Overview
overview
10Static
static
10The-MALWAR...ot.exe
windows10-2004-x64
10The-MALWAR...ll.exe
windows10-2004-x64
10The-MALWAR...BS.exe
windows10-2004-x64
10The-MALWAR...in.exe
windows10-2004-x64
7The-MALWAR....A.exe
windows10-2004-x64
7The-MALWAR....A.exe
windows10-2004-x64
10The-MALWAR....A.dll
windows10-2004-x64
7The-MALWAR...r.xlsm
windows10-2004-x64
10The-MALWAR...36c859
ubuntu-24.04-amd64
8The-MALWAR...caa742
ubuntu-24.04-amd64
8The-MALWAR...c1a732
ubuntu-24.04-amd64
8The-MALWAR...57c046
ubuntu-24.04-amd64
8The-MALWAR...460a01
ubuntu-24.04-amd64
8The-MALWAR...ece0c5
ubuntu-24.04-amd64
8The-MALWAR...257619
ubuntu-18.04-amd64
8The-MALWAR...fbcc59
ubuntu-24.04-amd64
8The-MALWAR...54f69c
ubuntu-24.04-amd64
8The-MALWAR...d539a6
ubuntu-24.04-amd64
8The-MALWAR...4996dd
ubuntu-24.04-amd64
8The-MALWAR...8232d5
ubuntu-18.04-amd64
8The-MALWAR...66b948
ubuntu-22.04-amd64
8The-MALWAR...f9db86
ubuntu-24.04-amd64
8The-MALWAR...ea2485
ubuntu-24.04-amd64
8The-MALWAR...us.exe
windows10-2004-x64
7The-MALWAR....a.exe
windows10-2004-x64
3The-MALWAR....a.exe
windows10-2004-x64
7The-MALWAR...ok.exe
windows10-2004-x64
1The-MALWAR...y.html
windows10-2004-x64
4The-MALWAR...ft.exe
windows10-2004-x64
4The-MALWAR...en.exe
windows10-2004-x64
6The-MALWAR...ve.apk
android-9-x86
The-MALWAR...ve.apk
android-10-x64
Resubmissions
11/04/2025, 21:31
250411-1cz7lazpx8 10Analysis
-
max time kernel
29s -
max time network
2s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20250410-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20250410-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
11/04/2025, 21:31
Static task
static1
Behavioral task
behavioral1
Sample
The-MALWARE-Repo-master/Banking-Malware/DanaBot.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Dridex.JhiSharp.dll.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral3
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexDroppedVBS.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral4
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexLoader.bin.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral6
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral7
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral8
Sample
The-MALWARE-Repo-master/Banking-Malware/Zloader.xlsm
Resource
win10v2004-20250410-en
Behavioral task
behavioral9
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/001eb377f0452060012124cb214f658754c7488ccb82e23ec56b2f45a636c859
Resource
ubuntu2404-amd64-20250410-en
Behavioral task
behavioral10
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/041bc20ca8ac3161098cbc976e67e3c0f1b672ad36ecbe22fd21cbd53bcaa742
Resource
ubuntu2404-amd64-20250410-en
Behavioral task
behavioral11
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/0ab8836efcaa62c7daac314e0b7ab1679319b2901578fd9e95ec3476b4c1a732
Resource
ubuntu2404-amd64-20250307-en
Behavioral task
behavioral12
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/103b8404dc64c9a44511675981a09fd01395ee837452d114f1350c295357c046
Resource
ubuntu2404-amd64-20250410-en
Behavioral task
behavioral13
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01
Resource
ubuntu2404-amd64-20250410-en
Behavioral task
behavioral14
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/3205603282a636979a55aa1e1be518cd3adcbbe491745d996ceb4b5a4dece0c5
Resource
ubuntu2404-amd64-20250410-en
Behavioral task
behavioral15
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/453468b86856665f2cc0e0e71668c0b6aac8b14326c623995ba5963f22257619
Resource
ubuntu1804-amd64-20250410-en
Behavioral task
behavioral16
