e8a856558bc
SHA256cab2df9c1c498df29445837610f14ae08d4af98d3acac69b0581c01fe594e3c5
SHA5121957857cffbc0d526eb04e40db166d661b9dc59fc31fb5551f31cd58d270f839ffa2098e81c8555b12e9dbd55ba17df662b14c6441a6389eb9a76082fa401c98
-
Filesize
53B
MD52bd9b4be30579e633fc0191aa93df486
SHA17d63a9bd9662e86666b27c1b50db8e7370c624ff
SHA25664dc39f3004dc93c9fc4f1467b4807f2d8e3eb0bfa96b15c19cd8e7d6fa77a1d
SHA512ae6dd7b39191354cf43cf65e517460d7d4c61b8f5c08e33e6ca3c451dc7cab4de89f33934c89396b80f1aade0a4e2571bd5ae8b76ef80b737d4588703d2814d5
-
Filesize
290B
MD519a440fdac7f578f2fb33719698a082c
SHA1ebadce21c65d05ad62a324deb39c57aecd3edf2c
SHA256b176d41b748466f8ba35246c78a1c940f65403b363c086ccd5b5de577a87cf69
SHA5128bdfac90e7235fc35eeec141a1e2145ed4ea5a250b71bdf0cf0e5e5aa59ab6dc004dc08561bd5547c4a4a106138c98950dc2098c905ce785b9b2c0657684d7bb