Analysis

  • max time kernel
    125s
  • max time network
    132s
  • platform
    ubuntu-20.04_amd64
  • resource
    ubuntu2004-amd64-20240508-en
  • resource tags

    arch:amd64arch:i386image:ubuntu2004-amd64-20240508-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system
  • submitted
    23/02/2025, 02:39

General

  • Target

    8fd2ef68325614ca08a318ee89a9747fcc680b5802fe64b3439e25fb987d375f.elf

  • Size

    111KB

  • MD5

    1d94761620e2fb40d084f3b1d8029a67

  • SHA1

    80e691debcf5981bbe1a8d27b848fe581453299f

  • SHA256

    8fd2ef68325614ca08a318ee89a9747fcc680b5802fe64b3439e25fb987d375f

  • SHA512

    9db49a44d4d32c6bc1e8ed76f5de5e852e97d5b7495eb06c1ce40ac50ac19c29baa525685914d414c388d3c397233ea894abd1d3508d03b1fbbb564d9497836e

  • SSDEEP

    3072:p61RPKvVjRWDTEEvQVzCdUC/EWi1sB5htYozmB80CjKaIU:p61RPKvVjRWDTEzb1sB5ht/mB80C+aIU

Malware Config

Signatures

  • Deletes Audit logs 1 TTPs 1 IoCs

    Deletes logs related to the Linux Audit framework.

  • Deletes itself 1 IoCs
  • Deletes journal logs 1 TTPs 4 IoCs

    Deletes systemd journal logs. Likely to evade detection.

  • Deletes system logs 1 TTPs 2 IoCs

    Deletes log file which contains global system messages. Adversaries may delete system logs to minimize their footprint.

  • Flushes firewall rules 1 TTPs 7 IoCs

    Flushes/ disables firewall rules inside the Linux kernel.

  • Reads EFI boot settings 1 TTPs 6 IoCs

    Reads EFI boot settings from the efivars filesystem, may contain security secrets or sensitive data.

  • Writes DNS configuration 1 TTPs 1 IoCs

    Writes data to DNS resolver config file.

  • Abuse Elevation Control Mechanism: Sudo and Sudo Caching 1 TTPs 1 IoCs

    Abuse sudo or cached sudo credentials to execute code.

  • Deletes log files 1 TTPs 43 IoCs

    Deletes log files on the system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Changes its process name 1 IoCs
  • Reads CPU attributes 1 TTPs 3 IoCs
  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 1 IoCs

    Adversaries may gather information about the network configuration of a system.

