Automated Malware Analysis Report for Msdtc
Total Page:16
File Type:pdf, Size:1020Kb
ID: 341136 Sample Name: msdtc Cookbook: defaultlinuxfilecookbook.jbs Time: 20:11:06 Date: 18/01/2021 Version: 31.0.0 Red Diamond Table of Contents Table of Contents 2 Analysis Report msdtc 4 Overview 4 General Information 4 Detection 4 Signatures 4 Classification 4 Startup 4 Yara Overview 4 Signature Overview 4 AV Detection: 5 Mitre Att&ck Matrix 5 Behavior Graph 5 Antivirus, Machine Learning and Genetic Malware Detection 6 Initial Sample 6 Dropped Files 6 Domains 6 URLs 6 Domains and IPs 6 Contacted Domains 6 Contacted IPs 6 General Information 7 Runtime Messages 7 Joe Sandbox View / Context 7 IPs 7 Domains 7 ASN 7 JA3 Fingerprints 7 Dropped Files 7 Created / dropped Files 8 Static File Info 8 General 8 Static ELF Info 8 ELF header 8 Sections 8 Program Segments 9 Dynamic Tags 9 Symbols 10 Network Behavior 11 System Behavior 11 Analysis Process: msdtc PID: 4567 Parent PID: 4498 11 General 11 File Activities 11 File Read 11 Analysis Process: msdtc PID: 4570 Parent PID: 4567 11 General 11 Analysis Process: sh PID: 4570 Parent PID: 4567 11 General 11 File Activities 11 File Read 11 Analysis Process: sh PID: 4572 Parent PID: 4570 11 General 11 Analysis Process: pgrep PID: 4572 Parent PID: 4570 12 General 12 File Activities 12 File Read 12 Directory Enumerated 12 Analysis Process: msdtc PID: 4598 Parent PID: 4567 12 General 12 Copyright null 2021 Page 2 of 13 Analysis Process: sh PID: 4598 Parent PID: 4567 12 General 12 File Activities 12 File Read 12 Analysis Process: sh PID: 4599 Parent PID: 4598 12 General 12 Analysis Process: pidof PID: 4599 Parent PID: 4598 13 General 13 File Activities 13 File Read 13 Directory Enumerated 13 Analysis Process: msdtc PID: 4616 Parent PID: 4567 13 General 13 Analysis Process: msdtc PID: 4617 Parent PID: 4616 13 General 13 Copyright null 2021 Page 3 of 13 Analysis Report msdtc Overview General Information Detection Signatures Classification Sample msdtc Name: Maacchhiiinnee LLeeaarrrnniiinngg ddeettteecctttiiioonn fffoorrr ssaampp… Analysis ID: 341136 EMEnnauucmhienerreraa ttLteeessa prpnrrroionccgee sdssseeetess c wwtiioiittthnhi iinfno ttrthh seea ""m"pp…p MD5: 9062cd88a24bee… EExnxeuecmcuuettteerass t cecosom pmroacanendsdsse uusss wiiinnigtgh aian s sthheell llll" cpc… Ransomware SHA1: b0d1e426d34fd8b… Miner Spreading EExxeeccuuttteess ttcthhoeem """mppggarrrneedpps""" cucosomingm aa nnsddh essleel aca… SHA256: f037eedb0922609… mmaallliiiccciiioouusss RERexeeaacddusst eCCsPP tUUh e iiin n"fffpoogrrrmreaapttt"iiio ocnno mfffrrroomma n///ssdyy ss e iiinan… malicious Evader Phishing sssuusssppiiiccciiioouusss suspicious SRSaeamadppsllle eC hhPaaUss sisntttrfrrioiipprpmpeeaddt i sosynym frbbooomlll t tta/asbbylllsee in SSaamppllee hhaass ssttrriippppeedd ssyymbbooll ttaabbllee cccllleeaann clean USUsasemessp ttlthehe eh "a""uusnn saatmripeep""" e ssdyy sstttyeemmb cocaal lltlllla tttbool eqquu… Exploiter Banker Uses the "uname" system call to qu Spyware Trojan / Bot Adware Score: 23 Range: 0 - 100 Whitelisted: false Startup system is lnxubuntu1 msdtc (PID: 4567, Parent: 4498, MD5: 9062cd88a24beea34501bb5006a1383d) Arguments: /tmp/msdtc msdtc