Analysis
-
max time kernel
0s -
max time network
132s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240508-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240508-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
19-05-2024 19:53
Static task
static1
Behavioral task
behavioral1
Sample
5b29e4e7140e8826347c2cd43c428b25_JaffaCakes118
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
5b29e4e7140e8826347c2cd43c428b25_JaffaCakes118
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral3
Sample
5b29e4e7140e8826347c2cd43c428b25_JaffaCakes118
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
5b29e4e7140e8826347c2cd43c428b25_JaffaCakes118
Resource
debian9-mipsel-20240418-en
General
-
Target
5b29e4e7140e8826347c2cd43c428b25_JaffaCakes118
-
Size
1KB
-
MD5
5b29e4e7140e8826347c2cd43c428b25
-
SHA1
99e2f547838a3cea81eb1dbb086211477abe5bdd
-
SHA256
a764817259a3a751783544c83176589e9b70dfa79845b285593bb23eb19efd0a
-
SHA512
553752e73da8a885e74f981b5310eba24c6cc0abdc07330e99e49d559bc274fe2b06992edb7e3162a8c76c7732ceb057f2a729829e9872a8dc9420b1190015e0
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
ioc pid Process /tmp/InfectedByHubnr 1490 InfectedByHubnr /tmp/InfectedByHubnr 1495 InfectedByHubnr /tmp/InfectedByHubnr 1500 InfectedByHubnr /tmp/InfectedByHubnr 1505 InfectedByHubnr /tmp/InfectedByHubnr 1510 InfectedByHubnr /tmp/InfectedByHubnr 1515 InfectedByHubnr /tmp/InfectedByHubnr 1520 InfectedByHubnr /tmp/InfectedByHubnr 1525 InfectedByHubnr /tmp/InfectedByHubnr 1530 InfectedByHubnr /tmp/InfectedByHubnr 1535 InfectedByHubnr -
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/filesystems cp -
Writes file to tmp directory 2 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/busybox cp File opened for modification /tmp/InfectedByHubnr 5b29e4e7140e8826347c2cd43c428b25_JaffaCakes118
Processes
-
/tmp/5b29e4e7140e8826347c2cd43c428b25_JaffaCakes118/tmp/5b29e4e7140e8826347c2cd43c428b25_JaffaCakes1181⤵
- Writes file to tmp directory
PID:1485 -
/bin/cpcp /bin/busybox /tmp/2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:1486
-
-
/bin/catcat Josho.x862⤵PID:1488
-
-
/bin/chmodchmod +x 5b29e4e7140e8826347c2cd43c428b25_JaffaCakes118 busybox config-err-R52pd2 InfectedByHubnr netplan_avflpz3e snap-private-tmp ssh-7svD6qCESQbR systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-bolt.service-sMjqOQ systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-colord.service-CGiR9j systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-ModemManager.service-MiKhe1 systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-systemd-resolved.service-4LjNxe systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-systemd-timedated.service-KDYUyM2⤵PID:1489
-
-
/tmp/InfectedByHubnr./InfectedByHubnr ssh2⤵
- Executes dropped EXE
PID:1490
-
-
/bin/catcat Josho.mips2⤵PID:1493
-
-
/bin/chmodchmod +x 5b29e4e7140e8826347c2cd43c428b25_JaffaCakes118 busybox config-err-R52pd2 InfectedByHubnr netplan_avflpz3e snap-private-tmp ssh-7svD6qCESQbR systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-bolt.service-sMjqOQ systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-colord.service-CGiR9j systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-ModemManager.service-MiKhe1 systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-systemd-resolved.service-4LjNxe systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-systemd-timedated.service-KDYUyM2⤵PID:1494
-
-
/tmp/InfectedByHubnr./InfectedByHubnr ssh2⤵
- Executes dropped EXE
PID:1495
-
-
/bin/catcat Josho.mpsl2⤵PID:1498
-
-
/bin/chmodchmod +x 5b29e4e7140e8826347c2cd43c428b25_JaffaCakes118 busybox config-err-R52pd2 InfectedByHubnr netplan_avflpz3e snap-private-tmp ssh-7svD6qCESQbR systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-bolt.service-sMjqOQ systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-colord.service-CGiR9j systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-ModemManager.service-MiKhe1 systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-systemd-resolved.service-4LjNxe systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-systemd-timedated.service-KDYUyM2⤵PID:1499
-
-
/tmp/InfectedByHubnr./InfectedByHubnr ssh2⤵
- Executes dropped EXE
PID:1500
-
-
/bin/catcat Josho.arm42⤵PID:1503
-
-
/bin/chmodchmod +x 5b29e4e7140e8826347c2cd43c428b25_JaffaCakes118 busybox config-err-R52pd2 InfectedByHubnr netplan_avflpz3e snap-private-tmp ssh-7svD6qCESQbR systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-bolt.service-sMjqOQ systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-colord.service-CGiR9j systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-ModemManager.service-MiKhe1 systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-systemd-resolved.service-4LjNxe systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-systemd-timedated.service-KDYUyM2⤵PID:1504
