Resubmissions

Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    ubuntu-24.04_amd64
  • resource
    ubuntu2404-amd64-20240523-en
  • resource tags

    arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system
  • submitted
    17/02/2025, 22:37

General

  • Target

    The-MALWARE-Repo-master/Botnets/FritzFrog/7745b070943e910e8807e3521ac7b7a01401d131bf6c18a63433f8177ed539a6

  • Size

    8.7MB

  • MD5

    d4e533f9c11b5cc9e755d94c1315553a

  • SHA1

    9e15020cd2688b537bae18e5f291ee8cbe9a85e7

  • SHA256

    7745b070943e910e8807e3521ac7b7a01401d131bf6c18a63433f8177ed539a6

  • SHA512

    149226355b2e5c3fac403289b5e66bd4164a7aee76d8dc8f1d698c509db7a081bad9d4172cc950bb0e6e6909e0073d551dcde82cbeaaf61a9c1b02c9ba48fb38

  • SSDEEP

    98304:H27or8Dynb9c4EHv9/fW/NQXPvTCaedQuMBiHAUU4C7Xk:H27or8DyO4UnwQfvTCXdQuMoUj

Malware Config

Signatures

  • Adds new SSH keys 1 TTPs 1 IoCs

    Linux special file to hold SSH keys. The threat actor may add new keys for further remote access.

  • Deletes itself 1 IoCs
  • Deletes log files 1 TTPs 1 IoCs

    Deletes log files on the system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Virtualization/Sandbox Evasion: Time Based Evasion 1 TTPs 15 IoCs

    Adversaries may detect and evade virtualized environments and sandboxes.

