Analysis
-
max time kernel
149s -
max time network
128s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240729-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
29-07-2024 05:29
Behavioral task
behavioral1
Sample
39a708f0997751f152ecb7690a77dddd_JaffaCakes118
Resource
ubuntu1804-amd64-20240729-en
General
-
Target
39a708f0997751f152ecb7690a77dddd_JaffaCakes118
-
Size
1.1MB
-
MD5
39a708f0997751f152ecb7690a77dddd
-
SHA1
8d9b4d82b1cbff29b83c5ad13d64dac197fcf7a5
-
SHA256
75a39283e00fdd65813efd892522b77c655b920b32637b0c7106a0340d1a97cf
-
SHA512
75a1d0cc16b2f0023f4c61ed53060fa8c249bbe346a98f3cbdc90e0442172184b48d820866e8223b6be6f23d6d26f4c9435938afa4a88af03e1e71c657f62eef
-
SSDEEP
24576:4vRE7caCfKGPqVEDNLFxKsfaCI+gIGYuuCol7r:4vREKfPqVE5jKsfaCRHGVo7r
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
resource yara_rule behavioral1/files/fstream-4.dat family_mrblack -
Executes dropped EXE 2 IoCs
ioc pid Process /usr/bin/bsd-port/knerl 1539 knerl /usr/bin/pythno 1547 pythno -
description ioc Process File opened for modification /etc/init.d/VsystemsshMdt 39a708f0997751f152ecb7690a77dddd_JaffaCakes118 File opened for modification /etc/init.d/selinux knerl -
Write file to user bin folder 1 TTPs 8 IoCs
description ioc Process File opened for modification /usr/bin/dpkgd/ps cp File opened for modification /usr/bin/dpkgd/lsof cp File opened for modification /usr/bin/lsof cp File opened for modification /usr/bin/bsd-port/knerl.conf 39a708f0997751f152ecb7690a77dddd_JaffaCakes118 File opened for modification /usr/bin/bsd-port/udevd.conf 39a708f0997751f152ecb7690a77dddd_JaffaCakes118 File opened for modification /usr/bin/bsd-port/knerl cp File opened for modification /usr/bin/pythno cp File opened for modification /usr/bin/bsd-port/knerl.conf knerl -
Writes file to system bin folder 1 TTPs 1 IoCs
description ioc Process File opened for modification /bin/ps cp -
Checks CPU configuration 1 TTPs 2 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo 39a708f0997751f152ecb7690a77dddd_JaffaCakes118 File opened for reading /proc/cpuinfo knerl -
Reads system network configuration 1 TTPs 2 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/dev 39a708f0997751f152ecb7690a77dddd_JaffaCakes118 File opened for reading /proc/net/dev knerl -
Reads runtime system information 17 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/meminfo knerl File opened for reading /proc/stat 39a708f0997751f152ecb7690a77dddd_JaffaCakes118 File opened for reading /proc/cmdline insmod File opened for reading /proc/meminfo 39a708f0997751f152ecb7690a77dddd_JaffaCakes118 File opened for reading /proc/filesystems cp File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/stat knerl File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir -
Writes file to tmp directory 7 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/idus.log pythno File opened for modification /tmp/notify.file pythno File opened for modification /tmp/vga.conf pythno File opened for modification /tmp/idus.log 39a708f0997751f152ecb7690a77dddd_JaffaCakes118 File opened for modification /tmp/apsh.conf 39a708f0997751f152ecb7690a77dddd_JaffaCakes118 File opened for modification /tmp/vga.conf 39a708f0997751f152ecb7690a77dddd_JaffaCakes118 File opened for modification /tmp/notify.file 39a708f0997751f152ecb7690a77dddd_JaffaCakes118
Processes
-
/tmp/39a708f0997751f152ecb7690a77dddd_JaffaCakes118/tmp/39a708f0997751f152ecb7690a77dddd_JaffaCakes1181⤵
