Analysis
-
max time kernel
149s -
max time network
150s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240221-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240221-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
29-03-2024 18:13
Behavioral task
behavioral1
Sample
2939aadefa42ec7ad1c03d0c6f73b9cb_JaffaCakes118
Resource
ubuntu2004-amd64-20240221-en
General
-
Target
2939aadefa42ec7ad1c03d0c6f73b9cb_JaffaCakes118
-
Size
1.2MB
-
MD5
2939aadefa42ec7ad1c03d0c6f73b9cb
-
SHA1
73172c7388b4392f5ca77178a00baa50e3df9785
-
SHA256
119da99cd938fb3eeaa4c6e824ebaa9efb36abc66aa04ab60efb7f63350018eb
-
SHA512
939f8458854cfbdc32d7954747c95ea7a2341fda7669840e9123e18662cd95fc63f010f2a017becc51f5b817811fb7dc041597031f0d8d9a9a5c6cc28b5e3d67
-
SSDEEP
24576:e845rGHu6gVJKG75oFpA0VWeX4S2y1q2rJp0:745vRVJKGtSA0VWeohu9p0
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
resource yara_rule behavioral1/files/fstream-4.dat family_mrblack -
Executes dropped EXE 2 IoCs
ioc pid Process /usr/bin/bsd-port/getty 1931 getty /usr/bin/.sshd 1992 .sshd -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc File opened for reading /proc/cpuinfo -
description ioc File opened for modification /etc/init.d/DbSecuritySpt File opened for modification /etc/init.d/selinux -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc File opened for reading /proc/net/route -
Write file to user bin folder 1 TTPs 10 IoCs
description ioc Process File opened for modification /usr/bin/.sshd cp File opened for modification /usr/bin/ss cp File opened for modification /usr/bin/bsd-port/getty.lock Process not Found File opened for modification /usr/bin/bsd-port/getty cp File opened for modification /usr/bin/dpkgd/lsof cp File opened for modification /usr/bin/dpkgd/ps cp File opened for modification /usr/bin/dpkgd/ss cp File opened for modification /usr/bin/lsof cp File opened for modification /usr/bin/ps cp File opened for modification /usr/bin/bsd-port/udevd.lock Process not Found -
Writes file to system bin folder 1 TTPs 3 IoCs
description ioc Process File opened for modification /bin/lsof cp File opened for modification /bin/ps cp File opened for modification /bin/ss cp -
Reads system network configuration 1 TTPs 3 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc File opened for reading /proc/net/dev File opened for reading /proc/net/route File opened for reading /proc/net/arp -
Reads runtime system information 35 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems mkdir File opened for reading /proc/sys/kernel/version .sshd File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/stat Process not Found File opened for reading /proc/sys/kernel/version 2939aadefa42ec7ad1c03d0c6f73b9cb_JaffaCakes118 File opened for reading /proc/sys/kernel/version getty File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/meminfo Process not Found -
Writes file to tmp directory 5 IoCs
Malware often drops required files in the /tmp directory.
description ioc File opened for modification /tmp/moni.lod File opened for modification /tmp/bill.lock File opened for modification /tmp/gates.lod File opened for modification /tmp/notify.file File opened for modification /tmp/conf.n
Processes
-
/tmp/2939aadefa42ec7ad1c03d0c6f73b9cb_JaffaCakes118/tmp/2939aadefa42ec7ad1c03d0c6f73b9cb_JaffaCakes1181⤵
- Reads runtime system information
PID:1479
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt"1⤵PID:1913
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt2⤵PID:1914
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt"1⤵PID:1915
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt2⤵PID:1916
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt"1⤵PID:1917
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt2⤵PID:1918
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt"1⤵PID:1919
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt2⤵PID:1920
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt"1⤵PID:1921
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt2⤵PID:1922
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"1⤵PID:1923
-
/usr/bin/mkdirmkdir -p /usr/bin/bsd-port2⤵
- Reads runtime system information
PID:1924
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"1⤵PID:1925
-
/usr/bin/mkdirmkdir -p /usr/bin/bsd-port2⤵
- Reads runtime system information
PID:1926
-
-
/bin/shsh -c "cp -f /tmp/2939aadefa42ec7ad1c03d0c6f73b9cb_JaffaCakes118 /usr/bin/bsd-port/getty"1⤵PID:1927
