Analysis
-
max time kernel
125s -
max time network
132s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240508-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240508-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
23/02/2025, 02:39
Behavioral task
behavioral1
Sample
8fd2ef68325614ca08a318ee89a9747fcc680b5802fe64b3439e25fb987d375f.elf
Resource
ubuntu2004-amd64-20240508-en
General
-
Target
8fd2ef68325614ca08a318ee89a9747fcc680b5802fe64b3439e25fb987d375f.elf
-
Size
111KB
-
MD5
1d94761620e2fb40d084f3b1d8029a67
-
SHA1
80e691debcf5981bbe1a8d27b848fe581453299f
-
SHA256
8fd2ef68325614ca08a318ee89a9747fcc680b5802fe64b3439e25fb987d375f
-
SHA512
9db49a44d4d32c6bc1e8ed76f5de5e852e97d5b7495eb06c1ce40ac50ac19c29baa525685914d414c388d3c397233ea894abd1d3508d03b1fbbb564d9497836e
-
SSDEEP
3072:p61RPKvVjRWDTEEvQVzCdUC/EWi1sB5htYozmB80CjKaIU:p61RPKvVjRWDTEzb1sB5ht/mB80C+aIU
Malware Config
Signatures
-
description ioc Process File deleted /var/log/audit/audit.log rm -
Deletes itself 1 IoCs
pid 1419 -
Deletes journal logs 1 TTPs 4 IoCs
Deletes systemd journal logs. Likely to evade detection.
description ioc Process File deleted /var/log/journal/4816dd152e8c48ff97e9117d197c13d8/[email protected]~ rm File deleted /var/log/journal/4816dd152e8c48ff97e9117d197c13d8/system.journal rm File deleted /var/log/journal/4816dd152e8c48ff97e9117d197c13d8/system@86d9cc55110044da96b4d5aff8e2e1e3-0000000000000001-000617ecd8730315.journal rm File deleted /var/log/journal/4816dd152e8c48ff97e9117d197c13d8 rm -
Deletes system logs 1 TTPs 2 IoCs
Deletes log file which contains global system messages. Adversaries may delete system logs to minimize their footprint.
description ioc Process File deleted /var/log/syslog rm File deleted /var/log/dmesg rm -
Flushes firewall rules 1 TTPs 7 IoCs
Flushes/ disables firewall rules inside the Linux kernel.
pid Process 1474 iptables 1493 iptables 1494 iptables 1496 systemctl 1496 systemctl 1496 systemctl 1496 systemctl -
Reads EFI boot settings 1 TTPs 6 IoCs
Reads EFI boot settings from the efivars filesystem, may contain security secrets or sensitive data.
description ioc Process File opened for reading /sys/firmware/efi/efivars/SystemdOptions-8cf2644b-4b0b-428f-9387-6d876050dc67 systemctl File opened for reading /sys/firmware/efi/efivars/SystemdOptions-8cf2644b-4b0b-428f-9387-6d876050dc67 systemctl File opened for reading /sys/firmware/efi/efivars/SystemdOptions-8cf2644b-4b0b-428f-9387-6d876050dc67 systemctl File opened for reading /sys/firmware/efi/efivars/SystemdOptions-8cf2644b-4b0b-428f-9387-6d876050dc67 systemctl File opened for reading /sys/firmware/efi/efivars/SystemdOptions-8cf2644b-4b0b-428f-9387-6d876050dc67 systemctl File opened for reading /sys/firmware/efi/efivars/SystemdOptions-8cf2644b-4b0b-428f-9387-6d876050dc67 systemctl -
Writes DNS configuration 1 TTPs 1 IoCs
Writes data to DNS resolver config file.
description ioc File opened for modification /etc/resolv.conf -
Abuse Elevation Control Mechanism: Sudo and Sudo Caching 1 TTPs 1 IoCs
Abuse sudo or cached sudo credentials to execute code.
