Analysis
-
max time kernel
149s -
max time network
149s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240729-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
31-07-2024 21:23
Behavioral task
behavioral1
Sample
7dfe22bbbd83b690a3b10baefa56b41f_JaffaCakes118
Resource
ubuntu2004-amd64-20240729-en
General
-
Target
7dfe22bbbd83b690a3b10baefa56b41f_JaffaCakes118
-
Size
1.2MB
-
MD5
7dfe22bbbd83b690a3b10baefa56b41f
-
SHA1
5d303e714dda278e7cbcccb7c6df422b999ee21f
-
SHA256
2f2d6fa9a6156e0503969e89ca530b7537b4a8e6e49638f1b5afac4ed2731f90
-
SHA512
defe616669f26bf4dd1bc84ad57821f776c732499291a9b461abd9be0217abfd20f99ad3aa46daddc1d7228e1187c39f7a2c67f85b956280e48612b5a5144726
-
SSDEEP
24576:e845rGHu6gVJKG75oFpA0VWIX4s2y1q2rJp0:745vRVJKGtSA0VWIoDu9p0
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
resource yara_rule behavioral1/files/fstream-4.dat family_mrblack -
Executes dropped EXE 2 IoCs
ioc pid Process /usr/bin/bsd-port/getty 1437 getty /usr/bin/.sshd 1461 .sshd -
description ioc Process File opened for modification /etc/init.d/DbSecuritySpt 7dfe22bbbd83b690a3b10baefa56b41f_JaffaCakes118 File opened for modification /etc/init.d/selinux getty -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route 7dfe22bbbd83b690a3b10baefa56b41f_JaffaCakes118 -
Write file to user bin folder 1 TTPs 11 IoCs
description ioc Process File opened for modification /usr/bin/bsd-port/getty.lock getty File opened for modification /usr/bin/dpkgd/ss cp File opened for modification /usr/bin/ps cp File opened for modification /usr/bin/dpkgd/lsof cp File opened for modification /usr/bin/dpkgd/ps cp File opened for modification /usr/bin/lsof cp File opened for modification /usr/bin/ss cp File opened for modification /usr/bin/bsd-port/getty.lock 7dfe22bbbd83b690a3b10baefa56b41f_JaffaCakes118 File opened for modification /usr/bin/bsd-port/udevd.lock 7dfe22bbbd83b690a3b10baefa56b41f_JaffaCakes118 File opened for modification /usr/bin/bsd-port/getty cp File opened for modification /usr/bin/.sshd cp -
Writes file to system bin folder 1 TTPs 3 IoCs
description ioc Process File opened for modification /bin/lsof cp File opened for modification /bin/ps cp File opened for modification /bin/ss cp -
Checks CPU configuration 1 TTPs 2 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo getty File opened for reading /proc/cpuinfo 7dfe22bbbd83b690a3b10baefa56b41f_JaffaCakes118 -
Reads system network configuration 1 TTPs 4 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/dev getty File opened for reading /proc/net/dev 7dfe22bbbd83b690a3b10baefa56b41f_JaffaCakes118 File opened for reading /proc/net/route 7dfe22bbbd83b690a3b10baefa56b41f_JaffaCakes118 File opened for reading /proc/net/arp 7dfe22bbbd83b690a3b10baefa56b41f_JaffaCakes118 -
Reads runtime system information 37 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/stat 7dfe22bbbd83b690a3b10baefa56b41f_JaffaCakes118 File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/stat getty File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/meminfo 7dfe22bbbd83b690a3b10baefa56b41f_JaffaCakes118 File opened for reading /proc/sys/kernel/version getty File opened for reading /proc/filesystems mkdir File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/meminfo getty File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/cmdline insmod File opened for reading /proc/sys/kernel/version .sshd File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/sys/kernel/version 7dfe22bbbd83b690a3b10baefa56b41f_JaffaCakes118 File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp -
Writes file to tmp directory 8 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/gates.lod 7dfe22bbbd83b690a3b10baefa56b41f_JaffaCakes118 File opened for modification /tmp/notify.file 7dfe22bbbd83b690a3b10baefa56b41f_JaffaCakes118 File opened for modification /tmp/moni.lod .sshd File opened for modification /tmp/notify.file .sshd File opened for modification /tmp/conf.n 7dfe22bbbd83b690a3b10baefa56b41f_JaffaCakes118 File opened for modification /tmp/gates.lod .sshd File opened for modification /tmp/moni.lod 7dfe22bbbd83b690a3b10baefa56b41f_JaffaCakes118 File opened for modification /tmp/bill.lock 7dfe22bbbd83b690a3b10baefa56b41f_JaffaCakes118
Processes
-
/tmp/7dfe22bbbd83b690a3b10baefa56b41f_JaffaCakes118/tmp/7dfe22bbbd83b690a3b10baefa56b41f_JaffaCakes1181⤵
- Modifies init.d
- Reads system routing table
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
- Writes file to tmp directory
PID:1378 -
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt"2⤵PID:1419
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt3⤵PID:1420
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt"2⤵PID:1421
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt3⤵PID:1422
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt"2⤵PID:1423
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt3⤵PID:1424
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt"2⤵PID:1425
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt3⤵PID:1426
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt"2⤵PID:1427
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt3⤵PID:1428
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"2⤵PID:1429
-
/usr/bin/mkdirmkdir -p /usr/bin/bsd-port3⤵
- Reads runtime system information
PID:1430
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"2⤵PID:1431
-
/usr/bin/mkdirmkdir -p /usr/bin/bsd-port3⤵
- Reads runtime system information
PID:1432
-
-
-
/bin/shsh -c "cp -f /tmp/7dfe22bbbd83b690a3b10baefa56b41f_JaffaCakes118 /usr/bin/bsd-port/getty"2⤵PID:1433
-
/usr/bin/cpcp -f /tmp/7dfe22bbbd83b690a3b10baefa56b41f_JaffaCakes118 /usr/bin/bsd-port/getty3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1434
-
-
-
/bin/shsh -c /usr/bin/bsd-port/getty2⤵PID:1436
-
/usr/bin/bsd-port/getty/usr/bin/bsd-port/getty3⤵
- Executes dropped EXE
- Modifies init.d
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
PID:1437 -
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"4⤵PID:1445
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux5⤵PID:1446
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"4⤵PID:1447
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux5⤵PID:1448
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"4⤵PID:1449
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux5⤵PID:1450
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"4⤵PID:1451
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux5⤵PID:1452
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"4⤵PID:1453
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux5⤵PID:1454
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"4⤵PID:1455
-
/usr/bin/mkdirmkdir -p /usr/bin/dpkgd5⤵
- Reads runtime system information
PID:1456
-
-
-
/bin/shsh -c "cp -f /bin/lsof /usr/bin/dpkgd/lsof"4⤵PID:1457
-
/usr/bin/cpcp -f /bin/lsof /usr/bin/dpkgd/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1458
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1462
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1463
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1464
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1465
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/lsof"4⤵PID:1466
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /bin/lsof5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1467
-
-
-
/bin/shsh -c "chmod 0755 /bin/lsof"4⤵PID:1468
-
/usr/bin/chmodchmod 0755 /bin/lsof5⤵PID:1469
-
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"4⤵PID:1470
-
/usr/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1471
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1472
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1473
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1474
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1475
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ps"4⤵PID:1476
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ps5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1477
-
-
-
/bin/shsh -c "chmod 0755 /bin/ps"4⤵PID:1478
-
/usr/bin/chmodchmod 0755 /bin/ps5⤵PID:1479
-
-
-
/bin/shsh -c "cp -f /bin/ss /usr/bin/dpkgd/ss"4⤵PID:1480
-
/usr/bin/cpcp -f /bin/ss /usr/bin/dpkgd/ss5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1481
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1482
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1483
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1484
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1485
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ss"4⤵PID:1486
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ss5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1487
-
-
-
/bin/shsh -c "chmod 0755 /bin/ss"4⤵PID:1488
-
/usr/bin/chmodchmod 0755 /bin/ss5⤵PID:1489
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1490
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1491
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1492
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1493
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/lsof"4⤵PID:1494
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1495
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"4⤵PID:1496
-
/usr/bin/chmodchmod 0755 /usr/bin/lsof5⤵PID:1497
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1498
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1499
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1500
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1501
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/ps"4⤵PID:1502
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1503
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/ps"4⤵PID:1504
-
/usr/bin/chmodchmod 0755 /usr/bin/ps5⤵PID:1505
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1506
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1507
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1508
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1509
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/ss"4⤵PID:1510
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/ss5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1511
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/ss"4⤵PID:1512
-
/usr/bin/chmodchmod 0755 /usr/bin/ss5⤵PID:1513
-
-
-
/bin/shsh -c "insmod /usr/bin/bsd-port/xpacket.ko"4⤵PID:1516
-
/usr/sbin/insmodinsmod /usr/bin/bsd-port/xpacket.ko5⤵
- Reads runtime system information
PID:1517
-
-
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"2⤵PID:1439
-
/usr/bin/mkdirmkdir -p /usr/bin3⤵
- Reads runtime system information
PID:1440
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"2⤵PID:1441
-
/usr/bin/mkdirmkdir -p /usr/bin3⤵
- Reads runtime system information
PID:1442
-
-
-
/bin/shsh -c "cp -f /tmp/7dfe22bbbd83b690a3b10baefa56b41f_JaffaCakes118 /usr/bin/.sshd"2⤵PID:1443
-
/usr/bin/cpcp -f /tmp/7dfe22bbbd83b690a3b10baefa56b41f_JaffaCakes118 /usr/bin/.sshd3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1444
-
-
-
/bin/shsh -c /usr/bin/.sshd2⤵PID:1460
-
/usr/bin/.sshd/usr/bin/.sshd3⤵
- Executes dropped EXE
- Reads runtime system information
- Writes file to tmp directory
PID:1461
-
-
-
/bin/shsh -c "insmod /tmp/xpacket.ko"2⤵PID:1524
-
/usr/sbin/insmodinsmod /tmp/xpacket.ko3⤵
- Reads runtime system information
PID:1525
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD570d289103f450a5e8d058d4c6884902a
SHA168a0f2b4bf403179ee3b5e79e363b0aa3e9f8096
SHA256ce9b138fe78e6d1d666afbb3de87c5d3d67315c42281d1bd2546441ac4316381
SHA51225c20eb44484e3feeb189b287b280abb831a634300a0a905b4ce15d1c21b36c00b0029cd67a2bc91cd2b2acbc5503f020c4f7ac1fffa51fc247d0997c6d80ac3
-
Filesize
36B
MD5993cc15058142d96c3daf7852c3d5ee8
SHA10950b8b391b04dd3895ea33cd3141543ebd2525d
SHA2568171d077918611803d93088409f220c66fae1c670b297e1aa5d8cbd548ce9208
SHA5120c4256c00a3710f97e92581b552682b36b62afc35fe72622c491323c618c19ea62611ac04ccafc3dfcde2254a2ebbd93b69b66795b16e36332293bed83adb928
-
Filesize
4B
MD5bad5f33780c42f2588878a9d07405083
SHA185fd66c7749e88c463dc95e6098772b2532ec065
SHA2568cfecd937a9328ecb71d3c08e5dd312058ca7d75171e7ba6e3af7573e210cd6c
SHA512be9cb34b70b5544d1f8552b18fcbef35279f8ddea0d593eb0fc033b3507d4128bde15799a0d0cce23fd2db5a86b883e3f0fc4ccf01502188172deb4f7af8d8e0
-
Filesize
4B
MD583f2550373f2f19492aa30fbd5b57512
SHA1db8dc2b7a3bb754178d96fe9b4e434d0c017825b
SHA256c8f5600f3eb7d801a067e02c477719d37f560491c4dca56eacc11ca755eb1ac6
SHA5125ba77e79b4b068b0cfaf1297e1da85a800f6e28e0009f2fee7fdcf08235b18652f034186bb3c006981826ccdefcc5bff85871dcd1236f519b16f5d6bb68332dc
-
Filesize
51B
MD5ecdb454ba39dd7f4774b526f170cd414
SHA11be65cf05e3533809037be6e2a5fb89397576a31
SHA25632764b72a96d9886bb33f542c488101c6c54f75cd4aac3521e9607faa816c909
SHA512668fb23f8a48d559911991d5d0fdcc110fc0e8705a73390d73eb0e4b5a8f08e33195dd1f6005edde9c201016fdee7356ade1434f09ec6ab41f380854a7c1285c
-
Filesize
1.2MB
MD57dfe22bbbd83b690a3b10baefa56b41f
SHA15d303e714dda278e7cbcccb7c6df422b999ee21f
SHA2562f2d6fa9a6156e0503969e89ca530b7537b4a8e6e49638f1b5afac4ed2731f90
SHA512defe616669f26bf4dd1bc84ad57821f776c732499291a9b461abd9be0217abfd20f99ad3aa46daddc1d7228e1187c39f7a2c67f85b956280e48612b5a5144726
-
Filesize
171KB
MD5061386937ec7acf924438a2643a32be0
SHA101a044b9e58839bea3e58c66cb32acc16241bf91
SHA2568a26bbae9eb85aa98ef29cfe5b0a291234db6eb394c3e0c2841983dcf7dda959
SHA5122de2e56ac4c32f47b4a1945ccfb0db378e6d59019ee8004e3e5d2ec8935efb5aa8ee14b8a0b21c61a267e195d42a3232a6dcade8720de06118fd579277f59db7
-
Filesize
134KB
MD5d194576b899af45b1d2a448612ec21e5
SHA1492f7d8f28cd4397ce22fcf0d8bf3304ea93465a
SHA256a8cf81f3a1137c999c3cf336507ce120b3065e633ade01db6280d427b7d986ca
SHA512b323babd9580b91772cde29c9f22ae75b27f5ce8ce0268a48ca41713c3545dd72409932a5c48f6af66ac6e43127eb5461d1f686bd667fa1b0e56a1564db3c539
-
Filesize
164KB
MD551d83131b398a97dd38555ba57084721
SHA17d392a87f7db787dfa85fbcdf2a5ba6f0b59b4ed
SHA256e429f9d16a4cd64593b94dee8309a427fe8ca57765bf0d2e7b822efd123fe768
SHA512adc7137df75410c2535986c1e86c2e92e58f9bee70094f72f1f7adf3db125720ce281eb3f48474b0e192d672e96cbb1bc6e1ef6b26b10bf76a412c4516948216