Analysis
-
max time kernel
149s -
max time network
156s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240611-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
30-07-2024 15:38
Behavioral task
behavioral1
Sample
77e67ae01d141d95eae25515ffa3f6eb_JaffaCakes118
Resource
ubuntu2204-amd64-20240611-en
General
-
Target
77e67ae01d141d95eae25515ffa3f6eb_JaffaCakes118
-
Size
1.5MB
-
MD5
77e67ae01d141d95eae25515ffa3f6eb
-
SHA1
5d369c6bfc84aaffd9f7596c53464a3b1e9e7a50
-
SHA256
c6671cc274dd02cbd1fe40f56e6ce819634a47ede993e98ad346b3e576f9ee9a
-
SHA512
5c65d540b8a19d6daf9a4a4faf051d2d4c1253bd8bc09e80118cd8bcca520e13b36077d848800a738596d13730955727bc6f46ae2bf19a467e7af8d2fcecc306
-
SSDEEP
24576:GA46TrzJBisiOvhlOHdSbQmHyJgf/kgX0Exb2cyaGpIoiMvnnLmYXqSYKKZdTrnD:zRNi6OHdSbQoyJyXpxb2PaGpXiMvnLmB
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
resource yara_rule behavioral1/files/fstream-4.dat family_mrblack -
Executes dropped EXE 2 IoCs
ioc pid Process /usr/bin/bsd-port/getty 1625 getty /usr/bin/.sshd 1633 .sshd -
description ioc Process File opened for modification /etc/init.d/DbSecuritySpt 77e67ae01d141d95eae25515ffa3f6eb_JaffaCakes118 File opened for modification /etc/init.d/selinux getty -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route 77e67ae01d141d95eae25515ffa3f6eb_JaffaCakes118 -
Write file to user bin folder 1 TTPs 9 IoCs
description ioc Process File opened for modification /usr/bin/bsd-port/udevd.lock 77e67ae01d141d95eae25515ffa3f6eb_JaffaCakes118 File opened for modification /usr/bin/bsd-port/getty cp File opened for modification /usr/bin/.sshd cp File opened for modification /usr/bin/dpkgd/lsof cp File opened for modification /usr/bin/ps cp File opened for modification /usr/bin/bsd-port/getty.lock 77e67ae01d141d95eae25515ffa3f6eb_JaffaCakes118 File opened for modification /usr/bin/bsd-port/getty.lock getty File opened for modification /usr/bin/dpkgd/ps cp File opened for modification /usr/bin/lsof cp -
Writes file to system bin folder 1 TTPs 2 IoCs
description ioc Process File opened for modification /bin/lsof cp File opened for modification /bin/ps cp -
Checks CPU configuration 1 TTPs 2 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo 77e67ae01d141d95eae25515ffa3f6eb_JaffaCakes118 File opened for reading /proc/cpuinfo getty -
Reads system network configuration 1 TTPs 4 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/dev getty File opened for reading /proc/net/dev 77e67ae01d141d95eae25515ffa3f6eb_JaffaCakes118 File opened for reading /proc/net/route 77e67ae01d141d95eae25515ffa3f6eb_JaffaCakes118 File opened for reading /proc/net/arp 77e67ae01d141d95eae25515ffa3f6eb_JaffaCakes118 -
Reads runtime system information 24 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/sys/kernel/version .sshd File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/sys/kernel/version getty File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/stat getty File opened for reading /proc/sys/kernel/version 77e67ae01d141d95eae25515ffa3f6eb_JaffaCakes118 File opened for reading /proc/filesystems mkdir File opened for reading /proc/meminfo 77e67ae01d141d95eae25515ffa3f6eb_JaffaCakes118 File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/stat 77e67ae01d141d95eae25515ffa3f6eb_JaffaCakes118 File opened for reading /proc/meminfo getty -
Writes file to tmp directory 8 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/notify.file 77e67ae01d141d95eae25515ffa3f6eb_JaffaCakes118 File opened for modification /tmp/conf.n 77e67ae01d141d95eae25515ffa3f6eb_JaffaCakes118 File opened for modification /tmp/moni.lock .sshd File opened for modification /tmp/notify.file .sshd File opened for modification /tmp/gates.lock .sshd File opened for modification /tmp/moni.lock 77e67ae01d141d95eae25515ffa3f6eb_JaffaCakes118 File opened for modification /tmp/bill.lock 77e67ae01d141d95eae25515ffa3f6eb_JaffaCakes118 File opened for modification /tmp/gates.lock 77e67ae01d141d95eae25515ffa3f6eb_JaffaCakes118