- Modifies init.d
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
- Writes file to tmp directory
PID:1517 -
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMdt /etc/rc1.d/S97VsystemsshMdt"2⤵PID:1523
-
/bin/lnln -s /etc/init.d/VsystemsshMdt /etc/rc1.d/S97VsystemsshMdt3⤵PID:1524
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMdt /etc/rc2.d/S97VsystemsshMdt"2⤵PID:1525
-
/bin/lnln -s /etc/init.d/VsystemsshMdt /etc/rc2.d/S97VsystemsshMdt3⤵PID:1526
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMdt /etc/rc3.d/S97VsystemsshMdt"2⤵PID:1527
-
/bin/lnln -s /etc/init.d/VsystemsshMdt /etc/rc3.d/S97VsystemsshMdt3⤵PID:1528
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMdt /etc/rc4.d/S97VsystemsshMdt"2⤵PID:1529
-
/bin/lnln -s /etc/init.d/VsystemsshMdt /etc/rc4.d/S97VsystemsshMdt3⤵PID:1530
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMdt /etc/rc5.d/S97VsystemsshMdt"2⤵PID:1531
-
/bin/lnln -s /etc/init.d/VsystemsshMdt /etc/rc5.d/S97VsystemsshMdt3⤵PID:1532
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"2⤵PID:1533
-
/bin/mkdirmkdir -p /usr/bin/bsd-port3⤵
- Reads runtime system information
PID:1534
-
-
-
/bin/shsh -c "cp -f /tmp/39a708f0997751f152ecb7690a77dddd_JaffaCakes118 /usr/bin/bsd-port/knerl"2⤵PID:1535
-
/bin/cpcp -f /tmp/39a708f0997751f152ecb7690a77dddd_JaffaCakes118 /usr/bin/bsd-port/knerl3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1536
-
-
-
/bin/shsh -c /usr/bin/bsd-port/knerl2⤵PID:1538
-
/usr/bin/bsd-port/knerl/usr/bin/bsd-port/knerl3⤵
- Executes dropped EXE
- Modifies init.d
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
PID:1539 -
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"4⤵PID:1554
-
/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux5⤵PID:1555
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"4⤵PID:1556
-
/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux5⤵PID:1557
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"4⤵PID:1558
-
/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux5⤵PID:1559
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"4⤵PID:1560
-
/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux5⤵PID:1561
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"4⤵PID:1562
-
/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux5⤵PID:1563
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"4⤵PID:1564
-
/bin/mkdirmkdir -p /usr/bin/dpkgd5⤵
- Reads runtime system information
PID:1565
-
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"4⤵PID:1566
-
/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1567
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1568
-
/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1569
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/knerl /bin/ps"4⤵PID:1570
-
/bin/cpcp -f /usr/bin/bsd-port/knerl /bin/ps5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1571
-
-
-
/bin/shsh -c "chmod 0755 /bin/ps"4⤵PID:1573
-
/bin/chmodchmod 0755 /bin/ps5⤵PID:1574
-
-
-
/bin/shsh -c "cp -f /usr/bin/lsof /usr/bin/dpkgd/lsof"4⤵PID:1575
-
/bin/cpcp -f /usr/bin/lsof /usr/bin/dpkgd/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1576
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1577
-
/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1578
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/knerl /usr/bin/lsof"4⤵PID:1579
-
/bin/cpcp -f /usr/bin/bsd-port/knerl /usr/bin/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1580
