Analysis
-
max time kernel
149s -
max time network
149s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240508-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240508-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
21-08-2024 22:57
Behavioral task
behavioral1
Sample
b562aa301cf2bb74c5c2b83b9b1956ee_JaffaCakes118
Resource
ubuntu2004-amd64-20240508-en
General
-
Target
b562aa301cf2bb74c5c2b83b9b1956ee_JaffaCakes118
-
Size
1.5MB
-
MD5
b562aa301cf2bb74c5c2b83b9b1956ee
-
SHA1
801b06907cfcb19b97a9b65d9e486be80852e923
-
SHA256
055bd8cac1770e233c499f854522f74ce022cfce4174e4612c0e37b459a3aa04
-
SHA512
fbb76d0716f96e9913c016296f46a879fcb4c8876ec172b26f6f000b35f54cae8523b2da3764ae58b6db5d5e8e86a56404affd9c68978f443b08ead6be0fc2b0
-
SSDEEP
24576:GA46TrzJBisiOvhlOHdSbQmHyJgf/kgX0Exb2cyaGpIoiMDnnLmYXqSYKKZdTrnD:zRNi6OHdSbQoyJyXpxb2PaGpXiMDnLmB
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
resource yara_rule behavioral1/files/fstream-4.dat family_mrblack -
Executes dropped EXE 2 IoCs
ioc pid Process /usr/bin/bsd-port/agent 1459 agent /usr/bin/acpid 1467 acpid -
description ioc Process File opened for modification /etc/init.d/DbSecurityMdt b562aa301cf2bb74c5c2b83b9b1956ee_JaffaCakes118 File opened for modification /etc/init.d/selinux agent -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route agent -
Write file to user bin folder 1 TTPs 10 IoCs
description ioc Process File opened for modification /usr/bin/lsof cp File opened for modification /usr/bin/ps cp File opened for modification /usr/bin/bsd-port/conf.n agent File opened for modification /usr/bin/bsd-port/udevd.lock b562aa301cf2bb74c5c2b83b9b1956ee_JaffaCakes118 File opened for modification /usr/bin/dpkgd/lsof cp File opened for modification /usr/bin/acpid cp File opened for modification /usr/bin/bsd-port/agent.lock agent File opened for modification /usr/bin/dpkgd/ps cp File opened for modification /usr/bin/bsd-port/agent.lock b562aa301cf2bb74c5c2b83b9b1956ee_JaffaCakes118 File opened for modification /usr/bin/bsd-port/agent cp -
Writes file to system bin folder 1 TTPs 2 IoCs
description ioc Process File opened for modification /bin/lsof cp File opened for modification /bin/ps cp -
Checks CPU configuration 1 TTPs 2 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo b562aa301cf2bb74c5c2b83b9b1956ee_JaffaCakes118 File opened for reading /proc/cpuinfo agent -
Reads system network configuration 1 TTPs 4 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/dev b562aa301cf2bb74c5c2b83b9b1956ee_JaffaCakes118 File opened for reading /proc/net/dev agent File opened for reading /proc/net/route agent File opened for reading /proc/net/arp agent -
Reads runtime system information 24 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/sys/kernel/version b562aa301cf2bb74c5c2b83b9b1956ee_JaffaCakes118 File opened for reading /proc/filesystems cp File opened for reading /proc/sys/kernel/version acpid File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/sys/kernel/version agent File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/cmdline insmod File opened for reading /proc/meminfo agent File opened for reading /proc/filesystems mkdir File opened for reading /proc/stat b562aa301cf2bb74c5c2b83b9b1956ee_JaffaCakes118 File opened for reading /proc/meminfo b562aa301cf2bb74c5c2b83b9b1956ee_JaffaCakes118 File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/stat agent File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir -
Writes file to tmp directory 7 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/moni.note acpid File opened for modification /tmp/notify.file acpid File opened for modification /tmp/gates.note acpid File opened for modification /tmp/moni.note b562aa301cf2bb74c5c2b83b9b1956ee_JaffaCakes118 File opened for modification /tmp/bill.note b562aa301cf2bb74c5c2b83b9b1956ee_JaffaCakes118 File opened for modification /tmp/gates.note b562aa301cf2bb74c5c2b83b9b1956ee_JaffaCakes118 File opened for modification /tmp/notify.file b562aa301cf2bb74c5c2b83b9b1956ee_JaffaCakes118
Processes
-