-
/usr/bin/cpcp -f /tmp/2939aadefa42ec7ad1c03d0c6f73b9cb_JaffaCakes118 /usr/bin/bsd-port/getty2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1928
-
-
/bin/shsh -c /usr/bin/bsd-port/getty1⤵PID:1930
-
/usr/bin/bsd-port/getty/usr/bin/bsd-port/getty2⤵
- Executes dropped EXE
- Reads runtime system information
PID:1931
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1933
-
/usr/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1934
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:1935
-
/usr/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:1936
-
-
/bin/shsh -c "cp -f /tmp/2939aadefa42ec7ad1c03d0c6f73b9cb_JaffaCakes118 /usr/bin/.sshd"1⤵PID:1937
-
/usr/bin/cpcp -f /tmp/2939aadefa42ec7ad1c03d0c6f73b9cb_JaffaCakes118 /usr/bin/.sshd2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1938
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"1⤵PID:1975
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux2⤵PID:1976
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"1⤵PID:1977
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux2⤵PID:1978
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"1⤵PID:1979
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux2⤵PID:1980
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"1⤵PID:1981
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux2⤵PID:1982
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"1⤵PID:1984
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux2⤵PID:1985
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"1⤵PID:1986
-
/usr/bin/mkdirmkdir -p /usr/bin/dpkgd2⤵
- Reads runtime system information
PID:1987
-
-
/bin/shsh -c "cp -f /bin/lsof /usr/bin/dpkgd/lsof"1⤵PID:1988
-
/usr/bin/cpcp -f /bin/lsof /usr/bin/dpkgd/lsof2⤵
- Write file to user bin folder
- Reads runtime system information
PID:1989
-
-
/bin/shsh -c /usr/bin/.sshd1⤵PID:1991
-
/usr/bin/.sshd/usr/bin/.sshd2⤵
- Executes dropped EXE
- Reads runtime system information
PID:1992
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1993
-
/usr/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1994
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:1995
-
/usr/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:1996
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/lsof"1⤵PID:1997
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /bin/lsof2⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1998
-
-
/bin/shsh -c "chmod 0755 /bin/lsof"1⤵PID:1999
-
/usr/bin/chmodchmod 0755 /bin/lsof2⤵PID:2000
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"1⤵PID:2001
-
/usr/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps2⤵
- Write file to user bin folder
- Reads runtime system information
PID:2002
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:2003
-
/usr/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:2004
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:2005
-
/usr/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:2006
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ps"1⤵PID:2007
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ps2⤵
- Writes file to system bin folder
- Reads runtime system information
PID:2008
-
-
/bin/shsh -c "chmod 0755 /bin/ps"1⤵PID:2009
-
/usr/bin/chmodchmod 0755 /bin/ps2⤵PID:2010
-
-
/bin/shsh -c "cp -f /bin/ss /usr/bin/dpkgd/ss"1⤵PID:2011
-
/usr/bin/cpcp -f /bin/ss /usr/bin/dpkgd/ss2⤵
- Write file to user bin folder
- Reads runtime system information
PID:2012
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:2013
-
/usr/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:2014
-
-
/bin/shsh -c "mkdir -p /bin"1⤵PID:2015
-
/usr/bin/mkdirmkdir -p /bin2⤵
- Reads runtime system information
PID:2016
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ss"1⤵PID:2017
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ss2⤵
- Writes file to system bin folder
- Reads runtime system information
PID:2018
-
-
/bin/shsh -c "chmod 0755 /bin/ss"1⤵PID:2019
-
/usr/bin/chmodchmod 0755 /bin/ss2⤵PID:2020
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:2021
-
/usr/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:2022
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:2023
-
/usr/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:2024
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/lsof"1⤵PID:2025
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/lsof2⤵
