Analysis
-
max time kernel
149s -
max time network
147s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240226-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240226-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
07-05-2024 19:28
Behavioral task
behavioral1
Sample
21652156824d4a074e1b690d4f6bfad7_JaffaCakes118
Resource
ubuntu1804-amd64-20240226-en
General
-
Target
21652156824d4a074e1b690d4f6bfad7_JaffaCakes118
-
Size
1.2MB
-
MD5
21652156824d4a074e1b690d4f6bfad7
-
SHA1
43f2d4779ee62982f574143e86cb95c65e1fdd49
-
SHA256
0f59819c0394537dc96ff243c24d432fc47f44fc72cfc4ccba43c8e5bde8bcf2
-
SHA512
7298344489af32ab2d967200ed70eea00096090d09e809d9288d3a5945b108abcd1ca2a939941eb4b040972a243c2ba3990ec20d2744caa11fdf125e77dc22d4
-
SSDEEP
24576:e845rlHu6gVJKG75oFpA0VW/X4G2y1q2rJp0:745wRVJKGtSA0VW/oVu9p0
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
resource yara_rule behavioral1/files/fstream-4.dat family_mrblack -
Executes dropped EXE 2 IoCs
ioc pid Process /usr/bin/bsd-port/getty 1626 getty /usr/bin/.sshd 1650 .sshd -
description ioc Process File opened for modification /etc/init.d/DbSecuritySpt 21652156824d4a074e1b690d4f6bfad7_JaffaCakes118 File opened for modification /etc/init.d/selinux getty -
Reads system routing table 1 TTPs 2 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route 21652156824d4a074e1b690d4f6bfad7_JaffaCakes118 File opened for reading /proc/net/route getty -
Write file to user bin folder 1 TTPs 10 IoCs
description ioc Process File opened for modification /usr/bin/lsof cp File opened for modification /usr/bin/bsd-port/conf.n getty File opened for modification /usr/bin/bsd-port/getty cp File opened for modification /usr/bin/bsd-port/getty.lock getty File opened for modification /usr/bin/.sshd cp File opened for modification /usr/bin/dpkgd/ps cp File opened for modification /usr/bin/dpkgd/lsof cp File opened for modification /usr/bin/bsd-port/getty.lock 21652156824d4a074e1b690d4f6bfad7_JaffaCakes118 File opened for modification /usr/bin/bsd-port/udevd.lock 21652156824d4a074e1b690d4f6bfad7_JaffaCakes118 File opened for modification /usr/bin/dpkgd/ss cp -
Writes file to system bin folder 1 TTPs 2 IoCs
description ioc Process File opened for modification /bin/ps cp File opened for modification /bin/ss cp -
Checks CPU configuration 1 TTPs 2 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo getty File opened for reading /proc/cpuinfo 21652156824d4a074e1b690d4f6bfad7_JaffaCakes118 -
Reads system network configuration 1 TTPs 6 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route getty File opened for reading /proc/net/arp getty File opened for reading /proc/net/dev getty File opened for reading /proc/net/dev 21652156824d4a074e1b690d4f6bfad7_JaffaCakes118 File opened for reading /proc/net/route 21652156824d4a074e1b690d4f6bfad7_JaffaCakes118 File opened for reading /proc/net/arp 21652156824d4a074e1b690d4f6bfad7_JaffaCakes118 -
Reads runtime system information 25 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/stat 21652156824d4a074e1b690d4f6bfad7_JaffaCakes118 File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/stat getty File opened for reading /proc/cmdline insmod File opened for reading /proc/meminfo 21652156824d4a074e1b690d4f6bfad7_JaffaCakes118 File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/meminfo getty -
Writes file to tmp directory 8 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/notify.file .sshd File opened for modification /tmp/conf.n 21652156824d4a074e1b690d4f6bfad7_JaffaCakes118 File opened for modification /tmp/gates.lod .sshd File opened for modification /tmp/moni.lod 21652156824d4a074e1b690d4f6bfad7_JaffaCakes118 File opened for modification /tmp/bill.lock 21652156824d4a074e1b690d4f6bfad7_JaffaCakes118 File opened for modification /tmp/gates.lod 21652156824d4a074e1b690d4f6bfad7_JaffaCakes118 File opened for modification /tmp/notify.file 21652156824d4a074e1b690d4f6bfad7_JaffaCakes118 File opened for modification /tmp/moni.lod .sshd
Processes
-
/tmp/21652156824d4a074e1b690d4f6bfad7_JaffaCakes118/tmp/21652156824d4a074e1b690d4f6bfad7_JaffaCakes1181⤵
- Modifies init.d
- Reads system routing table
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
- Writes file to tmp directory
PID:1591 -
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt"2⤵PID:1608
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt3⤵PID:1609
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt"2⤵PID:1610
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt3⤵PID:1611
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt"2⤵PID:1612
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt3⤵PID:1613
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt"2⤵PID:1614
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt3⤵PID:1615
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt"2⤵PID:1616
-
/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt3⤵PID:1617
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"2⤵PID:1618
-
/bin/mkdirmkdir -p /usr/bin/bsd-port3⤵
- Reads runtime system information
PID:1619
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"2⤵PID:1620
-
/bin/mkdirmkdir -p /usr/bin/bsd-port3⤵
- Reads runtime system information
PID:1621
-
-
-
/bin/shsh -c "cp -f /tmp/21652156824d4a074e1b690d4f6bfad7_JaffaCakes118 /usr/bin/bsd-port/getty"2⤵PID:1622
-
/bin/cpcp -f /tmp/21652156824d4a074e1b690d4f6bfad7_JaffaCakes118 /usr/bin/bsd-port/getty3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1623
-
-
-
/bin/shsh -c /usr/bin/bsd-port/getty2⤵PID:1625
-
/usr/bin/bsd-port/getty/usr/bin/bsd-port/getty3⤵
- Executes dropped EXE
- Modifies init.d
- Reads system routing table
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
PID:1626 -
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"4⤵PID:1634
-
/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux5⤵PID:1635
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"4⤵PID:1636
-
/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux5⤵PID:1637
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"4⤵PID:1638
-
/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux5⤵PID:1639
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"4⤵PID:1640
-
/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux5⤵PID:1641
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"4⤵PID:1642
-
/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux5⤵PID:1643
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"4⤵PID:1644
-
/bin/mkdirmkdir -p /usr/bin/dpkgd5⤵
- Reads runtime system information
PID:1645
-
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"4⤵PID:1646
-
/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1647
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1651
-
/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1652
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1653
-
/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1654
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ps"4⤵PID:1655
-
/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ps5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1656
-
-
-
/bin/shsh -c "chmod 0755 /bin/ps"4⤵PID:1657
-
/bin/chmodchmod 0755 /bin/ps5⤵PID:1658
-
-
-
/bin/shsh -c "cp -f /bin/ss /usr/bin/dpkgd/ss"4⤵PID:1659
-
/bin/cpcp -f /bin/ss /usr/bin/dpkgd/ss5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1660
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1661
-
/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1662
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1663
-
/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1664
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ss"4⤵PID:1665
-
/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ss5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1666
-
-
-
/bin/shsh -c "chmod 0755 /bin/ss"4⤵PID:1667
-
/bin/chmodchmod 0755 /bin/ss5⤵PID:1668
-
-
-
/bin/shsh -c "cp -f /usr/bin/lsof /usr/bin/dpkgd/lsof"4⤵PID:1669
-
/bin/cpcp -f /usr/bin/lsof /usr/bin/dpkgd/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1670
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1671
-
/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1672
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1673
-
/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1674
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/lsof"4⤵PID:1675
-
/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1676
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"4⤵PID:1677
-
/bin/chmodchmod 0755 /usr/bin/lsof5⤵PID:1678
-
-
-
/bin/shsh -c "insmod /usr/bin/bsd-port/xpacket.ko"4⤵PID:1681
-
/sbin/insmodinsmod /usr/bin/bsd-port/xpacket.ko5⤵
- Reads runtime system information
PID:1682
-
-
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"2⤵PID:1628
-
/bin/mkdirmkdir -p /usr/bin3⤵
- Reads runtime system information
PID:1629
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"2⤵PID:1630
-
/bin/mkdirmkdir -p /usr/bin3⤵
- Reads runtime system information
PID:1631
-
-
-
/bin/shsh -c "cp -f /tmp/21652156824d4a074e1b690d4f6bfad7_JaffaCakes118 /usr/bin/.sshd"2⤵PID:1632
-
/bin/cpcp -f /tmp/21652156824d4a074e1b690d4f6bfad7_JaffaCakes118 /usr/bin/.sshd3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1633
-
-
-
/bin/shsh -c /usr/bin/.sshd2⤵PID:1649
-
/usr/bin/.sshd/usr/bin/.sshd3⤵
- Executes dropped EXE
- Writes file to tmp directory
PID:1650
-
-
-
/bin/shsh -c "insmod /tmp/xpacket.ko"2⤵PID:1689
-
/sbin/insmodinsmod /tmp/xpacket.ko3⤵
- Reads runtime system information
PID:1690
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD58f98e18e3e9d1097933d8e63fb5e4d60
SHA115fef73c595ec1385ce4dd46f3526dd34910ca7b
SHA256855d6efe9f722a465b549233ad564bc93b7534e2dc01fc8f00862ca1cc5aa8f5
SHA512df6f7a08a41aed030a091a8d48904595c10e39e0c6708f02134b56d5db4ef2043cd385c952cf329c85f720cd76b7a37dfab2e50200d56ea9cbbb77fb050d65a0
-
Filesize
36B
MD5993cc15058142d96c3daf7852c3d5ee8
SHA10950b8b391b04dd3895ea33cd3141543ebd2525d
SHA2568171d077918611803d93088409f220c66fae1c670b297e1aa5d8cbd548ce9208
SHA5120c4256c00a3710f97e92581b552682b36b62afc35fe72622c491323c618c19ea62611ac04ccafc3dfcde2254a2ebbd93b69b66795b16e36332293bed83adb928
-
Filesize
4B
MD506a81a4fb98d149f2d31c68828fa6eb2
SHA1d60af283b62280a8d737359c8859c0142aaf28c0
SHA25638813d9a6e5332787f13dac070d265339c4c711beea8b21f82966684bda30e79
SHA512d5b6404d9d32837b7b89a2d161789d2aa812ad61caba42e3fa5b82095b915ed3b5b7f260cde2521a53e0c5aa6a62ade3ba1f72bb31ab8e1f93baa24f3a6202ce
-
Filesize
4B
MD5e6384711491713d29bc63fc5eeb5ba4f
SHA164e89c002d47826fd7e23d43e239e4ee0d583896
SHA256b93e56aec7724213a91e5c44256af055313fc7e8d80554fb7ed23b866470695b
SHA5128777bdf258dedd2ae914f5388d00833bc2601b148e6eb3059e75bbf2bfd67fbae2a44b3a68240b6618af15917bba5cb36f549527cf13cdf94ea49fa955f78c82
-
Filesize
51B
MD543247d65f3d2393f6f6bd6de694cb43b
SHA1732700a06fc38de55872622e2171b55980e24ddd
SHA25606452cd9da38de571add44b182e405e19a6a6b371b81b77aace3f1019a4fce68
SHA51221ab658f3bee3d3b77d928525abe56a2d697921a6e8cb185090a1ddad6ab5c62444093ea4b966b0cc4c22e09edebabc20189608f15564464c03ef82a21658192
-
Filesize
73B
MD5c241abb054793515570be2b4bc2a0653
SHA13ff331ebb328529144ac4286e5c9fe7e903fad68
SHA256556d6aa9ac012dd6e1dfed034c55314be80a7c2dafb187bf39175fe280f74d79
SHA51259ac6112c79bebd0b5f1eb16e78bdca35d6ea0b7dab9045c5b95550b64fd05813d1d183146a2fa8fa5060cef123a05ae789045739185604774c548dce851887e
-
Filesize
1.2MB
MD521652156824d4a074e1b690d4f6bfad7
SHA143f2d4779ee62982f574143e86cb95c65e1fdd49
SHA2560f59819c0394537dc96ff243c24d432fc47f44fc72cfc4ccba43c8e5bde8bcf2
SHA5127298344489af32ab2d967200ed70eea00096090d09e809d9288d3a5945b108abcd1ca2a939941eb4b040972a243c2ba3990ec20d2744caa11fdf125e77dc22d4
-
Filesize
159KB
MD5e093dc78225e2a0a25e3b137c1c1e442
SHA1c29497cfaae729eb576875e4fdfa400640ab16be
SHA2561190f4dbc7be174de8fd4096c9bf7a28eebfac937d308b7cc533be4a1240d26e
SHA512fe1cc7a65327732eaaee89f427c10239ba822430e34177842f4681068d78d404b1830d808a2a71b1efcc5f126c6d8c053512237421173aaa150e215a672da6f0
-
Filesize
130KB
MD5558edc26f8a38fa9788220b9af8a73e7
SHA13024d44e580e9c67f32f6c585d50e2a6cc9a7cac
SHA256b76435c80333d2c1fd18e0e7682f1c9dfb5da8d507e93e3c416f54b481c428d5
SHA512edaa425b441044f015e8f68fffa1664e42372d00dd0e7b0924d24ce947aa8e5f96b3bdc326fa2f8b978e3fcf638a1ceca45a223735db73f1607df66990feb56f
-
Filesize
136KB
MD51dc929b5f2cd12fe6a2fe71140d2a9e3
SHA1f9995a92bb201b1b7738a39a38570ef0c40b52d2
SHA256418aae1da62554afe9f260866267af328fd761b3fd6f90f0ea53d543e2fefc38
SHA512fbed011c595084548db440dfbe485b7d27032a44a6ae9e141fe43f31c8c524ff9347135ab035deb441fca99e5a3794f7bb9194f148aa2f60f1547a7c67d47373