Analysis
-
max time kernel
145s -
max time network
141s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240221-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240221-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
30/03/2024, 00:11
Behavioral task
behavioral1
Sample
2efe0f71080d673aa695ae55fa5021de_JaffaCakes118
Resource
ubuntu2004-amd64-20240221-en
General
-
Target
2efe0f71080d673aa695ae55fa5021de_JaffaCakes118
-
Size
113KB
-
MD5
2efe0f71080d673aa695ae55fa5021de
-
SHA1
6332765572296f4378ac5eeebe59bc117074e37b
-
SHA256
e90bcf0c8b3bb16278148d37cad1fa4d586281c83cfa0399b4eea33753b5353d
-
SHA512
a49f83724cb28b8968468863b65b3e5aeb6fd0b41c39fd97db93d776a374214dfa222d16655c8d0025ed2cc6fe679c470848284486747edf2fc488938d4ac9ba
-
SSDEEP
3072:kiry859a2ADJf9wHYqbgFFo8+HeAl+TRCm7FnVqfJXFWbNb:T9a2aLqkrMIsm7FnVqfJXFWbNb
Malware Config
Signatures
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself sshd 1483 2efe0f71080d673aa695ae55fa5021de_JaffaCakes118 -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route 2efe0f71080d673aa695ae55fa5021de_JaffaCakes118 -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route 2efe0f71080d673aa695ae55fa5021de_JaffaCakes118