- Write file to user bin folder
- Reads runtime system information
PID:2026
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"1⤵PID:2027
-
/usr/bin/chmodchmod 0755 /usr/bin/lsof2⤵PID:2028
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:2029
-
/usr/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:2030
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:2031
-
/usr/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:2032
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/ps"1⤵PID:2033
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/ps2⤵
- Write file to user bin folder
- Reads runtime system information
PID:2034
-
-
/bin/shsh -c "chmod 0755 /usr/bin/ps"1⤵PID:2035
-
/usr/bin/chmodchmod 0755 /usr/bin/ps2⤵PID:2036
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:2037
-
/usr/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:2038
-
-
/bin/shsh -c "mkdir -p /usr/bin"1⤵PID:2039
-
/usr/bin/mkdirmkdir -p /usr/bin2⤵
- Reads runtime system information
PID:2040
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/ss"1⤵PID:2041
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/ss2⤵
- Write file to user bin folder
- Reads runtime system information
PID:2042
-
-
/bin/shsh -c "chmod 0755 /usr/bin/ss"1⤵PID:2043
-
/usr/bin/chmodchmod 0755 /usr/bin/ss2⤵PID:2044
-
-
/bin/shsh -c "insmod /usr/bin/bsd-port/xpacket.ko"1⤵PID:2089
-
/usr/sbin/insmodinsmod /usr/bin/bsd-port/xpacket.ko2⤵
- Reads runtime system information
PID:2090
-
-
/bin/shsh -c "insmod /tmp/xpacket.ko"1⤵PID:2100
-
/usr/sbin/insmodinsmod /tmp/xpacket.ko2⤵
- Reads runtime system information
PID:2101
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD52cd7f1c3120e0870c48e45bc92fa6e37
SHA1c114738feb2125ee6364c7ad3968fda1fff44b27
SHA2565a1c7666a33b06270ab6717eac83a473cfbf8e0afe1662e1883983e5d2ae5312
SHA5129031e24741ee95f580fb1f3153b6c37ef8482e641b55bea13b6cc1d528d1080b850841af0311cec33356af362bb00543fc2c09320b4594337c6fb2c9b3a465eb
-
Filesize
36B
MD5993cc15058142d96c3daf7852c3d5ee8
SHA10950b8b391b04dd3895ea33cd3141543ebd2525d
SHA2568171d077918611803d93088409f220c66fae1c670b297e1aa5d8cbd548ce9208
SHA5120c4256c00a3710f97e92581b552682b36b62afc35fe72622c491323c618c19ea62611ac04ccafc3dfcde2254a2ebbd93b69b66795b16e36332293bed83adb928
-
Filesize
4B
MD5729c68884bd359ade15d5f163166738a
SHA1158a66682da61df5f2115c2fc8c8328e6c837b05
SHA25647f6c8c4b34d11e58a4b8643ea77722600f0f2a2134c6b5558de0b704a6ec9fb
SHA512c8e5892155b30891bd73fb8bc0fd7e7632332e675600ed785d164d3e1f56b27bc4a161316a7d4d235162eeef592fd9cd7c3d1815b330d89fcdd8175905150e92
-
Filesize
4B
MD53875115bacc48cca24ac51ee4b0e7975
SHA1d656e613a98886be20fa130aa430ef3565ae648b
SHA25653f15ca2c3a39541db966c5d52047590467b0d275a39b54dcb213b544a530c2c
SHA5121a81faa5f86e19dfc95db85001df99d2ade8fc30aad59bca0c509c95215647406216b1e63448e41084757da24ee14671de5e03e752458d5d530b5cc7b4c86930
-
Filesize
51B
MD5fc18a1dd8c6c9e5befda4b49dcf97c03
SHA104cf5ae2904f76696a72640a8b1177cec26736f4
SHA2565a62782ba7d77feecc9c2e51d9cf72a168ec9c035f3f2109b9d9356426b67b63
SHA51267e327830e676c95fed37ec4abc1c07c8046db88adc4c11cca932582d3ecdf6690c3f10d986d1068735b6a7c02e3d39b0aa543add96c1b31a7f02356126e1396
-
Filesize
1.2MB
MD52939aadefa42ec7ad1c03d0c6f73b9cb
SHA173172c7388b4392f5ca77178a00baa50e3df9785
SHA256119da99cd938fb3eeaa4c6e824ebaa9efb36abc66aa04ab60efb7f63350018eb
SHA512939f8458854cfbdc32d7954747c95ea7a2341fda7669840e9123e18662cd95fc63f010f2a017becc51f5b817811fb7dc041597031f0d8d9a9a5c6cc28b5e3d67
-
Filesize
171KB
MD5061386937ec7acf924438a2643a32be0
SHA101a044b9e58839bea3e58c66cb32acc16241bf91
SHA2568a26bbae9eb85aa98ef29cfe5b0a291234db6eb394c3e0c2841983dcf7dda959
SHA5122de2e56ac4c32f47b4a1945ccfb0db378e6d59019ee8004e3e5d2ec8935efb5aa8ee14b8a0b21c61a267e195d42a3232a6dcade8720de06118fd579277f59db7
-
Filesize
134KB
MD5d194576b899af45b1d2a448612ec21e5
SHA1492f7d8f28cd4397ce22fcf0d8bf3304ea93465a
SHA256a8cf81f3a1137c999c3cf336507ce120b3065e633ade01db6280d427b7d986ca
SHA512b323babd9580b91772cde29c9f22ae75b27f5ce8ce0268a48ca41713c3545dd72409932a5c48f6af66ac6e43127eb5461d1f686bd667fa1b0e56a1564db3c539
-
Filesize
164KB
MD551d83131b398a97dd38555ba57084721
SHA17d392a87f7db787dfa85fbcdf2a5ba6f0b59b4ed
SHA256e429f9d16a4cd64593b94dee8309a427fe8ca57765bf0d2e7b822efd123fe768
SHA512adc7137df75410c2535986c1e86c2e92e58f9bee70094f72f1f7adf3db125720ce281eb3f48474b0e192d672e96cbb1bc6e1ef6b26b10bf76a412c4516948216