/tmp/b562aa301cf2bb74c5c2b83b9b1956ee_JaffaCakes118/tmp/b562aa301cf2bb74c5c2b83b9b1956ee_JaffaCakes1181⤵
- Modifies init.d
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
- Writes file to tmp directory
PID:1402 -
/bin/shsh -c "ln -s /etc/init.d/DbSecurityMdt /etc/rc1.d/S97DbSecurityMdt"2⤵PID:1443
-
/usr/bin/lnln -s /etc/init.d/DbSecurityMdt /etc/rc1.d/S97DbSecurityMdt3⤵PID:1444
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecurityMdt /etc/rc2.d/S97DbSecurityMdt"2⤵PID:1445
-
/usr/bin/lnln -s /etc/init.d/DbSecurityMdt /etc/rc2.d/S97DbSecurityMdt3⤵PID:1446
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecurityMdt /etc/rc3.d/S97DbSecurityMdt"2⤵PID:1447
-
/usr/bin/lnln -s /etc/init.d/DbSecurityMdt /etc/rc3.d/S97DbSecurityMdt3⤵PID:1448
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecurityMdt /etc/rc4.d/S97DbSecurityMdt"2⤵PID:1449
-
/usr/bin/lnln -s /etc/init.d/DbSecurityMdt /etc/rc4.d/S97DbSecurityMdt3⤵PID:1450
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecurityMdt /etc/rc5.d/S97DbSecurityMdt"2⤵PID:1451
-
/usr/bin/lnln -s /etc/init.d/DbSecurityMdt /etc/rc5.d/S97DbSecurityMdt3⤵PID:1452
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"2⤵PID:1453
-
/usr/bin/mkdirmkdir -p /usr/bin/bsd-port3⤵
- Reads runtime system information
PID:1454
-
-
-
/bin/shsh -c "cp -f /tmp/b562aa301cf2bb74c5c2b83b9b1956ee_JaffaCakes118 /usr/bin/bsd-port/agent"2⤵PID:1455
-
/usr/bin/cpcp -f /tmp/b562aa301cf2bb74c5c2b83b9b1956ee_JaffaCakes118 /usr/bin/bsd-port/agent3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1456
-
-
-
/bin/shsh -c /usr/bin/bsd-port/agent2⤵PID:1458
-
/usr/bin/bsd-port/agent/usr/bin/bsd-port/agent3⤵
- Executes dropped EXE
- Modifies init.d
- Reads system routing table
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
PID:1459 -
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"4⤵PID:1480
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux5⤵PID:1481
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"4⤵PID:1482
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux5⤵PID:1483
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"4⤵PID:1484
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux5⤵PID:1485
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"4⤵PID:1486
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux5⤵PID:1487
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"4⤵PID:1488
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux5⤵PID:1489
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"4⤵PID:1490
-
/usr/bin/mkdirmkdir -p /usr/bin/dpkgd5⤵
- Reads runtime system information
PID:1491
-
-
-
/bin/shsh -c "cp -f /bin/lsof /usr/bin/dpkgd/lsof"4⤵PID:1492
-
/usr/bin/cpcp -f /bin/lsof /usr/bin/dpkgd/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1493
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1494
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1495
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/agent /bin/lsof"4⤵PID:1496
-
/usr/bin/cpcp -f /usr/bin/bsd-port/agent /bin/lsof5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1497
-
-
-
/bin/shsh -c "chmod 0755 /bin/lsof"4⤵PID:1498
-
/usr/bin/chmodchmod 0755 /bin/lsof5⤵PID:1499
-
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"4⤵PID:1500
-
/usr/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1501
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1502
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1503
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/agent /bin/ps"4⤵PID:1504
-
/usr/bin/cpcp -f /usr/bin/bsd-port/agent /bin/ps5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1505
-
-
-
/bin/shsh -c "chmod 0755 /bin/ps"4⤵PID:1506
-
/usr/bin/chmodchmod 0755 /bin/ps5⤵PID:1507
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1508
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1511
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/agent /usr/bin/lsof"4⤵PID:1512
-
/usr/bin/cpcp -f /usr/bin/bsd-port/agent /usr/bin/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1513
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"4⤵PID:1514
-
/usr/bin/chmodchmod 0755 /usr/bin/lsof5⤵PID:1515