Processes
-
/tmp/77e67ae01d141d95eae25515ffa3f6eb_JaffaCakes118/tmp/77e67ae01d141d95eae25515ffa3f6eb_JaffaCakes1181⤵
- Modifies init.d
- Reads system routing table
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
- Writes file to tmp directory
PID:1597 -
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt"2⤵PID:1609
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt3⤵PID:1610
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt"2⤵PID:1611
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt3⤵PID:1612
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt"2⤵PID:1613
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt3⤵PID:1614
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt"2⤵PID:1615
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt3⤵PID:1616
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt"2⤵PID:1617
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt3⤵PID:1618
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"2⤵PID:1619
-
/usr/bin/mkdirmkdir -p /usr/bin/bsd-port3⤵
- Reads runtime system information
PID:1620
-
-
-
/bin/shsh -c "cp -f /tmp/77e67ae01d141d95eae25515ffa3f6eb_JaffaCakes118 /usr/bin/bsd-port/getty"2⤵PID:1621
-
/usr/bin/cpcp -f /tmp/77e67ae01d141d95eae25515ffa3f6eb_JaffaCakes118 /usr/bin/bsd-port/getty3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1622
-
-
-
/bin/shsh -c /usr/bin/bsd-port/getty2⤵PID:1624
-
/usr/bin/bsd-port/getty/usr/bin/bsd-port/getty3⤵
- Executes dropped EXE
- Modifies init.d
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
PID:1625 -
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"4⤵PID:1645
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux5⤵PID:1646
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"4⤵PID:1647
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux5⤵PID:1648
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"4⤵PID:1649
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux5⤵PID:1650
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"4⤵PID:1651
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux5⤵PID:1652
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"4⤵PID:1653
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux5⤵PID:1654
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"4⤵PID:1655
-
/usr/bin/mkdirmkdir -p /usr/bin/dpkgd5⤵
- Reads runtime system information
PID:1656
-
-
-
/bin/shsh -c "cp -f /bin/lsof /usr/bin/dpkgd/lsof"4⤵PID:1657
-
/usr/bin/cpcp -f /bin/lsof /usr/bin/dpkgd/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1658
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1659
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1660
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/lsof"4⤵PID:1661
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /bin/lsof5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1662
-
-
-
/bin/shsh -c "chmod 0755 /bin/lsof"4⤵PID:1663
-
/usr/bin/chmodchmod 0755 /bin/lsof5⤵PID:1664
-
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"4⤵PID:1665
-
/usr/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1666
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1669
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1670
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ps"4⤵PID:1671
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ps5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1672
-
-
-
/bin/shsh -c "chmod 0755 /bin/ps"4⤵PID:1673
-
/usr/bin/chmodchmod 0755 /bin/ps5⤵PID:1674
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1675
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1676
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/lsof"4⤵PID:1677
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1678
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"4⤵PID:1679
-
/usr/bin/chmodchmod 0755 /usr/bin/lsof5⤵PID:1680
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1681
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1682
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/ps"4⤵PID:1683
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1684
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/ps"4⤵PID:1685
-
/usr/bin/chmodchmod 0755 /usr/bin/ps5⤵PID:1686
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"4⤵PID:1687
-
/usr/sbin/insmodinsmod /usr/lib/xpacket.ko5⤵
- Reads runtime system information
PID:1688
-
-
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"2⤵PID:1627
-
/usr/bin/mkdirmkdir -p /usr/bin3⤵
- Reads runtime system information
PID:1628
-
-
-
/bin/shsh -c "cp -f /tmp/77e67ae01d141d95eae25515ffa3f6eb_JaffaCakes118 /usr/bin/.sshd"2⤵PID:1629
-
/usr/bin/cpcp -f /tmp/77e67ae01d141d95eae25515ffa3f6eb_JaffaCakes118 /usr/bin/.sshd3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1630
-
-
-
/bin/shsh -c /usr/bin/.sshd2⤵PID:1632
-
/usr/bin/.sshd/usr/bin/.sshd3⤵
- Executes dropped EXE
- Reads runtime system information
- Writes file to tmp directory
PID:1633
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"2⤵PID:1635
-
/usr/sbin/insmodinsmod /usr/lib/xpacket.ko3⤵
- Reads runtime system information
PID:1636
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD50151ad13831c4b984333b394e31ee14e
SHA1db6bee5ed9d5f9aee69dba4c7590d68274572486
SHA256a8cfd55abcf517aeb8e02ded31e5252ce3889c915e5c7baf6fe5b349f8f4dc33
SHA512a77f8a2a90c9d5bbc073487fb700cd8c5ff64ea41feb85cbbbba6c69ae207d996094cf43683c0ee8c5b59d7f026cd52caedf42b368dfc947a4f20f148f63a1fc
-
Filesize
36B
MD5993cc15058142d96c3daf7852c3d5ee8
SHA10950b8b391b04dd3895ea33cd3141543ebd2525d
SHA2568171d077918611803d93088409f220c66fae1c670b297e1aa5d8cbd548ce9208
SHA5120c4256c00a3710f97e92581b552682b36b62afc35fe72622c491323c618c19ea62611ac04ccafc3dfcde2254a2ebbd93b69b66795b16e36332293bed83adb928
-
Filesize
69B
MD5e084c3ab43cf461f393e03eae961e866
SHA1c55f0429e636ae475c96ba9a1b6f49cd8ac4970f
SHA2563bea0ab298e1a9b7be6e333724fd7c49319864d665841d4b2d9c296fbf0f524f
SHA5127bccfcffb8fc65a419b3c2e0332a2bf7745a0c4244b733b407b2373676e75cf5f5ada4593e6996d10d1fc96156ad919af51f8a1408bdaee4167d37478fc2a465
-
Filesize
4B
MD59c19a2aa1d84e04b0bd4bc888792bd1e
SHA1037880d210451b590c3a5229ea350645724e7e15
SHA256191024c47d6c2b3c24a570326b7e29f09652ec8bc2bb1779d95783e8753d12db
SHA512fbc7830e289b19696b7b6e01ae6d7e5403d144d417e380e47c29ea17db59c765ae7aa4a47cf885b6af0df831a8c98d5f99a40c35d121854ba273dd4afab24f93
-
Filesize
4B
MD56dd4e10e3296fa63738371ec0d5df818
SHA185755d7d0254a5e590031354dc5984ffeff70d4d
SHA256ca05bc2bf73745fee2f3d493297d4f90930477b484d2c08d7dc899d9a574de89
SHA512ceb236b8a132ee3fdd99086a8c614af028f94114bd93e623131b93a5b8439a151f3984a230622d8c9d3a1ca1f6ed6d37f78e9dcd71839dda7bad510c1428d661
-
Filesize
51B
MD536280ca74df4573c09d13ee6140214f2
SHA1f2909c47138faf7cabf358a66db879847ad69977
SHA2564f8bdb54bbe98ac6d9b6e6204ad5188704a73ce25d5b87b42aae8904011137a4
SHA51223ec95d685f07d0e1bf7c55b57336b532e57060711bba448f8c2aa9e9a418484c8b4c415a6681a66b75bbc740c008ec0a447c5d76a1d4d769435991639ed5ffa
-
Filesize
1.5MB
MD577e67ae01d141d95eae25515ffa3f6eb
SHA15d369c6bfc84aaffd9f7596c53464a3b1e9e7a50
SHA256c6671cc274dd02cbd1fe40f56e6ce819634a47ede993e98ad346b3e576f9ee9a
SHA5125c65d540b8a19d6daf9a4a4faf051d2d4c1253bd8bc09e80118cd8bcca520e13b36077d848800a738596d13730955727bc6f46ae2bf19a467e7af8d2fcecc306
-
Filesize
163KB
MD5ab57b66cc531ae0f996963223e632b60
SHA1bf7e5becd33f21c2539f5a75ffa0ab61c49c8795
SHA2562484863a7bfda7f97b90bfd5dfceed4ec9f27dd51f9c5158c8daabbf4309b1df
SHA512908acef13f3c1d80b7169ec3b16bb67006013453348fff75550bc3c6c2137e798b21d7990edbd5be63d756d9c41b06160aebf38aa80547e4bafa3a62596057f6
-
Filesize
138KB
MD58146139c2ad7e550b1d1f49480997446
SHA1074db8890c3227bd8a588417f5b9bde637bcf3af
SHA256207df9d438f75185ab3af2ab1173d104831a6631c28ef40d38b2ab43de27b40f
SHA512b6d71d537f593b9af833e6f798e412e95fc486a313414ed8cca9639f61be7ac9dca700e9f861c0d07c7f65b3783127a67f829f422472cad8938ba01d397ab9de