New Fork (PID: 4570, Parent: 4567) sh (PID: 4570, Parent: 4567, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: sh -c "pgrep smcard" sh New Fork (PID: 4572, Parent: 4570) pgrep (PID: 4572, Parent: 4570, MD5: f3b843351a404d4e8d4ce0ed0775fa9c) Arguments: pgrep smcard msdtc New Fork (PID: 4598, Parent: 4567) sh (PID: 4598, Parent: 4567, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: sh -c "pidof smcard" sh New Fork (PID: 4599, Parent: 4598) pidof (PID: 4599, Parent: 4598, MD5: 1927a3fb9f656f7b53b72c92cbbecfe9) Arguments: pidof smcard msdtc New Fork (PID: 4616, Parent: 4567) msdtc New Fork (PID: 4617, Parent: 4616) cleanup Yara Overview No yara matches Signature Overview • AV Detection • Bitcoin Miner • System Summary • Persistence and Installation Behavior • Malware Analysis System Evasion Copyright null 2021 Page 4 of 13 Click to jump to signature section AV Detection: Machine Learning detection for sample Mitre Att&ck Matrix Command Remote Initial Privilege Defense Credential Lateral and Network Service Access Execution Persistence Escalation Evasion Access Discovery Movement Collection Exfiltration Control Effects Effects Impact Valid Scripting 1 Path Path Scripting 1 OS Security Remote Data from Exfiltration Data Eavesdrop on Remotely Modify Accounts Interception Interception Credential Software Services Local Over Other Obfuscation Insecure Track Device System Dumping 1 Discovery 1 System Network Network Without Partition Medium Communication Authorization Default Scheduled Boot or Boot or Rootkit LSASS System Remote Data from Exfiltration Junk Data Exploit SS7 to Remotely Device Accounts Task/Job Logon Logon Memory Information Desktop Removable Over Redirect Phone Wipe Data Lockout Initialization Initialization Discovery 1 Protocol Media Bluetooth Calls/SMS Without Scripts Scripts Authorization Behavior Graph Copyright null 2021 Page 5 of 13 Hide Legend Behavior Graph Legend: ID: 341136 Process Sample: msdtc Signature Startdate: 18/01/2021 Created File Architecture: LINUX DNS/IP Info Score: 23 Is Dropped Number of created Files Is malicious Machine Learning detection started for sample Internet msdtc started started started msdtc msdtc msdtc sh sh started started started sh sh msdtc pgrep pidof Antivirus, Machine Learning and Genetic Malware Detection Initial Sample Source Detection Scanner Label Link msdtc 4% ReversingLabs msdtc 100% Joe Sandbox ML Dropped Files No Antivirus matches Domains No Antivirus matches URLs No Antivirus matches Domains and IPs Contacted Domains No contacted domains info Contacted IPs Copyright null 2021 Page 6 of 13 No contacted IP infos General Information Joe Sandbox Version: 31.0.0 Red Diamond Analysis ID: 341136 Start date: 18.01.2021 Start time: 20:11:06 Joe Sandbox Product: CloudBasic Overall analysis duration: 0h 4m 21s Hypervisor based Inspection enabled: false Report type: light Sample file name: msdtc Cookbook file name: defaultlinuxfilecookbook.jbs Analysis system description: Ubuntu Linux 16.04 x64 (Kernel 4.4.0-116, Firefox 59.0, Document Viewer 3.18.2, LibreOffice 5.1.6.2, OpenJDK 1.8.0_171) Detection: SUS Classification: sus23.lin@0/0@0/0 Warnings: Show All Runtime Messages Command: /tmp/msdtc Exit