pid Process 1423 rm -
description ioc Process File deleted /var/log/dmesg.0 rm File deleted /var/log/apt/history.log rm File deleted /var/log/apt/term.log rm File deleted /var/log/speech-dispatcher rm File deleted /var/log/wtmp rm File deleted /var/log/installer/hardware-summary rm File deleted /var/log/openvpn rm File deleted /var/log/hp/tmp rm File deleted /var/log/wtmp rm File deleted /var/log/journal rm File deleted /var/log/kern.log rm File deleted /var/log/audit rm File deleted /var/log/installer/cdebconf rm File deleted /var/log/private rm File deleted /var/log/unattended-upgrades rm File deleted /var/log/dpkg.log rm File deleted /var/log/installer/cdebconf/templates.dat rm File deleted /var/log/installer/cdebconf/questions.dat rm File deleted /var/log/installer/syslog rm File deleted /var/log/installer/status rm File deleted /var/log/Xorg.0.log.old rm File deleted /var/log/cups rm File deleted /var/log/alternatives.log rm File deleted /var/log/btmp rm File deleted /var/log/installer rm File deleted /var/log/faillog rm File deleted /var/log/installer/lsb-release rm File deleted /var/log/installer/partman rm File deleted /var/log/hp rm File deleted /var/log/apt/eipp.log.xz rm File deleted /var/log/apt rm File deleted /var/log/cups/access_log rm File deleted /var/log/lastlog rm File deleted /var/log/unattended-upgrades/unattended-upgrades-shutdown.log rm File deleted /var/log/fontconfig.log rm File deleted /var/log/gdm3 rm File deleted /var/log/ubuntu-advantage.log rm File deleted /var/log/Xorg.0.log rm File deleted /var/log/auth.log rm File deleted /var/log/gpu-manager.log rm File deleted /var/log/dist-upgrade rm File deleted /var/log/installer/initial-status.gz rm File deleted /var/log/dmesg.1.gz rm -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc File opened for reading /proc/net/route -
Changes its process name 1 IoCs
description pid Changes the process name, possibly in an attempt to hide itself 1419 -
Reads CPU attributes 1 TTPs 3 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc File opened for reading /proc/net/route -
description ioc Process File opened for reading /proc/6/cmdline pkill File opened for reading /proc/7/cmdline pkill File opened for reading /proc/167/cmdline pkill File opened for reading /proc/1078/cmdline pkill File opened for reading /proc/1076/cmdline pkill File opened for reading /proc/1071/cmdline pkill File opened for reading /proc/1223/status pkill File opened for reading /proc/79/cmdline pkill File opened for reading /proc/175/status pkill File opened for reading /proc/1363/cmdline pkill File opened for reading /proc/826/status pkill File opened for reading /proc/1002/status pkill File opened for reading /proc/1118/status pkill File opened for reading /proc/82/status pkill File opened for reading /proc/441/cmdline pkill File opened for reading /proc/1/status pkill File opened for reading /proc/118/status pkill File opened for reading /proc/87/cmdline pkill File opened for reading /proc/3/status pkill File opened for reading /proc/1052/cmdline pkill File opened for reading /proc/483/cmdline pkill File opened for reading /proc/801/status pkill File opened for reading /proc/440/status pkill File opened for reading /proc/667/cmdline pkill File opened for reading /proc/453/status pkill File opened for reading /proc/673/cmdline pkill File opened for reading /proc/81/status pkill File opened for reading /proc/494/status pkill File opened for reading /proc/1043/status pkill File opened for reading /proc/90/status pkill File opened for reading /proc/637/status pkill File opened for reading /proc/177/status pkill File opened for reading /proc/5/status pkill File opened for reading /proc/140/status pkill File opened for reading /proc/4/status pkill File opened for reading /proc/159/status pkill File opened for reading /proc/22/status pkill File opened for reading /proc/75/cmdline pkill File opened for reading /proc/88/status pkill File opened for reading /proc/617/cmdline pkill File opened for reading /proc/85/cmdline pkill File opened for reading /proc/164/cmdline pkill File opened for reading /proc/1142/cmdline pkill File opened for reading /proc/440/status pkill File opened for reading /proc/174/cmdline pkill File opened for reading /proc/2/cmdline pkill File opened for reading /proc/82/cmdline pkill File opened for reading /proc/1021/status pkill File opened for reading /proc/1479/status pkill File opened for reading /proc/453/status pkill File opened for reading /proc/965/cmdline pkill File opened for reading /proc/989/cmdline pkill File opened for reading /proc/81/status pkill File opened for reading /proc/201/status pkill File opened for reading /proc/72/cmdline pkill File opened for reading /proc/85/status pkill File opened for reading /proc/264/cmdline pkill File opened for reading /proc/self/stat systemctl File opened for reading /proc/23/status pkill File opened for reading /proc/118/status pkill File opened for reading /proc/455/status pkill File opened for reading /proc/1355/cmdline pkill File opened for reading /proc/71/cmdline pkill File opened for reading /proc/923/status pkill -