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"4⤵PID:1581
-
/bin/chmodchmod 0755 /usr/bin/lsof5⤵PID:1582
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"4⤵PID:1583
-
/sbin/insmodinsmod /usr/lib/xpacket.ko5⤵
- Reads runtime system information
PID:1584
-
-
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"2⤵PID:1541
-
/bin/mkdirmkdir -p /usr/bin3⤵
- Reads runtime system information
PID:1542
-
-
-
/bin/shsh -c "cp -f /tmp/39a708f0997751f152ecb7690a77dddd_JaffaCakes118 /usr/bin/pythno"2⤵PID:1543
-
/bin/cpcp -f /tmp/39a708f0997751f152ecb7690a77dddd_JaffaCakes118 /usr/bin/pythno3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1544
-
-
-
/bin/shsh -c /usr/bin/pythno2⤵PID:1546
-
/usr/bin/pythno/usr/bin/pythno3⤵
- Executes dropped EXE
- Writes file to tmp directory
PID:1547
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"2⤵PID:1549
-
/sbin/insmodinsmod /usr/lib/xpacket.ko3⤵
- Reads runtime system information
PID:1550
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD57f9e7c206ac973ea5b4ec6ceabb6374d
SHA1c85ae76d48ee9dcf28835c293d6743992ea1d413
SHA256744ba81ebc76dba09791db6cebd20bd737c8b2bc0d77f01823865de34c4370a5
SHA512a376f1e64c0a11894abd7a813e00f6edd269fc5c1ccdb2d0d908e98ba085ef8239b06c85762b72521afb5d4408e2b8bd9dace1dad27c3c1edffd573785aaeefb
-
Filesize
36B
MD5caa27b819c9303446f702929874a00e8
SHA1d24199c0e376edea3f822b215148cc0dc78364bf
SHA256da9b535a14c6d9152857e211f14fb8da9056e84ba1b8d4dc27ab79c98264050b
SHA512dcd9413eb2cb24d77f637edfc00ca0bb42229a1a3b0d84e29eff94a7b91aee6ee8c126c286a4b4103e01834d1c6aec9de09ffab3927e8de8015421005f31446e
-
Filesize
4B
MD535464c848f410e55a13bb9d78e7fddd0
SHA1a575bcefdc7a11dec7302ce66652db242e7931ea
SHA25648f31b127dde9f650b07d6d68488d734ed95687cbcfb2d06867d21ad0997f438
SHA5121d0d7db8e07f74deab2c3b47c8bc683145a0a8ed486c65c19f0e43a62f283d69ff4ad586802d96b866ac836d0ff925b0e8de8e485c95473d044cec04edfede18
-
Filesize
51B
MD52b00e9b6e7109e0aea56f7f3c54bc5bb
SHA1039de114e7b8b9fa5ed51863a4937620a85042f6
SHA256deb529fece344849c0d1a442988197224c5f31b088b969f1711b9d8a432681a2
SHA51273fbbe17e569ad89f6109992abcc4233b5c198f3b2837f25139580b3d920f810713c435bada22ff3dd100ccab6d781671d984ec04c800e8ce1d35bbf28821782
-
Filesize
4B
MD542d6c7d61481d1c21bd1635f59edae05
SHA1c8ec393b52a33555bfca80d15909f59f2d09d0cb
SHA2561eb3da012cf952c58269bd949984611b7884583f20bac1322719580757161e98
SHA5122dd37bd778240f4e9e22b64e56dba9f9f6917efbb166d529a6ab09e74b3b9ce5b096aaaec3288b6129a3e07e630d53458bd2571ab199935a4b7efc60bf4cb27d
-
Filesize
1.1MB
MD539a708f0997751f152ecb7690a77dddd
SHA18d9b4d82b1cbff29b83c5ad13d64dac197fcf7a5
SHA25675a39283e00fdd65813efd892522b77c655b920b32637b0c7106a0340d1a97cf
SHA51275a1d0cc16b2f0023f4c61ed53060fa8c249bbe346a98f3cbdc90e0442172184b48d820866e8223b6be6f23d6d26f4c9435938afa4a88af03e1e71c657f62eef
-
Filesize
159KB
MD5e093dc78225e2a0a25e3b137c1c1e442
SHA1c29497cfaae729eb576875e4fdfa400640ab16be
SHA2561190f4dbc7be174de8fd4096c9bf7a28eebfac937d308b7cc533be4a1240d26e
SHA512fe1cc7a65327732eaaee89f427c10239ba822430e34177842f4681068d78d404b1830d808a2a71b1efcc5f126c6d8c053512237421173aaa150e215a672da6f0
-
Filesize
130KB
MD5558edc26f8a38fa9788220b9af8a73e7
SHA13024d44e580e9c67f32f6c585d50e2a6cc9a7cac
SHA256b76435c80333d2c1fd18e0e7682f1c9dfb5da8d507e93e3c416f54b481c428d5
SHA512edaa425b441044f015e8f68fffa1664e42372d00dd0e7b0924d24ce947aa8e5f96b3bdc326fa2f8b978e3fcf638a1ceca45a223735db73f1607df66990feb56f