Analysis
-
max time kernel
149s -
max time network
149s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240611-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
29-07-2024 19:50
Behavioral task
behavioral1
Sample
5c34f94033535e6a954b44444228cb3e_JaffaCakes118
Resource
ubuntu2204-amd64-20240611-en
General
-
Target
5c34f94033535e6a954b44444228cb3e_JaffaCakes118
-
Size
1.1MB
-
MD5
5c34f94033535e6a954b44444228cb3e
-
SHA1
5f9cba3072013040a36127c12e9a17746086a91e
-
SHA256
aa96788936eb8876e488235b158d2baa1fc04f1ecb450ef103df239243ec307b
-
SHA512
a98f5f251e3feea6e1b01adffd511d025cdd2e88e25a74ed3ada7cb3c66f79a6e2b3165dbcdd94ce0351cfeae8b2b9dfdc17ac4d9b1fe0003006bbdff3a8891d
-
SSDEEP
24576:cb3M4ZGqyeivlBOe56bEEFDrhTCB8T+UWlJDrmQLNwy0R:cjM+xyLvOe56oIrhTCB8qzlJDr5d0R
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
resource yara_rule behavioral1/files/fstream-4.dat family_mrblack -
Executes dropped EXE 2 IoCs
ioc pid Process /usr/bin/bsd-port/getty 1584 getty /usr/bin/.sshd 1592 .sshd -
description ioc Process File opened for modification /etc/init.d/DbSecuritySpt 5c34f94033535e6a954b44444228cb3e_JaffaCakes118 File opened for modification /etc/init.d/selinux getty -
Reads system routing table 1 TTPs 2 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route 5c34f94033535e6a954b44444228cb3e_JaffaCakes118 File opened for reading /proc/net/route getty -
Write file to user bin folder 1 TTPs 12 IoCs
description ioc Process File opened for modification /usr/bin/.sshd cp File opened for modification /usr/bin/lsof cp File opened for modification /usr/bin/bsd-port/udevd.lock 5c34f94033535e6a954b44444228cb3e_JaffaCakes118 File opened for modification /usr/bin/bsd-port/getty cp File opened for modification /usr/bin/dpkgd/lsof cp File opened for modification /usr/bin/dpkgd/ps cp File opened for modification /usr/bin/dpkgd/ss cp File opened for modification /usr/bin/ps cp File opened for modification /usr/bin/ss cp File opened for modification /usr/bin/bsd-port/conf.n getty File opened for modification /usr/bin/bsd-port/getty.lock 5c34f94033535e6a954b44444228cb3e_JaffaCakes118 File opened for modification /usr/bin/bsd-port/getty.lock getty -
Writes file to system bin folder 1 TTPs 3 IoCs
description ioc Process File opened for modification /bin/lsof cp File opened for modification /bin/ps cp File opened for modification /bin/ss cp -
Checks CPU configuration 1 TTPs 2 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo 5c34f94033535e6a954b44444228cb3e_JaffaCakes118 File opened for reading /proc/cpuinfo getty -
Reads system network configuration 1 TTPs 6 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/dev 5c34f94033535e6a954b44444228cb3e_JaffaCakes118 File opened for reading /proc/net/route 5c34f94033535e6a954b44444228cb3e_JaffaCakes118 File opened for reading /proc/net/arp 5c34f94033535e6a954b44444228cb3e_JaffaCakes118 File opened for reading /proc/net/dev getty File opened for reading /proc/net/route getty File opened for reading /proc/net/arp getty -
Reads runtime system information 29 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/meminfo 5c34f94033535e6a954b44444228cb3e_JaffaCakes118 File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems cp File opened for reading /proc/sys/kernel/version getty File opened for reading /proc/sys/kernel/version .sshd File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/stat 5c34f94033535e6a954b44444228cb3e_JaffaCakes118 File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/sys/kernel/version 5c34f94033535e6a954b44444228cb3e_JaffaCakes118 File opened for reading /proc/filesystems cp File opened for reading /proc/stat getty File opened for reading /proc/filesystems cp File opened for reading /proc/meminfo getty File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp -
Writes file to tmp directory 8 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/notify.file .sshd File opened for modification /tmp/conf.n 5c34f94033535e6a954b44444228cb3e_JaffaCakes118 File opened for modification /tmp/gates.lod .sshd File opened for modification /tmp/moni.lod 5c34f94033535e6a954b44444228cb3e_JaffaCakes118 File opened for modification /tmp/bill.lock 5c34f94033535e6a954b44444228cb3e_JaffaCakes118 File opened for modification /tmp/gates.lod 5c34f94033535e6a954b44444228cb3e_JaffaCakes118 File opened for modification /tmp/notify.file 5c34f94033535e6a954b44444228cb3e_JaffaCakes118 File opened for modification /tmp/moni.lod .sshd
Processes
-
/tmp/5c34f94033535e6a954b44444228cb3e_JaffaCakes118/tmp/5c34f94033535e6a954b44444228cb3e_JaffaCakes1181⤵