Code: 0 Exit Code Info: Killed: False Standard Output: Standard Error: Joe Sandbox View / Context IPs No context Domains No context ASN No context JA3 Fingerprints No context Dropped Files No context Copyright null 2021 Page 7 of 13 Created / dropped Files No created / dropped files found Static File Info General File type: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so .2, for GNU/Linux 2.6.8, stripped Entropy (8bit): 5.3015544951122004 TrID: ELF Executable and Linkable format (Linux) (4029/14) 49.77% ELF Executable and Linkable format (generic) (4004/1) 49.46% Lumena CEL bitmap (63/63) 0.78% File name: msdtc File size: 23816 MD5: 9062cd88a24beea34501bb5006a1383d SHA1: b0d1e426d34fd8bcf3e2d3b3a031dde5690a3f12 SHA256: f037eedb09226097e7a95e9cbdcf75196efce754316f9bc babbff7a7d402fa30 SHA512: 3318705134a508037feb7c92fde6c12d020a0eec83fc6fe 9ec909acf224ddb305fd662b4fbe19f620c48952973345c a43b49626f73b9dc0faa345da83dc850ff SSDEEP: 384:Sw4pfLn37mDdtMhHESI1hUg1b1syS67Rrtv+zKoj m:SfpfLn37MIkSI1hLbTS67Rrp+zKo File Content Preview: .ELF..............>.......@[email protected][email protected]...@............ .@.......@.@.....@.@...............................................@..... ..@...............................................@[email protected].... .... ..............P.......P`.... Static ELF Info ELF header Class: ELF64 Data: 2's complement, little endian Version: 1 (current) Machine: Advanced Micro Devices X86-64 Version Number: 0x1 Type: EXEC (Executable file) OS/ABI: UNIX - System V ABI Version: 0 Entry Point Address: 0x4014c0 Flags: 0x0 ELF Header Size: 64 Program Header Offset: 64 Program Header Size: 56 Number of Program Headers: 8 Section Header Offset: 22024 Section Header Size: 64 Number of Section Headers: 28 Header String Table Index: 27 Sections Flags Name Type Address Offset Size EntSize Flags Description Link Info Align NULL 0x0 0x0 0x0 0x0 0x0 0 0 0 .interp PROGBITS 0x400200 0x200 0x1c 0x0 0x2 A 0 0 1 .note.ABI-tag NOTE 0x40021c 0x21c 0x20 0x0 0x2 A 0 0 4 .hash HASH 0x400240 0x240 0x184 0x4 0x2 A 5 0 8 .gnu.hash GNU_HASH 0x4003c8 0x3c8 0x24 0x0 0x2 A 5 0 8 .dynsym DYNSYM 0x4003f0 0x3f0 0x570 0x18 0x2 A 6 1 8 .dynstr STRTAB 0x400960 0x960 0x1c6 0x0 0x2 A 0 0 1 .gnu.version VERSYM 0x400b26 0xb26 0x74 0x2 0x2 A 5 0 2 Copyright null 2021 Page 8 of 13 Flags Name Type Address Offset Size EntSize Flags Description Link Info Align .gnu.version_r VERNEED 0x400ba0 0xba0 0x50 0x0 0x2 A 6 2 8 .rela.dyn RELA 0x400bf0 0xbf0 0x30 0x18 0x2 A 5 0 8 .rela.plt RELA 0x400c20 0xc20 0x510 0x18 0x2 A 5 12 8 .init PROGBITS 0x401130 0x1130 0x18 0x0 0x6 AX 0 0 4 .plt PROGBITS 0x401148 0x1148 0x370 0x10 0x6 AX 0 0 4 .text PROGBITS 0x4014c0 0x14c0 0x3118 0x0 0x6 AX 0 0 16 .fini PROGBITS 0x4045d8 0x45d8 0xe 0x0 0x6 AX 0 0 4 .rodata PROGBITS 0x4045e8 0x45e8 0x429 0x0 0x2 A 0 0 8 .eh_frame_hdr PROGBITS 0x404a14 0x4a14 0xf4 0x0 0x2 A 0 0 4 .eh_frame PROGBITS 0x404b08 0x4b08 0x3d4 0x0 0x2 A 0 0 8 .ctors PROGBITS 0x605000 0x5000 0x10 0x0 0x3 WA 0 0 8 .dtors PROGBITS 0x605010 0x5010 0x10 0x0 0x3 WA 0 0 8 .jcr PROGBITS 0x605020 0x5020 0x8 0x0 0x3 WA 0 0 8 .dynamic DYNAMIC 0x605028 0x5028 0x1b0 0x10 0x3 WA 6 0 8 .got PROGBITS 0x6051d8 0x51d8 0x8 0x8 0x3 WA 0 0 8 .got.plt