Analysis
-
max time kernel
149s -
max time network
128s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240729-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
28-07-2024 17:31
Behavioral task
behavioral1
Sample
19c71e6ffc70783f1c78b2f3da61461f_JaffaCakes118
Resource
ubuntu1804-amd64-20240729-en
General
-
Target
19c71e6ffc70783f1c78b2f3da61461f_JaffaCakes118
-
Size
1.1MB
-
MD5
19c71e6ffc70783f1c78b2f3da61461f
-
SHA1
6f3c70ebdb21c50e41c98e6adf15599d576235aa
-
SHA256
59eefbe4e45862763a3cbbc11dcab546d9299c1af083c7687cbb01e95c90c924
-
SHA512
df89ebe8ccad1eb35a482090043312d5640b8d7d4e8a2c135d91053db749d1ddc8335f8a5ea340bb9cc9fa0f9e37e00d028a173dcb14c5f7e3f59309263838ad
-
SSDEEP
24576:4vRE7caCfKGPqVEDNLFxKsfawI+gIGYuuCol7r:4vREKfPqVE5jKsfawRHGVo7r
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
Processes:
resource yara_rule /usr/bin/bsd-port/19c71e6ffc70783f1c78b2f3da61461f_JaffaCakes118 family_mrblack -
Executes dropped EXE 1 IoCs
Processes:
oracleioc pid process /usr/bin/oracle 1538 oracle -
Processes:
19c71e6ffc70783f1c78b2f3da61461f_JaffaCakes118description ioc process File opened for modification /etc/init.d/VsystemsshMmt 19c71e6ffc70783f1c78b2f3da61461f_JaffaCakes118 -
Write file to user bin folder 1 TTPs 4 IoCs
Processes:
19c71e6ffc70783f1c78b2f3da61461f_JaffaCakes118cpcpdescription ioc process File opened for modification /usr/bin/bsd-port/.conf 19c71e6ffc70783f1c78b2f3da61461f_JaffaCakes118 File opened for modification /usr/bin/bsd-port/udevd.conf 19c71e6ffc70783f1c78b2f3da61461f_JaffaCakes118 File opened for modification /usr/bin/bsd-port/19c71e6ffc70783f1c78b2f3da61461f_JaffaCakes118 cp File opened for modification /usr/bin/oracle cp -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
19c71e6ffc70783f1c78b2f3da61461f_JaffaCakes118description ioc process File opened for reading /proc/cpuinfo 19c71e6ffc70783f1c78b2f3da61461f_JaffaCakes118 -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
19c71e6ffc70783f1c78b2f3da61461f_JaffaCakes118description ioc process File opened for reading /proc/net/dev 19c71e6ffc70783f1c78b2f3da61461f_JaffaCakes118 -
Reads runtime system information 7 IoCs
Reads data from /proc virtual filesystem.
Processes:
mkdircpmkdircp19c71e6ffc70783f1c78b2f3da61461f_JaffaCakes118insmoddescription ioc process File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/stat 19c71e6ffc70783f1c78b2f3da61461f_JaffaCakes118 File opened for reading /proc/meminfo 19c71e6ffc70783f1c78b2f3da61461f_JaffaCakes118 File opened for reading /proc/cmdline insmod -
Writes file to tmp directory 7 IoCs
Malware often drops required files in the /tmp directory.