Processes

  • /usr/bin/rm
    rm -rf /tmp/config-err-Fcvqbj /tmp/snap-private-tmp /tmp/ssh-RD3nCu0ZcjnV /tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-ModemManager.service-vfeCQf /tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-colord.service-aILiXe /tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-switcheroo-control.service-g26sbj /tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-systemd-logind.service-7gxyJi /tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-systemd-resolved.service-aBHzch /tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-systemd-timedated.service-KbjOSf /tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-upower.service-CVJdcg /var/backups /var/cache /var/crash /var/lib /var/local /var/lock /var/log /var/mail /var/metrics /var/opt /var/run /var/snap /var/spool /var/tmp /var/run/NetworkManager /var/run/acpid.pid /var/run/acpid.socket /var/run/agetty.reload /var/run/atd.pid /var/run/auditd.pid /var/run/avahi-daemon /var/run/blkid /var/run/console-setup /var/run/crond.pid /var/run/crond.reboot /var/run/cups /var/run/dbus /var/run/fsck /var/run/gdm3 /var/run/gdm3.pid /var/run/initctl /var/run/initramfs /var/run/lock /var/run/log /var/run/mount /var/run/openvpn /var/run/openvpn-client /var/run/openvpn-server /var/run/sendsigs.omit.d /var/run/shm /var/run/snapd-snap.socket /var/run/snapd.socket /var/run/speech-dispatcher /var/run/spice-vdagentd /var/run/sshd /var/run/sshd.pid /var/run/sudo /var/run/systemd /var/run/tmpfiles.d /var/run/udev /var/run/udisks2 /var/run/user /var/run/utmp /var/run/uuidd /var/tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-ModemManager.service-CnIqtj /var/tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-colord.service-D4lzvi /var/tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-switcheroo-control.service-GvJUvj /var/tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-systemd-logind.service-THgT7e /var/tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-systemd-resolved.service-AHuj5f /var/tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-systemd-timedated.service-wOLZwh /var/tmp/systemd-private-de9d894fd8a0432b97f38b4df9455b28-upower.service-rG55Qg
    1⤵
    • Deletes Audit logs
    • Deletes journal logs
    • Deletes system logs
    • Abuse Elevation Control Mechanism: Sudo and Sudo Caching
    • Deletes log files
    PID:1423
  • /usr/bin/rm
    rm -rf /var/log/wtmp
    1⤵
    • Deletes log files
    PID:1468
  • /usr/bin/rm
    rm -rf "/tmp/*"
    1⤵
      PID:1470
    • /usr/bin/rm
      rm -rf /bin/netstat
      1⤵
        PID:1472
      • /usr/sbin/iptables
        iptables -F
        1⤵
        • Flushes firewall rules
        PID:1474
      • /usr/bin/pkill
        pkill -9 busybox
        1⤵
        • Reads CPU attributes
        • Reads runtime system information
        PID:1479
      • /usr/bin/pkill
        pkill -9 perl
        1⤵
        • Reads CPU attributes
        • Reads runtime system information
        PID:1481
      • /usr/bin/pkill
        pkill -9 python
        1⤵
        • Reads CPU attributes
        • Reads runtime system information
        PID:1483
      • /usr/sbin/service
        service iptables stop
        1⤵
        • System Network Configuration Discovery
        PID:1485
        • /usr/bin/basename
          basename /usr/sbin/service
          2⤵
            PID:1486
          • /usr/bin/basename
            basename /usr/sbin/service
            2⤵
              PID:1487
            • /usr/bin/systemctl
              systemctl --quiet is-active multi-user.target
              2⤵
              • Reads EFI boot settings
              PID:1488
            • /usr/bin/sed
              sed -ne "s/\\.socket\\s*[a-z]*\\s*\$/.socket/p"
              2⤵
                PID:1491
              • /usr/bin/systemctl
                systemctl list-unit-files --full "--type=socket"
                2⤵
                • Reads EFI boot settings
                PID:1490
            • /usr/local/sbin/systemctl
              systemctl stop iptables.service
              1⤵
                PID:1485
              • /usr/local/bin/systemctl
                systemctl stop iptables.service
                1⤵
                  PID:1485
                • /usr/sbin/systemctl
                  systemctl stop iptables.service
                  1⤵
                    PID:1485
                  • /usr/bin/systemctl
                    systemctl stop iptables.service
                    1⤵
                    • Reads EFI boot settings
                    PID:1485
                  • /sbin/iptables
                    /sbin/iptables -F
                    1⤵
                    • Flushes firewall rules
                    PID:1493
                  • /sbin/iptables
                    /sbin/iptables -X
                    1⤵
                    • Flushes firewall rules
                    PID:1494
                  • /usr/sbin/service
                    service firewalld stop
                    1⤵
                      PID:1496
                      • /usr/bin/basename
                        basename /usr/sbin/service
                        2⤵
                          PID:1497
                        • /usr/bin/basename
                          basename /usr/sbin/service
                          2⤵
                            PID:1498
                          • /usr/bin/systemctl
                            systemctl --quiet is-active multi-user.target
                            2⤵
                            • Reads EFI boot settings
                            • Reads runtime system information
                            PID:1499
                          • /usr/bin/sed
                            sed -ne "s/\\.socket\\s*[a-z]*\\s*\$/.socket/p"
                            2⤵
                              PID:1502
                            • /usr/bin/systemctl
                              systemctl list-unit-files --full "--type=socket"
                              2⤵
                              • Reads EFI boot settings
                              PID:1501
                          • /usr/local/sbin/systemctl
                            systemctl stop firewalld.service
                            1⤵
                            • Flushes firewall rules
                            PID:1496
                          • /usr/local/bin/systemctl
                            systemctl stop firewalld.service
                            1⤵
                            • Flushes firewall rules
                            PID:1496
                          • /usr/sbin/systemctl
                            systemctl stop firewalld.service
                            1⤵
                            • Flushes firewall rules
                            PID:1496
                          • /usr/bin/systemctl
                            systemctl stop firewalld.service
                            1⤵
                            • Flushes firewall rules
                            • Reads EFI boot settings
                            PID:1496
                          • /usr/bin/rm
                            rm -rf "~/.bash_history"
                            1⤵
                              PID:1504

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads