Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240221-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    15-08-2024 20:00

General

  • Target

    9b6c3518a91d23ed77504b5416bfb5b3_JaffaCakes118

  • Size

    78KB

  • MD5

    9b6c3518a91d23ed77504b5416bfb5b3

  • SHA1

    0a2d170abbf5031566377b01431e3b82d342630a

  • SHA256

    a04ac6d98ad989312783d4fe3456c53730b212c79a426fb215708b6c6daa3de3

  • SHA512

    b2b08d5d5e6c6708d88b793e9340a780d47b5dce61e0a3026b4cdea8a9e4cbf9824037255e4ea4a40fee5bce956485232376d4677ce72ccb6c7f00badd09956e

  • SSDEEP

    1536:87vbq1lGAXSEYQjbChaAU2yU23M51DjZgSQAvcYkFtZTjzBht5:8D+CAXFYQChaAUk5ljnQssL

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Changes its process name 1 IoCs
  • Reads system network configuration 1 TTPs 3 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/9b6c3518a91d23ed77504b5416bfb5b3_JaffaCakes118
    /tmp/9b6c3518a91d23ed77504b5416bfb5b3_JaffaCakes118
    1⤵
    • Modifies Watchdog functionality
    • Enumerates active TCP sockets
    • Reads system routing table
    • Reads system network configuration
    • Reads runtime system information
    • Writes file to tmp directory
    PID:704
    • /bin/sh
      /bin/sh -c "iptables -A INPUT -p tcp --destination-port 23 -j DROP"
      2⤵
        PID:758
      • /bin/sh
        /bin/sh -c "iptables -A INPUT -p tcp --destination-port 7547 -j DROP"
        2⤵
          PID:759
        • /bin/sh
          /bin/sh -c "iptables -A INPUT -p tcp --destination-port 5555 -j DROP"
          2⤵
            PID:760
          • /bin/sh
            /bin/sh -c "iptables -A INPUT -p tcp --destination-port 5358 -j DROP"
            2⤵
              PID:761
            • /bin/sh
              /bin/sh -c "iptables -D INPUT -j CWMP_CR"
              2⤵
                PID:762
              • /bin/sh
                /bin/sh -c "iptables -X CWMP_CR"
                2⤵
                  PID:763
                • /bin/sh
                  /bin/sh -c "iptables -I INPUT -p udp --dport 51313 -j ACCEPT"
                  2⤵
                    PID:764

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/704-1-0x00010000-0x000506fc-memory.dmp