Analysis

  • max time kernel
    11s
  • max time network
    32s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20240611-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    03-12-2024 08:34

General

  • Target

    3b15778595cef00d1a51035dd4fd65e6be97e73544cb1899f40aec4aaa0445ae

  • Size

    1KB

  • MD5

    51a900215c41691542f83df8cb053ef7

  • SHA1

    efaca58b61cb70b87a075fad593c81beb757ad7e

  • SHA256

    3b15778595cef00d1a51035dd4fd65e6be97e73544cb1899f40aec4aaa0445ae

  • SHA512

    15ff74bcc1f503f31cc8bff6fad446a1f5a7c774b13c623071ceb480bddef28d7a942f1e15b68a98eaa6e481a581c6792b734075011bd96a34fcbf0e256aa5b1

Malware Config

Signatures

  • File and Directory Permissions Modification 1 TTPs 1 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 1 IoCs
  • Reads AppArmor ptrace settings 1 TTPs 1 IoCs

    Discovery of allowed ptrace capabilities by AppArmor.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads hardware information 1 TTPs 1 IoCs

    Accesses system info like serial numbers, manufacturer names etc.

  • Reads network interface configuration 2 TTPs 12 IoCs

    Fetches information about one or more active network interfaces.

  • Reads CPU attributes 1 TTPs 22 IoCs
  • Enumerates kernel/hardware configuration 1 TTPs 64 IoCs

    Reads contents of /sys virtual filesystem to enumerate system information.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/3b15778595cef00d1a51035dd4fd65e6be97e73544cb1899f40aec4aaa0445ae
    /tmp/3b15778595cef00d1a51035dd4fd65e6be97e73544cb1899f40aec4aaa0445ae
    1⤵
      PID:1481
      • /bin/uname
        uname -mp
        2⤵
          PID:1482
        • /bin/grep
          grep -q x86_64
          2⤵
            PID:1486
          • /usr/bin/awk
            awk "{print \$2}"
            2⤵
              PID:1491
            • /bin/grep
              grep noexec
              2⤵
                PID:1490
              • /bin/cat
                cat /proc/mounts
                2⤵
                  PID:1489
                • /usr/bin/whoami
                  whoami
                  2⤵
                    PID:1496
                  • /usr/bin/find
                    find / -type d -user root -perm "-u=rwx" -not -path "/tmp/*" -not -path "/proc/*" -not -path /sys -not -path "/sys/*" -not -path /proc -not -path "/proc/*" -not -path /dev/pts -not -path "/dev/pts/*" -not -path /run -not -path "/run/*" -not -path /sys/kernel/security -not -path "/sys/kernel/security/*" -not -path /run/lock -not -path "/run/lock/*" -not -path /sys/fs/cgroup -not -path "/sys/fs/cgroup/*" -not -path /sys/fs/cgroup/unified -not -path "/sys/fs/cgroup/unified/*" -not -path /sys/fs/cgroup/systemd -not -path "/sys/fs/cgroup/systemd/*" -not -path /sys/fs/pstore -not -path "/sys/fs/pstore/*" -not -path /sys/fs/cgroup/perf_event -not -path "/sys/fs/cgroup/perf_event/*" -not -path /sys/fs/cgroup/freezer -not -path "/sys/fs/cgroup/freezer/*" -not -path /sys/fs/cgroup/cpuset -not -path "/sys/fs/cgroup/cpuset/*" -not -path "/sys/fs/cgroup/cpu,cpuacct" -not -path "/sys/fs/cgroup/cpu,cpuacct/*" -not -path /sys/fs/cgroup/memory -not -path "/sys/fs/cgroup/memory/*" -not -path /sys/fs/cgroup/devices -not -path "/sys/fs/cgroup/devices/*" -not -path /sys/fs/cgroup/hugetlb -not -path "/sys/fs/cgroup/hugetlb/*" -not -path /sys/fs/cgroup/rdma -not -path "/sys/fs/cgroup/rdma/*" -not -path "/sys/fs/cgroup/net_cls,net_prio" -not -path "/sys/fs/cgroup/net_cls,net_prio/*" -not -path /sys/fs/cgroup/blkio -not -path "/sys/fs/cgroup/blkio/*" -not -path /sys/fs/cgroup/pids -not -path "/sys/fs/cgroup/pids/*"
                    2⤵
                    • Reads AppArmor ptrace settings
                    • Reads hardware information
                    • Reads network interface configuration
                    • Reads CPU attributes
                    • Enumerates kernel/hardware configuration
                    • Reads runtime system information
                    PID:1497
                  • /usr/bin/touch
                    touch .testfile
                    2⤵
                      PID:1510
                    • /bin/dd
                      dd "if=/dev/zero" "of=.testfile2" "bs=2M" "count=1"
                      2⤵
                        PID:1512
                      • /bin/rm
                        rm -rf .testfile .testfile2
                        2⤵
                          PID:1513
                        • /bin/cp
                          cp -r "/tmp/redtail.*" /
                          2⤵
                            PID:1514
                          • /bin/rm
                            rm -rf .redtail
                            2⤵
                              PID:1515
                            • /bin/cat
                              cat redtail.x86_64
                              2⤵
                                PID:1516
                              • /bin/chmod
                                chmod +x .redtail
                                2⤵
                                • File and Directory Permissions Modification
                                PID:1517
                              • /.redtail
                                ./.redtail ssh
                                2⤵
                                • Executes dropped EXE
                                PID:1518
                              • /bin/rm
                                rm -rf "redtail.*"
                                2⤵
                                  PID:1520
                                • /bin/rm
                                  rm -rf "/tmp/redtail.*"
                                  2⤵
                                    PID:1521

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • /.testfile2

                                  Filesize

                                  2.0MB

                                  MD5

                                  b2d1236c286a3c0704224fe4105eca49

                                  SHA1

                                  7d76d48d64d7ac5411d714a4bb83f37e3e5b8df6

                                  SHA256

                                  5647f05ec18958947d32874eeb788fa396a05d0bab7c1b71f112ceb7e9b31eee

                                  SHA512

                                  731859029215873fdac1c9f2f8bd25a334abf0f3a9e1b057cf2cacc2826d86b0c26a3fa920a936421401c0471f38857cb53ba905489ea46b185209fdff65b3b6