- Modifies init.d
- Reads system routing table
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
- Writes file to tmp directory
PID:1562 -
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt"2⤵PID:1568
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt3⤵PID:1569
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt"2⤵PID:1570
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt3⤵PID:1571
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt"2⤵PID:1572
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt3⤵PID:1573
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt"2⤵PID:1574
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt3⤵PID:1575
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt"2⤵PID:1576
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt3⤵PID:1577
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"2⤵PID:1578
-
/usr/bin/mkdirmkdir -p /usr/bin/bsd-port3⤵
- Reads runtime system information
PID:1579
-
-
-
/bin/shsh -c "cp -f /tmp/5c34f94033535e6a954b44444228cb3e_JaffaCakes118 /usr/bin/bsd-port/getty"2⤵PID:1580
-
/usr/bin/cpcp -f /tmp/5c34f94033535e6a954b44444228cb3e_JaffaCakes118 /usr/bin/bsd-port/getty3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1581
-
-
-
/bin/shsh -c /usr/bin/bsd-port/getty2⤵PID:1583
-
/usr/bin/bsd-port/getty/usr/bin/bsd-port/getty3⤵
- Executes dropped EXE
- Modifies init.d
- Reads system routing table
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
PID:1584 -
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"4⤵PID:1599
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux5⤵PID:1600
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"4⤵PID:1601
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux5⤵PID:1603
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"4⤵PID:1604
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux5⤵PID:1605
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"4⤵PID:1606
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux5⤵PID:1607
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"4⤵PID:1608
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux5⤵PID:1609
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"4⤵PID:1610
-
/usr/bin/mkdirmkdir -p /usr/bin/dpkgd5⤵
- Reads runtime system information
PID:1612
-
-
-
/bin/shsh -c "cp -f /bin/lsof /usr/bin/dpkgd/lsof"4⤵PID:1613
-
/usr/bin/cpcp -f /bin/lsof /usr/bin/dpkgd/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1614
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1615
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1616
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/lsof"4⤵PID:1618
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /bin/lsof5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1619
-
-
-
/bin/shsh -c "chmod 0755 /bin/lsof"4⤵PID:1620
-
/usr/bin/chmodchmod 0755 /bin/lsof5⤵PID:1621
-
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"4⤵PID:1622
-
/usr/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1623
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1625
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1626
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ps"4⤵PID:1627
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ps5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1628
-
-
-
/bin/shsh -c "chmod 0755 /bin/ps"4⤵PID:1630
-
/usr/bin/chmodchmod 0755 /bin/ps5⤵PID:1631
-
-
-
/bin/shsh -c "cp -f /bin/ss /usr/bin/dpkgd/ss"4⤵PID:1632
-
/usr/bin/cpcp -f /bin/ss /usr/bin/dpkgd/ss5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1633
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1634
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1635
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ss"4⤵PID:1636
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ss5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1637
-
-
-
/bin/shsh -c "chmod 0755 /bin/ss"4⤵PID:1639
-
/usr/bin/chmodchmod 0755 /bin/ss5⤵PID:1640
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1642
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1643
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/lsof"4⤵PID:1644
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1645
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"4⤵PID:1646
-
/usr/bin/chmodchmod 0755 /usr/bin/lsof5⤵PID:1647
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1648
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1649
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/ps"4⤵PID:1650