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1516
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1517
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/agent /usr/bin/ps"4⤵PID:1518
-
/usr/bin/cpcp -f /usr/bin/bsd-port/agent /usr/bin/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1519
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/ps"4⤵PID:1520
-
/usr/bin/chmodchmod 0755 /usr/bin/ps5⤵PID:1521
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"4⤵PID:1522
-
/usr/sbin/insmodinsmod /usr/lib/xpacket.ko5⤵
- Reads runtime system information
PID:1523
-
-
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"2⤵PID:1461
-
/usr/bin/mkdirmkdir -p /usr/bin3⤵
- Reads runtime system information
PID:1462
-
-
-
/bin/shsh -c "cp -f /tmp/b562aa301cf2bb74c5c2b83b9b1956ee_JaffaCakes118 /usr/bin/acpid"2⤵PID:1463
-
/usr/bin/cpcp -f /tmp/b562aa301cf2bb74c5c2b83b9b1956ee_JaffaCakes118 /usr/bin/acpid3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1464
-
-
-
/bin/shsh -c /usr/bin/acpid2⤵PID:1466
-
/usr/bin/acpid/usr/bin/acpid3⤵
- Executes dropped EXE
- Reads runtime system information
- Writes file to tmp directory
PID:1467
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"2⤵PID:1470
-
/usr/sbin/insmodinsmod /usr/lib/xpacket.ko3⤵
- Reads runtime system information
PID:1471
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD56ddec55f7c0167d95133936909e0005a
SHA1d3feac2d8255b9ceb93aed78b70d0805eb09908f
SHA256733d0db723bef8e46a99661042678b5de84e983715bda5e626726c104332cf89
SHA512da800203bc5d7760ae15602a18db30162139f259bd002c5a3492663244ecdac559b60e3a1227732dd80b75ee1a2a65eec5569b528ae9e5d55ddfa54cd2e21009
-
Filesize
36B
MD5c6a80f08539a4c3176762f514976dd24
SHA1bbc5826b01d20f5c4d315ff5dbc3f216760c64ef
SHA256ea47e885ae227059ce55d020335f7869c565ec6d85f484497e83cd4998149d5d
SHA5129a1e3b0142876305fe389e07880bd586e97bf709273a66299d9128ff2861459104054d4e5d836aecdf73f2c11886fa3a2a8498741adb3211b96116658b856175
-
Filesize
4B
MD54edaa105d5f53590338791951e38c3ad
SHA184cbb8cb3aaa7a5a5f98ab30b5b0c948cca74f93
SHA256e8026bda3ea2eedc7dc7bce9daa640f8cc0f33e335bd73d986a872b3ba789c71
SHA5124ba97143cecd7c930f04399ee510c97ecb6db989aea923bac4d98deffe8310ed21f8928adc3438fe31206e6a0880ee3fccc9121d1fe8bb500c6bd874b37a7c41
-
Filesize
4B
MD5cec6f62cfb44b1be110b7bf70c8362d8
SHA1742f0a1ef06d6bdc8c856b05b3ad8839e2a27ba7
SHA2566b6803d3f23f64d048b7d5e5d1b828c90aac1b68bec5c590100122902a400876
SHA51275b3a6744aacae46a8de3b5b609d21cd143e701f3c73ea257d121e8cb54d27a0d3d2ed17d25cc8329a5e2b8913a298747c40f555b0af3b32ebe3dc6d22099ab8
-
Filesize
51B
MD50e2a64de8ce9649624d1bba4d5bb9917
SHA14c0c90288903be314deb87b741dba8f1c75723a4
SHA2560f5f0d029d8c9214ae21ada02119cb657f7270ee2158381aa573cb2514376b29
SHA512da409b3b80ca20b8fc99e190197727df54d8133128f525c20121feb77f3646c73e648e93dd895d971ece3a106bcf54da0efadc071077bd530862e952801cb84d
-
Filesize
1.5MB
MD5b562aa301cf2bb74c5c2b83b9b1956ee
SHA1801b06907cfcb19b97a9b65d9e486be80852e923
SHA256055bd8cac1770e233c499f854522f74ce022cfce4174e4612c0e37b459a3aa04
SHA512fbb76d0716f96e9913c016296f46a879fcb4c8876ec172b26f6f000b35f54cae8523b2da3764ae58b6db5d5e8e86a56404affd9c68978f443b08ead6be0fc2b0
-
Filesize
69B
MD5dea2a624df55625c4e81ba70dda5cea8
SHA1e2203fd75ace086371402bb6a8eaa22e0748c5f1
SHA256975fcc5b0d1d9ec1fa6d47b1a606ff9cbd4b76600828ee1d2e80eeafa221df68
SHA5128b147335a63b31851396fd5e9792808fe2d36ef0bd3ced3f3a362bf0109e8d105a6b275014d7253764c6a402fa64f29d59914accda471566332707ed4913b509
-
Filesize
171KB
MD5061386937ec7acf924438a2643a32be0
SHA101a044b9e58839bea3e58c66cb32acc16241bf91
SHA2568a26bbae9eb85aa98ef29cfe5b0a291234db6eb394c3e0c2841983dcf7dda959
SHA5122de2e56ac4c32f47b4a1945ccfb0db378e6d59019ee8004e3e5d2ec8935efb5aa8ee14b8a0b21c61a267e195d42a3232a6dcade8720de06118fd579277f59db7
-
Filesize
134KB
MD5d194576b899af45b1d2a448612ec21e5
SHA1492f7d8f28cd4397ce22fcf0d8bf3304ea93465a
SHA256a8cf81f3a1137c999c3cf336507ce120b3065e633ade01db6280d427b7d986ca
SHA512b323babd9580b91772cde29c9f22ae75b27f5ce8ce0268a48ca41713c3545dd72409932a5c48f6af66ac6e43127eb5461d1f686bd667fa1b0e56a1564db3c539