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/5fb29fb0136978b9ccf60750af09cec74a257a0ca9c47159ca74dbba21fbcc59
Resource
ubuntu2404-amd64-20250307-en
Behavioral task
behavioral17
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/6fe6808b9cfe654f526108ec61cb5211bb6601d28e192cadf06102073b54f69c
Resource
ubuntu2404-amd64-20250410-en
Behavioral task
behavioral18
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/7745b070943e910e8807e3521ac7b7a01401d131bf6c18a63433f8177ed539a6
Resource
ubuntu2404-amd64-20250410-en
Behavioral task
behavioral19
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/7f18e5b5b7645a80a0d44adf3fecdafcbf937bfe30a4cfb965a1421e034996dd
Resource
ubuntu2404-amd64-20250307-en
Behavioral task
behavioral20
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/90b61cc77bb2d726219fd00ae2d0ecdf6f0fe7078529e87b7ec8e603008232d5
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral21
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948
Resource
ubuntu2204-amd64-20250410-en
Behavioral task
behavioral22
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/985ffee662969825146d1b465d068ea4f5f01990d13827511415fd497cf9db86
Resource
ubuntu2404-amd64-20250307-en
Behavioral task
behavioral23
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/d1e82d4a37959a9e6b661e31b8c8c6d2813c93ac92508a2771b2491b04ea2485
Resource
ubuntu2404-amd64-20250410-en
Behavioral task
behavioral24
Sample
The-MALWARE-Repo-master/Email-Worm/Amus.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
The-MALWARE-Repo-master/Email-Worm/Anap.a.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral26
Sample
The-MALWARE-Repo-master/Email-Worm/Axam.a.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral27
Sample
The-MALWARE-Repo-master/Email-Worm/Brontok.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral28
Sample
The-MALWARE-Repo-master/Email-Worm/BubbleBoy.html
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
The-MALWARE-Repo-master/Email-Worm/Bugsoft.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral30
Sample
The-MALWARE-Repo-master/Email-Worm/Duksten.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral31
Sample
The-MALWARE-Repo-master/Trojan/Grave.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral32
Sample
The-MALWARE-Repo-master/Trojan/Grave.apk
Resource
android-x64-20240910-en
General
-
Target
The-MALWARE-Repo-master/Botnets/FritzFrog/9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948
-
Size
8.6MB
-
MD5
4842d5cc29c97aa611fba5ca07b060a5
-
SHA1
f93772038406f28fa4ca1cfb23349193562414b2
-
SHA256
9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948
-
SHA512
cf1cb3f0291f3e0c3b47ff3ee9074b624e2d9781f9637d14ede0628ebb4b8b0fe13e16583f6a933a3e20872ec084dc812237f021757efe2a6d527a0a1723b5c8
-
SSDEEP
98304:JcZJWD3qZL7I9lysBfU9OWQcIImfWoezuA+dTlwO0Fz7Xk:JcZJWTqZLGlHsHQl3fNezuAI5g
Malware Config
Signatures
-
Adds new SSH keys 1 TTPs 1 IoCs
Linux special file to hold SSH keys. The threat actor may add new keys for further remote access.
description ioc Process File opened for modification /root/.ssh/authorized_keys 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 -
Deletes itself 1 IoCs
pid Process 1581 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 -
description ioc Process File deleted /var/log/tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 -
Enumerates running processes
Discovers information about currently running processes on the system
-
Virtualization/Sandbox Evasion: Time Based Evasion 1 TTPs 3 IoCs
Adversaries may detect and evade virtualized environments and sandboxes.
