Analysis
-
max time kernel
149s -
max time network
150s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240611-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
24-08-2024 12:45
Behavioral task
behavioral1
Sample
be9e6e33ce58d7572b0a089a9be20dd0_JaffaCakes118
Resource
ubuntu2204-amd64-20240611-en
General
-
Target
be9e6e33ce58d7572b0a089a9be20dd0_JaffaCakes118
-
Size
1.1MB
-
MD5
be9e6e33ce58d7572b0a089a9be20dd0
-
SHA1
5f3788156d48b1e1865a471a9a34019aa63f1a1b
-
SHA256
1ea1b4edcc7e1ba2ba0e549ff3fcdd35efabd69f4e671b905a7d38ec97a7d9d9
-
SHA512
8b20ab73a1aa5ad3c1cf09af600e538cfb519a509c599ea76a6b07189d04e679112e2c273ed2e8ae1de677af614c74b4332ab973542e0c6bb8d5b5968aa97b07
-
SSDEEP
24576:4vRE7caCfKGPqVEDNLFxKsfa4I+gIGYuuCol7r:4vREKfPqVE5jKsfa4RHGVo7r
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
resource yara_rule behavioral1/files/fstream-4.dat family_mrblack -
Executes dropped EXE 2 IoCs
ioc pid Process /usr/bin/bsd-port/getty 1591 getty /etc/ssh/bashpa 1599 bashpa -
description ioc Process File opened for modification /etc/init.d/DbSecuritySpt be9e6e33ce58d7572b0a089a9be20dd0_JaffaCakes118 File opened for modification /etc/init.d/selinux getty -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route be9e6e33ce58d7572b0a089a9be20dd0_JaffaCakes118 -
Write file to user bin folder 1 TTPs 8 IoCs
description ioc Process File opened for modification /usr/bin/dpkgd/ps cp File opened for modification /usr/bin/lsof cp File opened for modification /usr/bin/ps cp File opened for modification /usr/bin/bsd-port/getty.lock be9e6e33ce58d7572b0a089a9be20dd0_JaffaCakes118 File opened for modification /usr/bin/bsd-port/udevd.lock be9e6e33ce58d7572b0a089a9be20dd0_JaffaCakes118 File opened for modification /usr/bin/bsd-port/getty cp File opened for modification /usr/bin/bsd-port/getty.lock getty File opened for modification /usr/bin/dpkgd/lsof cp -
Writes file to system bin folder 1 TTPs 2 IoCs
description ioc Process File opened for modification /bin/lsof cp File opened for modification /bin/ps cp -
Checks CPU configuration 1 TTPs 2 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo be9e6e33ce58d7572b0a089a9be20dd0_JaffaCakes118 File opened for reading /proc/cpuinfo getty -
Reads system network configuration 1 TTPs 4 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/dev be9e6e33ce58d7572b0a089a9be20dd0_JaffaCakes118 File opened for reading /proc/net/route be9e6e33ce58d7572b0a089a9be20dd0_JaffaCakes118 File opened for reading /proc/net/arp be9e6e33ce58d7572b0a089a9be20dd0_JaffaCakes118 File opened for reading /proc/net/dev getty -
Reads runtime system information 24 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/sys/kernel/version getty File opened for reading /proc/sys/kernel/version bashpa File opened for reading /proc/stat be9e6e33ce58d7572b0a089a9be20dd0_JaffaCakes118 File opened for reading /proc/filesystems mkdir File opened for reading /proc/cmdline insmod File opened for reading /proc/sys/kernel/version be9e6e33ce58d7572b0a089a9be20dd0_JaffaCakes118 File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/stat getty File opened for reading /proc/filesystems mkdir File opened for reading /proc/meminfo getty File opened for reading /proc/filesystems cp File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/meminfo be9e6e33ce58d7572b0a089a9be20dd0_JaffaCakes118 File opened for reading /proc/filesystems cp -