Processes:
19c71e6ffc70783f1c78b2f3da61461f_JaffaCakes118oracledescription ioc process File opened for modification /tmp/notify.file 19c71e6ffc70783f1c78b2f3da61461f_JaffaCakes118 File opened for modification /tmp/appd.log oracle File opened for modification /tmp/notify.file oracle File opened for modification /tmp/Dest.cfg oracle File opened for modification /tmp/appd.log 19c71e6ffc70783f1c78b2f3da61461f_JaffaCakes118 File opened for modification /tmp/appd.conf 19c71e6ffc70783f1c78b2f3da61461f_JaffaCakes118 File opened for modification /tmp/Dest.cfg 19c71e6ffc70783f1c78b2f3da61461f_JaffaCakes118
Processes
-
/tmp/19c71e6ffc70783f1c78b2f3da61461f_JaffaCakes118/tmp/19c71e6ffc70783f1c78b2f3da61461f_JaffaCakes1181⤵
- Modifies init.d
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
- Writes file to tmp directory
PID:1510 -
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMmt /etc/rc1.d/S97VsystemsshMmt"2⤵PID:1515
-
/bin/lnln -s /etc/init.d/VsystemsshMmt /etc/rc1.d/S97VsystemsshMmt3⤵PID:1516
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMmt /etc/rc2.d/S97VsystemsshMmt"2⤵PID:1517
-
/bin/lnln -s /etc/init.d/VsystemsshMmt /etc/rc2.d/S97VsystemsshMmt3⤵PID:1518
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMmt /etc/rc3.d/S97VsystemsshMmt"2⤵PID:1519
-
/bin/lnln -s /etc/init.d/VsystemsshMmt /etc/rc3.d/S97VsystemsshMmt3⤵PID:1520
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMmt /etc/rc4.d/S97VsystemsshMmt"2⤵PID:1521
-
/bin/lnln -s /etc/init.d/VsystemsshMmt /etc/rc4.d/S97VsystemsshMmt3⤵PID:1522
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMmt /etc/rc5.d/S97VsystemsshMmt"2⤵PID:1523
-
/bin/lnln -s /etc/init.d/VsystemsshMmt /etc/rc5.d/S97VsystemsshMmt3⤵PID:1524
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"2⤵PID:1525
-
/bin/mkdirmkdir -p /usr/bin/bsd-port3⤵
- Reads runtime system information
PID:1526 -
/bin/shsh -c "cp -f /tmp/19c71e6ffc70783f1c78b2f3da61461f_JaffaCakes118 /usr/bin/bsd-port/"2⤵PID:1527
-
/bin/cpcp -f /tmp/19c71e6ffc70783f1c78b2f3da61461f_JaffaCakes118 /usr/bin/bsd-port/3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1528 -
/bin/shsh -c /usr/bin/bsd-port/2⤵PID:1530
-
/usr/bin/bsd-port/usr/bin/bsd-port/3⤵PID:1531
-
/bin/shsh -c "mkdir -p /usr/bin"2⤵PID:1532
-
/bin/mkdirmkdir -p /usr/bin3⤵
- Reads runtime system information
PID:1533 -
/bin/shsh -c "cp -f /tmp/19c71e6ffc70783f1c78b2f3da61461f_JaffaCakes118 /usr/bin/oracle"2⤵PID:1534
-
/bin/cpcp -f /tmp/19c71e6ffc70783f1c78b2f3da61461f_JaffaCakes118 /usr/bin/oracle3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1535 -
/bin/shsh -c /usr/bin/oracle2⤵PID:1537
-
/usr/bin/oracle/usr/bin/oracle3⤵
- Executes dropped EXE
- Writes file to tmp directory
PID:1538 -
/bin/shsh -c "insmod /usr/lib/xpacket.ko"2⤵PID:1540
-
/sbin/insmodinsmod /usr/lib/xpacket.ko3⤵
- Reads runtime system information
PID:1541
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD53425cd7d9e18114dbcbb34352168231b
SHA1f8fc0786c6dbc8e9cd9f0daa88fb71a98b85860c
SHA256d17ac88d905b768ef6b6fa75aa72245bb20e2849634a245570634efdc24b6f99
SHA512f15003cad8e65f66bf8a5013d340e5abf5474b4fa697fd62de265c64bb668b3414a1fcf303b00f642900f00bf15c8d250a709f932716f7572402b00dd5d41e45
-
Filesize
4B
MD5ebb71045453f38676c40deb9864f811d
SHA1810bd2adca8109e71a0fa4995bb7a965fd8d905a
SHA2560d0c9bc37ae955b26c8bfecc22fcd072c4ea5ce95947a5051b5ed7399bff4f2e
SHA5123a3fc2e1174cf6fa5acf3b1d706c3f21b85915b8f7bc2bae7c5ca6ceb86fc5377e33ff347264e1dd620fcba5fec174ae4b8793e7a9aaaf2b0ec06d85e077efdf
-
Filesize
51B
MD5ebadefd1036b8e393b663588023cb41a
SHA17c828a54e316f6d24b14ed5deadf4289b16975b9
SHA2562e0db741419fefc607fef77d2d64eb8343d9d59ec90822ca4c8667a64309531a
SHA5123fb22ff594e6154f79d1f6e4e4d9a3eab1debbf43f8f636d5c14b6dfa0b5359984bc22fc64c66768f8558e05edc88b102b71a859b38582bfa8bd0a2bfe352ee2
-
Filesize
1.1MB
MD519c71e6ffc70783f1c78b2f3da61461f
SHA16f3c70ebdb21c50e41c98e6adf15599d576235aa
SHA25659eefbe4e45862763a3cbbc11dcab546d9299c1af083c7687cbb01e95c90c924
SHA512df89ebe8ccad1eb35a482090043312d5640b8d7d4e8a2c135d91053db749d1ddc8335f8a5ea340bb9cc9fa0f9e37e00d028a173dcb14c5f7e3f59309263838ad