pid Process 1601 uptime 1603 uptime 1593 uptime -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo cat -
Reads CPU attributes 1 TTPs 6 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/online uptime File opened for reading /sys/devices/system/cpu/online free File opened for reading /sys/devices/system/cpu/online uptime File opened for reading /sys/devices/system/cpu/online free File opened for reading /sys/devices/system/cpu/online uptime File opened for reading /sys/devices/system/cpu/online free -
description ioc Process File opened for reading /proc/1094/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/1101/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/1230/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/315/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/640/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/774/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/215/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/731/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/197/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/3/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/uptime uptime File opened for reading /proc/1/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/2/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/594/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/7/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/722/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/1019/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/507/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/93/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/1118/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/24/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/998/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/722/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/799/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/890/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/self/auxv uptime File opened for reading /proc/1095/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/209/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/556/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/1101/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/508/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/88/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/1091/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/1092/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/sys/kernel/osrelease free File opened for reading /proc/1126/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/1230/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/74/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/1097/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/1099/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/16/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/sys/net/core/somaxconn 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/102/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/1116/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/314/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/890/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/1096/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/1575/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/377/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/1009/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/1185/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/1574/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/1040/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/1103/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/1403/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/76/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/94/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/974/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/1278/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/1186/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/119/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/639/cmdline 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/1220/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 File opened for reading /proc/731/stat 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948 -
System Network Configuration Discovery 1 TTPs 4 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1599 gzip 1599 gzip 1599 gzip 1599 gzip -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/nc 9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948
Processes
-
/tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948/tmp/The-MALWARE-Repo-master/Botnets/FritzFrog/9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b9481⤵
- Adds new SSH keys
- Deletes itself
- Deletes log files
- Reads runtime system information
- Writes file to tmp directory
PID:1578 -
/usr/bin/unameuname -a2⤵PID:1589
-
-
/usr/bin/catcat /proc/cpuinfo2⤵
- Checks CPU configuration
PID:1590
-
-
/usr/bin/catcat /etc/issue2⤵PID:1591
-
-
/usr/bin/freefree -m2⤵
- Reads CPU attributes
PID:1592
-
-
/usr/bin/uptimeuptime2⤵
- Virtualization/Sandbox Evasion: Time Based Evasion
- Reads CPU attributes
PID:1593
-
-
/usr/bin/journalctljournalctl -S "@0" -u sshd2⤵PID:1597
-
-
/usr/bin/catcat "/var/log/auth*"2⤵PID:1598
-
-
/usr/bin/zcatzcat "/var/log/auth*"2⤵PID:1599
-
-
/usr/local/sbin/gzipgzip -cd "/var/log/auth*"2⤵
- System Network Configuration Discovery
PID:1599
-
-
/usr/local/bin/gzipgzip -cd "/var/log/auth*"2⤵
- System Network Configuration Discovery
PID:1599
-
-
/usr/sbin/gzipgzip -cd "/var/log/auth*"2⤵
- System Network Configuration Discovery
PID:1599
-
-
/usr/bin/gzipgzip -cd "/var/log/auth*"2⤵
- System Network Configuration Discovery
PID:1599
-
-
/usr/bin/freefree -m2⤵
- Reads CPU attributes
PID:1600
-
-
/usr/bin/uptimeuptime2⤵
- Virtualization/Sandbox Evasion: Time Based Evasion
- Reads CPU attributes
- Reads runtime system information
PID:1601
-
-
/usr/bin/freefree -m2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1602
-
-
/usr/bin/uptimeuptime2⤵
- Virtualization/Sandbox Evasion: Time Based Evasion
- Reads CPU attributes
- Reads runtime system information
PID:1603
-
Network
MITRE ATT&CK Enterprise v16
Defense Evasion
Indicator Removal
1Clear Linux or Mac System Logs
1Virtualization/Sandbox Evasion
2System Checks
1Time Based Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.6MB
MD54842d5cc29c97aa611fba5ca07b060a5
SHA1f93772038406f28fa4ca1cfb23349193562414b2
SHA2569384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948
SHA512cf1cb3f0291f3e0c3b47ff3ee9074b624e2d9781f9637d14ede0628ebb4b8b0fe13e16583f6a933a3e20872ec084dc812237f021757efe2a6d527a0a1723b5c8