  • Checks CPU configuration 1 TTPs 1 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 4 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/7745b070943e910e8807e3521ac7b7a01401d131bf6c18a63433f8177ed539a6
    /tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/7745b070943e910e8807e3521ac7b7a01401d131bf6c18a63433f8177ed539a6
    1⤵
    • Adds new SSH keys
    • Deletes itself
    • Deletes log files
    • Reads runtime system information
    • Writes file to tmp directory
    PID:3638
    • /usr/bin/uname
      uname -a
      2⤵
        PID:3653
      • /usr/bin/cat
        cat /proc/cpuinfo
        2⤵
        • Checks CPU configuration
        PID:3655
      • /usr/bin/cat
        cat /etc/issue
        2⤵
          PID:3656
        • /usr/bin/free
          free -m
          2⤵
            PID:3657
          • /usr/bin/uptime
            uptime
            2⤵
            • Virtualization/Sandbox Evasion: Time Based Evasion
            • Reads runtime system information
            PID:3658
          • /usr/bin/journalctl
            journalctl -S "@0" -u sshd
            2⤵
            • Reads runtime system information
            PID:3659
          • /usr/bin/cat
            cat "/var/log/auth*"
            2⤵
              PID:3661
            • /usr/bin/zcat
              zcat "/var/log/auth*"
              2⤵
                PID:3662
              • /usr/local/sbin/gzip
                gzip -cd "/var/log/auth*"
                2⤵
                • System Network Configuration Discovery
                PID:3662
              • /usr/local/bin/gzip
                gzip -cd "/var/log/auth*"
                2⤵
                • System Network Configuration Discovery
                PID:3662
              • /usr/sbin/gzip
                gzip -cd "/var/log/auth*"
                2⤵
                • System Network Configuration Discovery
                PID:3662
              • /usr/bin/gzip
                gzip -cd "/var/log/auth*"
                2⤵
                • System Network Configuration Discovery
                PID:3662
              • /usr/bin/free
                free -m
                2⤵
                • Reads runtime system information
                PID:3663
              • /usr/bin/uptime
                uptime
                2⤵
                • Virtualization/Sandbox Evasion: Time Based Evasion
                PID:3664
              • /usr/bin/free
                free -m
                2⤵
                  PID:3683
                • /usr/bin/uptime
                  uptime
                  2⤵
                  • Virtualization/Sandbox Evasion: Time Based Evasion
                  • Reads runtime system information
                  PID:3684
                • /usr/bin/free
                  free -m
                  2⤵
                  • Reads runtime system information
                  PID:3688
                • /usr/bin/uptime
                  uptime
                  2⤵
                  • Virtualization/Sandbox Evasion: Time Based Evasion
                  PID:3689
                • /usr/bin/free
                  free -m
                  2⤵
                    PID:3690
                  • /usr/bin/uptime
                    uptime
                    2⤵
                    • Virtualization/Sandbox Evasion: Time Based Evasion
                    • Reads runtime system information
                    PID:3691
                  • /usr/bin/free
                    free -m
                    2⤵
                      PID:3692
                    • /usr/bin/uptime
                      uptime
                      2⤵
                      • Virtualization/Sandbox Evasion: Time Based Evasion
                      PID:3693
                    • /usr/bin/free
                      free -m
                      2⤵
                        PID:3694
                      • /usr/bin/uptime
                        uptime
                        2⤵
                        • Virtualization/Sandbox Evasion: Time Based Evasion
                        PID:3695
                      • /usr/bin/free
                        free -m
                        2⤵
                          PID:3696
                        • /usr/bin/uptime
                          uptime
                          2⤵
                          • Virtualization/Sandbox Evasion: Time Based Evasion
                          PID:3697
                        • /usr/bin/free
                          free -m
                          2⤵
                          • Reads runtime system information
                          PID:3698
                        • /usr/bin/uptime
                          uptime
                          2⤵
                          • Virtualization/Sandbox Evasion: Time Based Evasion
                          PID:3699
                        • /usr/bin/free
                          free -m
                          2⤵
                            PID:3700
                          • /usr/bin/uptime
                            uptime
                            2⤵
                            • Virtualization/Sandbox Evasion: Time Based Evasion
                            PID:3701
                          • /usr/bin/free
                            free -m
                            2⤵
                            • Reads runtime system information
                            PID:3702
                          • /usr/bin/uptime
                            uptime
                            2⤵
                            • Virtualization/Sandbox Evasion: Time Based Evasion
                            PID:3703
                          • /usr/bin/free
                            free -m
                            2⤵
                              PID:3704
                            • /usr/bin/uptime
                              uptime
                              2⤵
                              • Virtualization/Sandbox Evasion: Time Based Evasion
                              PID:3705
                            • /usr/bin/free
                              free -m
                              2⤵
                                PID:3706
                              • /usr/bin/uptime
                                uptime
                                2⤵
                                • Virtualization/Sandbox Evasion: Time Based Evasion
                                • Reads runtime system information
                                PID:3707
                              • /usr/bin/free
                                free -m
                                2⤵
                                  PID:3708
                                • /usr/bin/uptime
                                  uptime
                                  2⤵
                                  • Virtualization/Sandbox Evasion: Time Based Evasion
                                  PID:3709
                                • /usr/bin/free
                                  free -m
                                  2⤵
                                    PID:3725
                                  • /usr/bin/uptime
                                    uptime
                                    2⤵
                                    • Virtualization/Sandbox Evasion: Time Based Evasion
                                    PID:3726

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • /tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/nc

                                  Filesize

                                  8.7MB

                                  MD5

                                  d4e533f9c11b5cc9e755d94c1315553a

                                  SHA1

                                  9e15020cd2688b537bae18e5f291ee8cbe9a85e7

                                  SHA256

                                  7745b070943e910e8807e3521ac7b7a01401d131bf6c18a63433f8177ed539a6

                                  SHA512

                                  149226355b2e5c3fac403289b5e66bd4164a7aee76d8dc8f1d698c509db7a081bad9d4172cc950bb0e6e6909e0073d551dcde82cbeaaf61a9c1b02c9ba48fb38