System Network Configuration Discovery 1 TTPs 1 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1485 service
Processes
-
/usr/bin/rmrm -rf /tmp/config-err-Fcvqbj /tmp/snap-private-tmp /tmp/ssh-RD3nCu0ZcjnV /tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-ModemManager.service-vfeCQf /tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-colord.service-aILiXe /tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-switcheroo-control.service-g26sbj /tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-systemd-logind.service-7gxyJi /tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-systemd-resolved.service-aBHzch /tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-systemd-timedated.service-KbjOSf /tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-upower.service-CVJdcg /var/backups /var/cache /var/crash /var/lib /var/local /var/lock /var/log /var/mail /var/metrics /var/opt /var/run /var/snap /var/spool /var/tmp /var/run/NetworkManager /var/run/acpid.pid /var/run/acpid.socket /var/run/agetty.reload /var/run/atd.pid /var/run/auditd.pid /var/run/avahi-daemon /var/run/blkid /var/run/console-setup /var/run/crond.pid /var/run/crond.reboot /var/run/cups /var/run/dbus /var/run/fsck /var/run/gdm3 /var/run/gdm3.pid /var/run/initctl /var/run/initramfs /var/run/lock /var/run/log /var/run/mount /var/run/openvpn /var/run/openvpn-client /var/run/openvpn-server /var/run/sendsigs.omit.d /var/run/shm /var/run/snapd-snap.socket /var/run/snapd.socket /var/run/speech-dispatcher /var/run/spice-vdagentd /var/run/sshd /var/run/sshd.pid /var/run/sudo /var/run/systemd /var/run/tmpfiles.d /var/run/udev /var/run/udisks2 /var/run/user /var/run/utmp /var/run/uuidd /var/tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-ModemManager.service-CnIqtj /var/tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-colord.service-D4lzvi /var/tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-switcheroo-control.service-GvJUvj /var/tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-systemd-logind.service-THgT7e /var/tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-systemd-resolved.service-AHuj5f /var/tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-systemd-timedated.service-wOLZwh /var/tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-upower.service-rG55Qg1⤵
- Deletes Audit logs
- Deletes journal logs
- Deletes system logs
- Abuse Elevation Control Mechanism: Sudo and Sudo Caching
- Deletes log files
PID:1423
-
/usr/bin/rmrm -rf /var/log/wtmp1⤵
- Deletes log files
PID:1468
-
/usr/bin/rmrm -rf "/tmp/*"1⤵PID:1470
-
/usr/bin/rmrm -rf /bin/netstat1⤵PID:1472
-
/usr/sbin/iptablesiptables -F1⤵
- Flushes firewall rules
PID:1474
-
/usr/bin/pkillpkill -9 busybox1⤵
- Reads CPU attributes
- Reads runtime system information
PID:1479
-
/usr/bin/pkillpkill -9 perl1⤵
- Reads CPU attributes
- Reads runtime system information
PID:1481
-
/usr/bin/pkillpkill -9 python1⤵
- Reads CPU attributes
- Reads runtime system information
PID:1483
-
/usr/sbin/serviceservice iptables stop1⤵
- System Network Configuration Discovery
PID:1485 -
/usr/bin/basenamebasename /usr/sbin/service2⤵PID:1486
-
-
/usr/bin/basenamebasename /usr/sbin/service2⤵PID:1487
-
-
/usr/bin/systemctlsystemctl --quiet is-active multi-user.target2⤵
- Reads EFI boot settings
PID:1488
-
-
/usr/bin/sedsed -ne "s/\\.socket\\s*[a-z]*\\s*\$/.socket/p"2⤵PID:1491
-
-
/usr/bin/systemctlsystemctl list-unit-files --full "--type=socket"2⤵
- Reads EFI boot settings
PID:1490
-
-
/usr/local/sbin/systemctlsystemctl stop iptables.service1⤵PID:1485
-
/usr/local/bin/systemctlsystemctl stop iptables.service1⤵PID:1485
-
/usr/sbin/systemctlsystemctl stop iptables.service1⤵PID:1485
-
/usr/bin/systemctlsystemctl stop iptables.service1⤵
- Reads EFI boot settings
PID:1485
-
/sbin/iptables/sbin/iptables -F1⤵
- Flushes firewall rules
PID:1493
-
/sbin/iptables/sbin/iptables -X1⤵
- Flushes firewall rules
PID:1494
-
/usr/sbin/serviceservice firewalld stop1⤵PID:1496
-
/usr/bin/basenamebasename /usr/sbin/service2⤵PID:1497
-
-
/usr/bin/basenamebasename /usr/sbin/service2⤵PID:1498
-
-
/usr/bin/systemctlsystemctl --quiet is-active multi-user.target2⤵
- Reads EFI boot settings
- Reads runtime system information
PID:1499
-
-
/usr/bin/sedsed -ne "s/\\.socket\\s*[a-z]*\\s*\$/.socket/p"2⤵PID:1502
-
-
/usr/bin/systemctlsystemctl list-unit-files --full "--type=socket"2⤵
- Reads EFI boot settings
PID:1501
-
-
/usr/local/sbin/systemctlsystemctl stop firewalld.service1⤵
- Flushes firewall rules
PID:1496
-
/usr/local/bin/systemctlsystemctl stop firewalld.service1⤵
- Flushes firewall rules
PID:1496
-
/usr/sbin/systemctlsystemctl stop firewalld.service1⤵
- Flushes firewall rules
PID:1496
-
/usr/bin/systemctlsystemctl stop firewalld.service1⤵
- Flushes firewall rules
- Reads EFI boot settings
PID:1496
-
/usr/bin/rmrm -rf "~/.bash_history"1⤵PID:1504
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Abuse Elevation Control Mechanism
1Sudo and Sudo Caching
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
4Clear Linux or Mac System Logs
4Pre-OS Boot
1Bootkit
1