Sec440‐Linux‐Hunt‐Podman - ConnorEast/Tech-Journal GitHub Wiki

Podman Version Linux Hunt

Lab Setup

Install Podman:

   ~~~ sudo apt install podman

Edit "/etc/containers/registry.conf" and add:

   ~~~ unqualified-search-registries = ["docker.io"]

Install python3-pip and podman-compose:

   ~~~ sudo apt install python3-pip
   ~~~ pip install podman-compose

Install malware sample using git:

   ~~~ sudo apt install git
   ~~~ git clone https://github.com/thedunston/LinuxContainerAnalysis

Get the malware:

 ~~~ wget https://research.cyfidant.com/thuglyfeLinux.zip
 ~~~ unzip thuglyfeLinux.zip 
 cd thuglyfeLinux 

Begin the testing process for the sample:

   ~~~ bash linux_malware_analysis_container samples/thuglyfe/thug_simulator

Use the Ltrace command:

   ~~~ ltrace-full samples/thuglyfe/thug_simulator

Copy ltrace_behavior file to host:

 podman cp d6386143ff06:/tmp/ltrace_analysis/trace_behavior_20251106_162130.txt trace_analysis.txt
image

Existing File Contents:

scvhost.exe

This is an executable file so the contents can not be viewed normally. Permissions are viewable within the image below. image

thuglyfe.service

This is a .service file which is focused on executing the malicious SVCHost file upon start. The file thuglyfe.service having "-rwxr-xr-x" permissions. image

thuglyfe.log

Lists the file permissions "RW" and the contents of the file. This file shows when the environment was setup, when the ssh brute force attempt was simulated, and the malicious binary deployment. image

config.dat

This document holds the contents of the basic system information. its a generic ubuntu Linux box created September 29th. image

network.dat

This file would typically hold IP configuration information. Given it was run in a podman instance, it does not have a networking interface. image

connections.dat

This section would typically house the networking information such as local and remote connections as well as active ports. this is empty due to being in a podman instance image

userlist.dat

This lists all of the current user accounts on the system prior to the implementation of the malicious user account.

accounts.dat

This shows the user accounts as well as their respective home directory locations. image

services.dat

When run within the podman instance it shows image

cronjobs.dat

When run within the podman instance it shows image

startup.dat

When run within the podman instance it shows image

packages.dat

Shows all currently install packages image

autorun.dat

When run within the podman instance it shows image

data.txt

When run within the podman instance it shows Nothing image

ASEFA item proof

image
⚠️ **GitHub.com Fallback** ⚠️