Writes file to tmp directory 8 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/moni.lock bashpa File opened for modification /tmp/notify.file bashpa File opened for modification /tmp/gates.lock bashpa File opened for modification /tmp/moni.lock be9e6e33ce58d7572b0a089a9be20dd0_JaffaCakes118 File opened for modification /tmp/bill.lock be9e6e33ce58d7572b0a089a9be20dd0_JaffaCakes118 File opened for modification /tmp/gates.lock be9e6e33ce58d7572b0a089a9be20dd0_JaffaCakes118 File opened for modification /tmp/notify.file be9e6e33ce58d7572b0a089a9be20dd0_JaffaCakes118 File opened for modification /tmp/conf.n be9e6e33ce58d7572b0a089a9be20dd0_JaffaCakes118
Processes
-
/tmp/be9e6e33ce58d7572b0a089a9be20dd0_JaffaCakes118/tmp/be9e6e33ce58d7572b0a089a9be20dd0_JaffaCakes1181⤵
- Modifies init.d
- Reads system routing table
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
- Writes file to tmp directory
PID:1554 -
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt"2⤵PID:1575
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt3⤵PID:1576
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt"2⤵PID:1577
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt3⤵PID:1578
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt"2⤵PID:1579
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt3⤵PID:1580
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt"2⤵PID:1581
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt3⤵PID:1582
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt"2⤵PID:1583
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt3⤵PID:1584
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"2⤵PID:1585
-
/usr/bin/mkdirmkdir -p /usr/bin/bsd-port3⤵
- Reads runtime system information
PID:1586
-
-
-
/bin/shsh -c "cp -f /tmp/be9e6e33ce58d7572b0a089a9be20dd0_JaffaCakes118 /usr/bin/bsd-port/getty"2⤵PID:1587
-
/usr/bin/cpcp -f /tmp/be9e6e33ce58d7572b0a089a9be20dd0_JaffaCakes118 /usr/bin/bsd-port/getty3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1588
-
-
-
/bin/shsh -c /usr/bin/bsd-port/getty2⤵PID:1590
-
/usr/bin/bsd-port/getty/usr/bin/bsd-port/getty3⤵
- Executes dropped EXE
- Modifies init.d
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
PID:1591 -
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"4⤵PID:1607
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux5⤵PID:1608
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"4⤵PID:1609
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux5⤵PID:1610
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"4⤵PID:1611
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux5⤵PID:1612
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"4⤵PID:1613
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux5⤵PID:1614
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"4⤵PID:1615
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux5⤵PID:1616
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"4⤵PID:1617
-
/usr/bin/mkdirmkdir -p /usr/bin/dpkgd5⤵
- Reads runtime system information
PID:1618
-
-
-
/bin/shsh -c "cp -f /bin/lsof /usr/bin/dpkgd/lsof"4⤵PID:1620
-
/usr/bin/cpcp -f /bin/lsof /usr/bin/dpkgd/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1621
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1622
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1623
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/lsof"4⤵PID:1624
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /bin/lsof5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1625
-
-
-
/bin/shsh -c "chmod 0755 /bin/lsof"4⤵PID:1627
-
/usr/bin/chmodchmod 0755 /bin/lsof5⤵PID:1628
-
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"4⤵PID:1629
-
/usr/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1630
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1631
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1632
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ps"4⤵PID:1634