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1651
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/ps"4⤵PID:1652
-
/usr/bin/chmodchmod 0755 /usr/bin/ps5⤵PID:1653
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1654
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1655
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/ss"4⤵PID:1656
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/ss5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1657
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/ss"4⤵PID:1658
-
/usr/bin/chmodchmod 0755 /usr/bin/ss5⤵PID:1659
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"4⤵PID:1660
-
/usr/sbin/insmodinsmod /usr/lib/xpacket.ko5⤵
- Reads runtime system information
PID:1661
-
-
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"2⤵PID:1586
-
/usr/bin/mkdirmkdir -p /usr/bin3⤵
- Reads runtime system information
PID:1587
-
-
-
/bin/shsh -c "cp -f /tmp/5c34f94033535e6a954b44444228cb3e_JaffaCakes118 /usr/bin/.sshd"2⤵PID:1588
-
/usr/bin/cpcp -f /tmp/5c34f94033535e6a954b44444228cb3e_JaffaCakes118 /usr/bin/.sshd3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1589
-
-
-
/bin/shsh -c /usr/bin/.sshd2⤵PID:1591
-
/usr/bin/.sshd/usr/bin/.sshd3⤵
- Executes dropped EXE
- Reads runtime system information
- Writes file to tmp directory
PID:1592
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"2⤵PID:1594
-
/usr/sbin/insmodinsmod /usr/lib/xpacket.ko3⤵
- Reads runtime system information
PID:1595
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD5de063766d62eade3c0930fd6c526d548
SHA10f6edb3ce9aeb2fdb6a12b0ba345e45ddf8879f3
SHA256a6e01de455549a2b69a53857ce99b095dd010d62b2effd89b3ea6f2fdec13f50
SHA512748976f9316e46a8053b79f07fe11a83b0ade9bd6742a83f57bfb4f74eaa83538abb92a7b5dd4d21c0636aeaa48231cf87ef57a242a78af75ae6007a7bec1c0e
-
Filesize
36B
MD5993cc15058142d96c3daf7852c3d5ee8
SHA10950b8b391b04dd3895ea33cd3141543ebd2525d
SHA2568171d077918611803d93088409f220c66fae1c670b297e1aa5d8cbd548ce9208
SHA5120c4256c00a3710f97e92581b552682b36b62afc35fe72622c491323c618c19ea62611ac04ccafc3dfcde2254a2ebbd93b69b66795b16e36332293bed83adb928
-
Filesize
69B
MD5d6e4f7c997d5799b68688a7f5575f6a9
SHA198fd9a06e6263dedeb73cbf5fba57491c8a5e6ce
SHA2560c7c952c0b46a9a1c38a208688ad56079bd223d82474c95e5611cc41c5c18e4c
SHA512011e7e9fa4611e59a2b5dc18ce5f83b242c3c26c2dbd543b5c368a60d06fb44b458317f362197d5457398b1b31d44a763bd51fb5c863dbce27281654de5f3a3b
-
Filesize
4B
MD54d6e4749289c4ec58c0063a90deb3964
SHA1a0e3eab3c80118379cb2e1d7b163f82494430e03
SHA256e830a0d7d5f303724e6404c8f9797580b6e77e4bdab70b8e163967925b69e6d0
SHA512c0a696afb1940c302622b6ba6ec2913c19903291626073ed3233a16000d45bb61ec7c676c42c1ae0e0b32126d9f72e938a80e665a68ad3fbfa0e606c352276ed
-
Filesize
4B
MD506a81a4fb98d149f2d31c68828fa6eb2
SHA1d60af283b62280a8d737359c8859c0142aaf28c0
SHA25638813d9a6e5332787f13dac070d265339c4c711beea8b21f82966684bda30e79
SHA512d5b6404d9d32837b7b89a2d161789d2aa812ad61caba42e3fa5b82095b915ed3b5b7f260cde2521a53e0c5aa6a62ade3ba1f72bb31ab8e1f93baa24f3a6202ce
-
Filesize
51B
MD5e4a4bcf5452012484155cf751a8c006c
SHA17c32b7294c53094080da3c59e959c91566b17069
SHA2567a7ab94a1ccf2bb755543e6757b73b45fc59f009a982b920229292082a00c649
SHA5126dedbdcdec33c4a4e983b4973dd914af8f84804a3d6146e737581f27327f5c6585802a588c3a7e654bc0c7b08d3a71b520d1ab66c31f89d29c8d5a18f42f9ee5
-
Filesize
1.1MB
MD55c34f94033535e6a954b44444228cb3e
SHA15f9cba3072013040a36127c12e9a17746086a91e
SHA256aa96788936eb8876e488235b158d2baa1fc04f1ecb450ef103df239243ec307b
SHA512a98f5f251e3feea6e1b01adffd511d025cdd2e88e25a74ed3ada7cb3c66f79a6e2b3165dbcdd94ce0351cfeae8b2b9dfdc17ac4d9b1fe0003006bbdff3a8891d
-
Filesize
163KB
MD5ab57b66cc531ae0f996963223e632b60
SHA1bf7e5becd33f21c2539f5a75ffa0ab61c49c8795
SHA2562484863a7bfda7f97b90bfd5dfceed4ec9f27dd51f9c5158c8daabbf4309b1df
SHA512908acef13f3c1d80b7169ec3b16bb67006013453348fff75550bc3c6c2137e798b21d7990edbd5be63d756d9c41b06160aebf38aa80547e4bafa3a62596057f6
-
Filesize
138KB
MD58146139c2ad7e550b1d1f49480997446
SHA1074db8890c3227bd8a588417f5b9bde637bcf3af
SHA256207df9d438f75185ab3af2ab1173d104831a6631c28ef40d38b2ab43de27b40f
SHA512b6d71d537f593b9af833e6f798e412e95fc486a313414ed8cca9639f61be7ac9dca700e9f861c0d07c7f65b3783127a67f829f422472cad8938ba01d397ab9de
-
Filesize
125KB
MD51b25ac945efae8520ba112b500e2d561
SHA18324c4d1d1427829266e82f203386232ff82af15
SHA2565eb16d9a8bc81fe767725874e3f67623b8e86b46ec93546be49c5b09d3ab4636
SHA512e191f967170ea4844f736c5ab75b7bf45fef3af34f0a4bef0d36475d646b0b089449fe39806664b9f6ce1984037687930cc368892230662c8c30f67fa3ac216e