General

  • Target

    bdb509a17afef43c00c7cef1b3f6a118_JaffaCakes118

  • Size

    300KB

  • Sample

    240824-bfbkzaxdjf

  • MD5

    bdb509a17afef43c00c7cef1b3f6a118

  • SHA1

    6c63725b7d526734d92a8d39a67d32cc3ef23a7a

  • SHA256

    981ccd2b9c75ec00365f44f70263fb9e6df4e035a426e8d355d31077bf66d08a

  • SHA512

    f4d0cabae53f3ddd866dab37f842bad28617fa7fe0066989ff917547b7812df3b0a5ff10ae7cc36a8b29a7f4fa6a64b9882479b5aabcfde499ca96f9e34419cb

  • SSDEEP

    3072:/TNVO/QJHZcfFj4rwLQGTNO5VZLwHm7vuQTpZUyY6co:7O/QJHZweEL/NOjCHm7FZZnc

Malware Config

Targets

    • Target

      bdb509a17afef43c00c7cef1b3f6a118_JaffaCakes118

    • Size

      300KB

    • MD5

      bdb509a17afef43c00c7cef1b3f6a118

    • SHA1

      6c63725b7d526734d92a8d39a67d32cc3ef23a7a

    • SHA256

      981ccd2b9c75ec00365f44f70263fb9e6df4e035a426e8d355d31077bf66d08a

    • SHA512

      f4d0cabae53f3ddd866dab37f842bad28617fa7fe0066989ff917547b7812df3b0a5ff10ae7cc36a8b29a7f4fa6a64b9882479b5aabcfde499ca96f9e34419cb

    • SSDEEP

      3072:/TNVO/QJHZcfFj4rwLQGTNO5VZLwHm7vuQTpZUyY6co:7O/QJHZweEL/NOjCHm7FZZnc

    • Contacts a large (24700) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Patched UPX-packed file

      Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks