Analysis
-
max time kernel
149s -
max time network
150s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240508-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240508-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
12-05-2024 10:31
Behavioral task
behavioral1
Sample
39a708f0997751f152ecb7690a77dddd_JaffaCakes118
Resource
ubuntu2004-amd64-20240508-en
General
-
Target
39a708f0997751f152ecb7690a77dddd_JaffaCakes118
-
Size
1.1MB
-
MD5
39a708f0997751f152ecb7690a77dddd
-
SHA1
8d9b4d82b1cbff29b83c5ad13d64dac197fcf7a5
-
SHA256
75a39283e00fdd65813efd892522b77c655b920b32637b0c7106a0340d1a97cf
-
SHA512
75a1d0cc16b2f0023f4c61ed53060fa8c249bbe346a98f3cbdc90e0442172184b48d820866e8223b6be6f23d6d26f4c9435938afa4a88af03e1e71c657f62eef
-
SSDEEP
24576:4vRE7caCfKGPqVEDNLFxKsfaCI+gIGYuuCol7r:4vREKfPqVE5jKsfaCRHGVo7r
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
resource yara_rule behavioral1/files/fstream-4.dat family_mrblack -
Executes dropped EXE 2 IoCs
ioc pid Process /usr/bin/bsd-port/knerl 1436 knerl /usr/bin/pythno 1444 pythno -
description ioc Process File opened for modification /etc/init.d/VsystemsshMdt 39a708f0997751f152ecb7690a77dddd_JaffaCakes118 File opened for modification /etc/init.d/selinux knerl -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route knerl -
Write file to user bin folder 1 TTPs 10 IoCs
description ioc Process File opened for modification /usr/bin/dpkgd/ps cp File opened for modification /usr/bin/bsd-port/conf.n knerl File opened for modification /usr/bin/bsd-port/knerl.conf 39a708f0997751f152ecb7690a77dddd_JaffaCakes118 File opened for modification /usr/bin/bsd-port/knerl cp File opened for modification /usr/bin/pythno cp File opened for modification /usr/bin/bsd-port/knerl.conf knerl File opened for modification /usr/bin/dpkgd/lsof cp File opened for modification /usr/bin/bsd-port/udevd.conf 39a708f0997751f152ecb7690a77dddd_JaffaCakes118 File opened for modification /usr/bin/lsof cp File opened for modification /usr/bin/ps cp -
Writes file to system bin folder 1 TTPs 2 IoCs
description ioc Process File opened for modification /bin/lsof cp File opened for modification /bin/ps cp -
Checks CPU configuration 1 TTPs 2 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo 39a708f0997751f152ecb7690a77dddd_JaffaCakes118 File opened for reading /proc/cpuinfo knerl -
Reads system network configuration 1 TTPs 4 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/dev 39a708f0997751f152ecb7690a77dddd_JaffaCakes118 File opened for reading /proc/net/dev knerl File opened for reading /proc/net/route knerl File opened for reading /proc/net/arp knerl -
Reads runtime system information 24 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/sys/kernel/version pythno File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/sys/kernel/version 39a708f0997751f152ecb7690a77dddd_JaffaCakes118 File opened for reading /proc/stat 39a708f0997751f152ecb7690a77dddd_JaffaCakes118 File opened for reading /proc/meminfo 39a708f0997751f152ecb7690a77dddd_JaffaCakes118 File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/sys/kernel/version knerl File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/stat knerl File opened for reading /proc/meminfo knerl File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems cp -
Writes file to tmp directory 7 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/notify.file pythno File opened for modification /tmp/vga.conf pythno File opened for modification /tmp/idus.log 39a708f0997751f152ecb7690a77dddd_JaffaCakes118 File opened for modification /tmp/apsh.conf 39a708f0997751f152ecb7690a77dddd_JaffaCakes118 File opened for modification /tmp/vga.conf 39a708f0997751f152ecb7690a77dddd_JaffaCakes118 File opened for modification /tmp/notify.file 39a708f0997751f152ecb7690a77dddd_JaffaCakes118 File opened for modification /tmp/idus.log pythno
Processes
-
/tmp/39a708f0997751f152ecb7690a77dddd_JaffaCakes118/tmp/39a708f0997751f152ecb7690a77dddd_JaffaCakes1181⤵
- Modifies init.d
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
- Writes file to tmp directory
PID:1379 -
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMdt /etc/rc1.d/S97VsystemsshMdt"2⤵PID:1420
-
/usr/bin/lnln -s /etc/init.d/VsystemsshMdt /etc/rc1.d/S97VsystemsshMdt3⤵PID:1421
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMdt /etc/rc2.d/S97VsystemsshMdt"2⤵PID:1422
-
/usr/bin/lnln -s /etc/init.d/VsystemsshMdt /etc/rc2.d/S97VsystemsshMdt3⤵PID:1423
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMdt /etc/rc3.d/S97VsystemsshMdt"2⤵PID:1424
-
/usr/bin/lnln -s /etc/init.d/VsystemsshMdt /etc/rc3.d/S97VsystemsshMdt3⤵PID:1425
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMdt /etc/rc4.d/S97VsystemsshMdt"2⤵PID:1426
-
/usr/bin/lnln -s /etc/init.d/VsystemsshMdt /etc/rc4.d/S97VsystemsshMdt3⤵PID:1427
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMdt /etc/rc5.d/S97VsystemsshMdt"2⤵PID:1428
-
/usr/bin/lnln -s /etc/init.d/VsystemsshMdt /etc/rc5.d/S97VsystemsshMdt3⤵PID:1429
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"2⤵PID:1430
-
/usr/bin/mkdirmkdir -p /usr/bin/bsd-port3⤵
- Reads runtime system information
PID:1431
-
-
-
/bin/shsh -c "cp -f /tmp/39a708f0997751f152ecb7690a77dddd_JaffaCakes118 /usr/bin/bsd-port/knerl"2⤵PID:1432
-
/usr/bin/cpcp -f /tmp/39a708f0997751f152ecb7690a77dddd_JaffaCakes118 /usr/bin/bsd-port/knerl3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1433
-
-
-
/bin/shsh -c /usr/bin/bsd-port/knerl2⤵PID:1435
-
/usr/bin/bsd-port/knerl/usr/bin/bsd-port/knerl3⤵
- Executes dropped EXE
- Modifies init.d
- Reads system routing table
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
PID:1436 -
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"4⤵PID:1455
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux5⤵PID:1456
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"4⤵PID:1457
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux5⤵PID:1458
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"4⤵PID:1459
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux5⤵PID:1460
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"4⤵PID:1461
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux5⤵PID:1462
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"4⤵PID:1464
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux5⤵PID:1465
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"4⤵PID:1466
-
/usr/bin/mkdirmkdir -p /usr/bin/dpkgd5⤵
- Reads runtime system information
PID:1467
-
-
-
/bin/shsh -c "cp -f /bin/lsof /usr/bin/dpkgd/lsof"4⤵PID:1468
-
/usr/bin/cpcp -f /bin/lsof /usr/bin/dpkgd/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1469
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1470
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1471
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/knerl /bin/lsof"4⤵PID:1472
-
/usr/bin/cpcp -f /usr/bin/bsd-port/knerl /bin/lsof5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1473
-
-
-
/bin/shsh -c "chmod 0755 /bin/lsof"4⤵PID:1474
-
/usr/bin/chmodchmod 0755 /bin/lsof5⤵PID:1475
-
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"4⤵PID:1476
-
/usr/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1477
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1478
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1479
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/knerl /bin/ps"4⤵PID:1480
-
/usr/bin/cpcp -f /usr/bin/bsd-port/knerl /bin/ps5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1481
-
-
-
/bin/shsh -c "chmod 0755 /bin/ps"4⤵PID:1482
-
/usr/bin/chmodchmod 0755 /bin/ps5⤵PID:1483
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1484
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1485
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/knerl /usr/bin/lsof"4⤵PID:1486
-
/usr/bin/cpcp -f /usr/bin/bsd-port/knerl /usr/bin/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1487
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"4⤵PID:1488
-
/usr/bin/chmodchmod 0755 /usr/bin/lsof5⤵PID:1489
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1490
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1491
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/knerl /usr/bin/ps"4⤵PID:1492
-
/usr/bin/cpcp -f /usr/bin/bsd-port/knerl /usr/bin/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1493
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/ps"4⤵PID:1494
-
/usr/bin/chmodchmod 0755 /usr/bin/ps5⤵PID:1495
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"4⤵PID:1496
-
/usr/sbin/insmodinsmod /usr/lib/xpacket.ko5⤵
- Reads runtime system information
PID:1497
-
-
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"2⤵PID:1438
-
/usr/bin/mkdirmkdir -p /usr/bin3⤵
- Reads runtime system information
PID:1439
-
-
-
/bin/shsh -c "cp -f /tmp/39a708f0997751f152ecb7690a77dddd_JaffaCakes118 /usr/bin/pythno"2⤵PID:1440
-
/usr/bin/cpcp -f /tmp/39a708f0997751f152ecb7690a77dddd_JaffaCakes118 /usr/bin/pythno3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1441
-
-
-
/bin/shsh -c /usr/bin/pythno2⤵PID:1443
-
/usr/bin/pythno/usr/bin/pythno3⤵
- Executes dropped EXE
- Reads runtime system information
- Writes file to tmp directory
PID:1444
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"2⤵PID:1447
-
/usr/sbin/insmodinsmod /usr/lib/xpacket.ko3⤵
- Reads runtime system information
PID:1448
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD57f9e7c206ac973ea5b4ec6ceabb6374d
SHA1c85ae76d48ee9dcf28835c293d6743992ea1d413
SHA256744ba81ebc76dba09791db6cebd20bd737c8b2bc0d77f01823865de34c4370a5
SHA512a376f1e64c0a11894abd7a813e00f6edd269fc5c1ccdb2d0d908e98ba085ef8239b06c85762b72521afb5d4408e2b8bd9dace1dad27c3c1edffd573785aaeefb
-
Filesize
36B
MD5caa27b819c9303446f702929874a00e8
SHA1d24199c0e376edea3f822b215148cc0dc78364bf
SHA256da9b535a14c6d9152857e211f14fb8da9056e84ba1b8d4dc27ab79c98264050b
SHA512dcd9413eb2cb24d77f637edfc00ca0bb42229a1a3b0d84e29eff94a7b91aee6ee8c126c286a4b4103e01834d1c6aec9de09ffab3927e8de8015421005f31446e
-
Filesize
4B
MD5b265ce60fe4c5384e622b09eb829b8df
SHA1b8509b02cc4c001875e9fcb20f3c7c0df970b5a0
SHA256146c09db1bc3d53de430b2539d042fc870a84996071db58de8b8cf2099bbebc6
SHA512ba3eda3088ddadf7fc68953b02601a1398a083cdf4b52a32d31f53aa82ac48904a0fc6264e5876719fb8f01ae41bcc38c8581086abb14d607dcd02bf3c75a244
-
Filesize
51B
MD52b00e9b6e7109e0aea56f7f3c54bc5bb
SHA1039de114e7b8b9fa5ed51863a4937620a85042f6
SHA256deb529fece344849c0d1a442988197224c5f31b088b969f1711b9d8a432681a2
SHA51273fbbe17e569ad89f6109992abcc4233b5c198f3b2837f25139580b3d920f810713c435bada22ff3dd100ccab6d781671d984ec04c800e8ce1d35bbf28821782
-
Filesize
4B
MD5ea8fcd92d59581717e06eb187f10666d
SHA1b5883dc5a6e6b2ff4594aa6ca86cf5739a5ab5e2
SHA256aecef364029f6f3f008b4f2b87b9a1c27e596a74062b83cad24fab73cce4f1f0
SHA512e96e9a975b2b19c32bb03a5fc26f7a85d1a54a6c180d50e00eadd40a519714f56f3bd6b68c8105942275265e059906806aa5cbbaf72ba1e73d2c1dd920e8e1fe
-
Filesize
69B
MD598f7868b1d672db13c553f8961abc70d
SHA1591895eb33e70d40cf634980b573c9bbdc5f25c7
SHA25619725ae3b1111de5679167fe037808ba436dccc5a742bd388ed4c5159539542a
SHA512413a0fb82873659678b9dfbfc93ffdc39562bb3b7f4ab387e4e17586fc9a5eeb43a09f9f68fe44d16d9167cce3a48f2ae09bea10d2f1db141668a1fb57ea9560
-
Filesize
1.1MB
MD539a708f0997751f152ecb7690a77dddd
SHA18d9b4d82b1cbff29b83c5ad13d64dac197fcf7a5
SHA25675a39283e00fdd65813efd892522b77c655b920b32637b0c7106a0340d1a97cf
SHA51275a1d0cc16b2f0023f4c61ed53060fa8c249bbe346a98f3cbdc90e0442172184b48d820866e8223b6be6f23d6d26f4c9435938afa4a88af03e1e71c657f62eef
-
Filesize
171KB
MD5061386937ec7acf924438a2643a32be0
SHA101a044b9e58839bea3e58c66cb32acc16241bf91
SHA2568a26bbae9eb85aa98ef29cfe5b0a291234db6eb394c3e0c2841983dcf7dda959
SHA5122de2e56ac4c32f47b4a1945ccfb0db378e6d59019ee8004e3e5d2ec8935efb5aa8ee14b8a0b21c61a267e195d42a3232a6dcade8720de06118fd579277f59db7
-
Filesize
134KB
MD5d194576b899af45b1d2a448612ec21e5
SHA1492f7d8f28cd4397ce22fcf0d8bf3304ea93465a
SHA256a8cf81f3a1137c999c3cf336507ce120b3065e633ade01db6280d427b7d986ca
SHA512b323babd9580b91772cde29c9f22ae75b27f5ce8ce0268a48ca41713c3545dd72409932a5c48f6af66ac6e43127eb5461d1f686bd667fa1b0e56a1564db3c539