Analysis
-
max time kernel
149s -
max time network
181s -
platform
debian-12_armhf -
resource
debian12-armhf-20240221-en -
resource tags
arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
22/07/2024, 14:33
Behavioral task
behavioral1
Sample
638e398206d29236f082549b06c48ae4_JaffaCakes118
Resource
debian12-armhf-20240221-en
General
-
Target
638e398206d29236f082549b06c48ae4_JaffaCakes118
-
Size
213KB
-
MD5
638e398206d29236f082549b06c48ae4
-
SHA1
85bc9137b7a1e160ac60e0cc028225d41ee287bb
-
SHA256
61bb3ff9456c5f9ccab4ab97d1a6d547b7af257ce32ca33990f7232dcea6ca22
-
SHA512
7ee93bfac2e0234f1759a2a432ebeda288dddaa3dae284c23cec8aeb91d7ac1b47f35d3772f98976df33787d6b080b5bfa59349a37672c900ff057ef8aec9c04
-
SSDEEP
6144:RaCYkTVPZaCeDlxOhzZONBOyvf+EPM/9orWmvtl4ywkVBXi:RRYiVPZaCeDlxO5OB3vRE/6Wmvtl4dkW
Malware Config
Signatures
-
Contacts a large (70705) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 638e398206d29236f082549b06c48ae4_JaffaCakes118 File opened for modification /dev/misc/watchdog 638e398206d29236f082549b06c48ae4_JaffaCakes118 -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route 638e398206d29236f082549b06c48ae4_JaffaCakes118 -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /usr/sbin/dropbear 701 638e398206d29236f082549b06c48ae4_JaffaCakes118 -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route 638e398206d29236f082549b06c48ae4_JaffaCakes118