-
-
/tmp/InfectedByHubnr./InfectedByHubnr ssh2⤵
- Executes dropped EXE
PID:1505
-
-
/bin/catcat Josho.arm52⤵PID:1508
-
-
/bin/chmodchmod +x 5b29e4e7140e8826347c2cd43c428b25_JaffaCakes118 busybox config-err-R52pd2 InfectedByHubnr netplan_avflpz3e snap-private-tmp ssh-7svD6qCESQbR systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-bolt.service-sMjqOQ systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-colord.service-CGiR9j systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-ModemManager.service-MiKhe1 systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-systemd-resolved.service-4LjNxe systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-systemd-timedated.service-KDYUyM2⤵PID:1509
-
-
/tmp/InfectedByHubnr./InfectedByHubnr ssh2⤵
- Executes dropped EXE
PID:1510
-
-
/bin/catcat Josho.arm62⤵PID:1513
-
-
/bin/chmodchmod +x 5b29e4e7140e8826347c2cd43c428b25_JaffaCakes118 busybox config-err-R52pd2 InfectedByHubnr netplan_avflpz3e snap-private-tmp ssh-7svD6qCESQbR systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-bolt.service-sMjqOQ systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-colord.service-CGiR9j systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-ModemManager.service-MiKhe1 systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-systemd-resolved.service-4LjNxe systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-systemd-timedated.service-KDYUyM2⤵PID:1514
-
-
/tmp/InfectedByHubnr./InfectedByHubnr ssh2⤵
- Executes dropped EXE
PID:1515
-
-
/bin/catcat Josho.arm72⤵PID:1518
-
-
/bin/chmodchmod +x 5b29e4e7140e8826347c2cd43c428b25_JaffaCakes118 busybox config-err-R52pd2 InfectedByHubnr netplan_avflpz3e snap-private-tmp ssh-7svD6qCESQbR systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-bolt.service-sMjqOQ systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-colord.service-CGiR9j systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-ModemManager.service-MiKhe1 systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-systemd-resolved.service-4LjNxe systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-systemd-timedated.service-KDYUyM2⤵PID:1519
-
-
/tmp/InfectedByHubnr./InfectedByHubnr ssh2⤵
- Executes dropped EXE
PID:1520
-
-
/bin/catcat Josho.ppc2⤵PID:1523
-
-
/bin/chmodchmod +x 5b29e4e7140e8826347c2cd43c428b25_JaffaCakes118 busybox config-err-R52pd2 InfectedByHubnr netplan_avflpz3e snap-private-tmp ssh-7svD6qCESQbR systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-bolt.service-sMjqOQ systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-colord.service-CGiR9j systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-ModemManager.service-MiKhe1 systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-systemd-resolved.service-4LjNxe systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-systemd-timedated.service-KDYUyM2⤵PID:1524
-
-
/tmp/InfectedByHubnr./InfectedByHubnr ssh2⤵
- Executes dropped EXE
PID:1525
-
-
/bin/catcat Josho.m68k2⤵PID:1528
-
-
/bin/chmodchmod +x 5b29e4e7140e8826347c2cd43c428b25_JaffaCakes118 busybox config-err-R52pd2 InfectedByHubnr netplan_avflpz3e snap-private-tmp ssh-7svD6qCESQbR systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-bolt.service-sMjqOQ systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-colord.service-CGiR9j systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-ModemManager.service-MiKhe1 systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-systemd-resolved.service-4LjNxe systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-systemd-timedated.service-KDYUyM2⤵PID:1529
-
-
/tmp/InfectedByHubnr./InfectedByHubnr ssh2⤵
- Executes dropped EXE
PID:1530
-
-
/bin/catcat Josho.sh42⤵PID:1533
-
-
/bin/chmodchmod +x 5b29e4e7140e8826347c2cd43c428b25_JaffaCakes118 busybox config-err-R52pd2 InfectedByHubnr netplan_avflpz3e snap-private-tmp ssh-7svD6qCESQbR systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-bolt.service-sMjqOQ systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-colord.service-CGiR9j systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-ModemManager.service-MiKhe1 systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-systemd-resolved.service-4LjNxe systemd-private-e8790f827db24cc8bf9b4ff61ccabe95-systemd-timedated.service-KDYUyM2⤵PID:1534
-
-
/tmp/InfectedByHubnr./InfectedByHubnr ssh2⤵
- Executes dropped EXE
PID:1535
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5b4dede5fc0b1bad5cb8e901bde126b97
SHA110cbe9a418ad84a1ed297948539d37aeb58dd810
SHA256a9f0735d28f9a6a4f2634d3b144156f7b3df3b476a16a5ab0c7bdf98d74dd020
SHA51245665ce3a42f63a01fdef517e0c4cb943efce64c8a32d3ce07ab4f1fafc23cda77f378d324342efc79dc9d2293c4b4454d06c1cf4997b9e866784de01cb546e6