Analysis
-
max time kernel
150s -
max time network
158s -
platform
debian-12_armhf -
resource
debian12-armhf-20240221-en -
resource tags
arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
30-07-2024 00:05
Static task
static1
Behavioral task
behavioral1
Sample
69278e9f629f9b18ab8f80e18b422986_JaffaCakes118
Resource
debian12-armhf-20240221-en
General
-
Target
69278e9f629f9b18ab8f80e18b422986_JaffaCakes118
-
Size
573KB
-
MD5
69278e9f629f9b18ab8f80e18b422986
-
SHA1
11217cac6023d4b0eddf7955b01ee22ee83d8fa8
-
SHA256
8fb043c6e802a5d71bc908fe3a652f0076a7975310ce8772869b3980b1189c84
-
SHA512
edd5cfa6bfd7a9d4a517955d941df3fc680897c2d0c1a89dc3d9c07a8329927bfd462cb28a072e01698dbdea14760874b3ba9c61f2733a47ced09610ee6d6e79
-
SSDEEP
12288:xgzrhDDhR68i/YkE1a+ZdVI4GvTIy6Q3xxPlitj4QqufXtIJ:xgdhR69u1aYGvTIyDxxPUFTi
Malware Config
Signatures
-
Detects Kaiten/Tsunami Payload 1 IoCs
resource yara_rule behavioral1/memory/709-1-0x00008000-0x001b23c8-memory.dmp family_kaiten2 -
Writes DNS configuration 1 TTPs 1 IoCs
Writes data to DNS resolver config file.
description ioc Process File opened for modification /etc/resolv.conf sh -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /var/spool/cron/crontabs/tmp.n3qe0k crontab -
Reads runtime system information 5 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/1/cmdline 69278e9f629f9b18ab8f80e18b422986_JaffaCakes118 File opened for reading /proc/self/maps grep File opened for reading /proc/self/maps grep File opened for reading /proc/self/maps grep File opened for reading /proc/self/maps grep -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/.udev.rules 69278e9f629f9b18ab8f80e18b422986_JaffaCakes118
Processes
-
/tmp/69278e9f629f9b18ab8f80e18b422986_JaffaCakes118/tmp/69278e9f629f9b18ab8f80e18b422986_JaffaCakes1181⤵
- Reads runtime system information
- Writes file to tmp directory
PID:709 -
/bin/shsh -c "echo \"nameserver 8.8.8.8\" > /etc/resolv.conf &"2⤵
- Writes DNS configuration
PID:718
-
-
/bin/shsh -c "chmod 700 /tmp/69278e9f629f9b18ab8f80e18b422986_JaffaCakes118 > /dev/null 2>&1 &"2⤵PID:722
-
-
/bin/shsh -c "touch -acmr /bin/ls /tmp/69278e9f629f9b18ab8f80e18b422986_JaffaCakes118"2⤵PID:725
-
/usr/bin/touchtouch -acmr /bin/ls /tmp/69278e9f629f9b18ab8f80e18b422986_JaffaCakes1183⤵PID:727
-
-
-
/bin/shsh -c "(crontab -l | grep -v \"/tmp/69278e9f629f9b18ab8f80e18b422986_JaffaCakes118\" | grep -v \"no cron\" | grep -v \"lesshts/run.sh\" > /var/run/.x001804289383) > /dev/null 2>&1"2⤵PID:729
-
/usr/bin/crontabcrontab -l3⤵PID:732
-
-
/usr/bin/grepgrep -v /tmp/69278e9f629f9b18ab8f80e18b422986_JaffaCakes1183⤵
- Reads runtime system information
PID:733
-
-
/usr/bin/grepgrep -v "no cron"3⤵
- Reads runtime system information
PID:734
-
-
/usr/bin/grepgrep -v lesshts/run.sh3⤵
- Reads runtime system information
PID:735
-
-
-
/bin/shsh -c "echo \"* * * * * /tmp/69278e9f629f9b18ab8f80e18b422986_JaffaCakes118 > /dev/null 2>&1 &\" >> /var/run/.x001804289383"2⤵PID:738
-
-
/bin/shsh -c "crontab /var/run/.x001804289383"2⤵PID:740
-
/usr/bin/crontabcrontab /var/run/.x0018042893833⤵
- Creates/modifies Cron job
PID:742
-
-
-
/bin/shsh -c "rm -rf /var/run/.x001804289383"2⤵PID:746
-
/usr/bin/rmrm -rf /var/run/.x0018042893833⤵PID:748
-
-
-
/bin/shsh -c "cat /etc/inittab | grep -v \"/tmp/69278e9f629f9b18ab8f80e18b422986_JaffaCakes118\" > /etc/inittab2"2⤵PID:750
-
/usr/bin/catcat /etc/inittab3⤵PID:752
-
-
/usr/bin/grepgrep -v /tmp/69278e9f629f9b18ab8f80e18b422986_JaffaCakes1183⤵
- Reads runtime system information
PID:753
-
-
-
/bin/shsh -c "echo \"0:2345:respawn:/tmp/69278e9f629f9b18ab8f80e18b422986_JaffaCakes118\" >> /etc/inittab2"2⤵PID:756
-
-
/bin/shsh -c "cat /etc/inittab2 > /etc/inittab"2⤵PID:758
-
/usr/bin/catcat /etc/inittab23⤵PID:760
-
-
-
/bin/shsh -c "rm -rf /etc/inittab2"2⤵PID:763
-
/usr/bin/rmrm -rf /etc/inittab23⤵PID:764
-
-
-
/bin/shsh -c "touch -acmr /bin/ls /etc/inittab"2⤵PID:766
-
/usr/bin/touchtouch -acmr /bin/ls /etc/inittab3⤵PID:769
-
-
-
/bin/shsh -c "/bin/uname -n"2⤵PID:771
-
/bin/uname/bin/uname -n3⤵PID:773
-
-
-
/bin/shsh -c "/bin/uname -n"2⤵PID:774
-
/bin/uname/bin/uname -n3⤵PID:776
-
-
-
/bin/shsh -c "/bin/uname -n"2⤵PID:778
-
/bin/uname/bin/uname -n3⤵PID:780
-
-
-
/usr/bin/chmodchmod 700 /tmp/69278e9f629f9b18ab8f80e18b422986_JaffaCakes1181⤵PID:724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67B
MD559682ede5c9b177b86bcaf52a4f5a11e
SHA1ad9b758ee3bf04600d09c5493a5af21d224519fb
SHA256ded080d774bc034e422595fb847d22ab42fff66123af5e8f660b40c621eed970
SHA5122af0d7fd1d5762c4b3f0a5bb8b81915a2ae6a188eae5c313b413c5b04fb0b402b49c2c8c11870cd4b0ddf488af655dcd91fe576b587bd187f27abb3ddf185db9
-
Filesize
81B
MD517cd2d2f5e57b4c03dd04aee77be796c
SHA1e86e65277892a7f176ddeb70b38c761614562df0
SHA256a5afcd18ec0761420ff214ac412fc2fecd0cfabfeb387bc6763e8391d61d8ec8
SHA5128e98e10f6aeb83f668cac0e069f515da8ad6d4e5b375a8753dd2b12ba22995077597d54890531632993fbcfa39098fb68fdc57410559bb2952b3e48702d1e938
-
Filesize
278B
MD52a445d70dda0980485280468472d1aa2
SHA1f63d7b7d7cf7c9c3acb264be2ed38bc691c5804e
SHA2569f78943fee2d7f0ec69385d73a21102bf998a9d0cb96aa72a23027cfe5920e92
SHA51269626f53570b451dac58b352204b8790a286dda8d2371c6eac81bce251e6bd4ed2424c52921490d92183c67526068857742b020ce8ef94d907d439735656ee25