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ps5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1635
-
-
-
/bin/shsh -c "chmod 0755 /bin/ps"4⤵PID:1636
-
/usr/bin/chmodchmod 0755 /bin/ps5⤵PID:1637
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1638
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1639
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/lsof"4⤵PID:1640
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1641
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"4⤵PID:1642
-
/usr/bin/chmodchmod 0755 /usr/bin/lsof5⤵PID:1643
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1644
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1645
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/ps"4⤵PID:1646
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1647
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/ps"4⤵PID:1648
-
/usr/bin/chmodchmod 0755 /usr/bin/ps5⤵PID:1649
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"4⤵PID:1650
-
/usr/sbin/insmodinsmod /usr/lib/xpacket.ko5⤵
- Reads runtime system information
PID:1651
-
-
-
-
-
/bin/shsh -c "mkdir -p /etc/ssh"2⤵PID:1593
-
/usr/bin/mkdirmkdir -p /etc/ssh3⤵
- Reads runtime system information
PID:1594
-
-
-
/bin/shsh -c "cp -f /tmp/be9e6e33ce58d7572b0a089a9be20dd0_JaffaCakes118 /etc/ssh/bashpa"2⤵PID:1595
-
/usr/bin/cpcp -f /tmp/be9e6e33ce58d7572b0a089a9be20dd0_JaffaCakes118 /etc/ssh/bashpa3⤵
- Reads runtime system information
PID:1596
-
-
-
/bin/shsh -c /etc/ssh/bashpa2⤵PID:1598
-
/etc/ssh/bashpa/etc/ssh/bashpa3⤵
- Executes dropped EXE
- Reads runtime system information
- Writes file to tmp directory
PID:1599
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"2⤵PID:1601
-
/usr/sbin/insmodinsmod /usr/lib/xpacket.ko3⤵
- Reads runtime system information
PID:1602
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD55005b7a92750528d3c312db7d154d447
SHA1c79d13a8a71e35a3034e5f1ef9ad6c1395af40eb
SHA25622d69231f74de26ae9acd9bc8a270cfe8672124707f3d601ec1dfa9f0bac0ec7
SHA5125f731a47c15adda97dd9cce9989e15c669ff1527c553fcc5a56c95933b96684c3fce9991a9b5a306a44bae3ff8adb0d0b0afd309719586d88c78f5a5ed4a2887
-
Filesize
36B
MD5993cc15058142d96c3daf7852c3d5ee8
SHA10950b8b391b04dd3895ea33cd3141543ebd2525d
SHA2568171d077918611803d93088409f220c66fae1c670b297e1aa5d8cbd548ce9208
SHA5120c4256c00a3710f97e92581b552682b36b62afc35fe72622c491323c618c19ea62611ac04ccafc3dfcde2254a2ebbd93b69b66795b16e36332293bed83adb928
-
Filesize
69B
MD52930859241efab3842629a18ef4f5b31
SHA1250c45f7c6c6985bf7e8222365bf01396e458bd3
SHA256d0aacf9dd6643c0d186b1d9412c72c81ba33135441d64a659a302e15aac03782
SHA512ab2a27dc6c66ebfbb865bab522d80b46c7a138ee8b05692abdbfe3b86fbac7cba6810b353ef91a20cce63f3e88df7e206d493ea4b33ee2b162b33b0c4b711498
-
Filesize
4B
MD5b2dd140336c9df867c087a29b2e66034
SHA19f7f230b6748530889d6d498ff5f5e2934fdbe69
SHA2562ae7ffb0ec4d1bccf01b12233aaced6949cc5808a4a173315ee508abbbaaaa1c
SHA5124140f3a8f3bd58f4e2e4c071d097d6401a78187340dd6f63f7e157d3fcd2a4f78d65f3b6b34c352c8f35cdb2983d054b76f4d8ea49586e260ab81c0463a31c9b
-
Filesize
4B
MD59e984c108157cea74c894b5cf34efc44
SHA10c774d8e1e30b273143a93836f845a4d3f44a60f
SHA256b458944d9ec4322f9ff0de2885ce82d580341fcf0fd688422e9929b6e7ce3b2d
SHA512aeb9c3cdd81ee2439338d9c994a1150abf17fedc07542fb625f0dc70cf5d160e5b9827cbc875552d7bdc14d9372ee6b2525ac8e80d0f4a0fa88fcb86b79bd2fc
-
Filesize
51B
MD59bfaf207ca1136de452606fefdef1573
SHA163396cf573c9cda57e18a0efa5088d0a68e96559
SHA2560b68cae078cfeaf9b897c31498823ae71d1634dfdecaea82bdeaf2b00993bdb3
SHA512657f867fbdc3a279fac37968aae0ed099853f056abeddd8ae6bba1ea63a6ad8c025f1406e6e6db8266322674ebc09b054af923c851566786af5fa5d1ada90ef4
-
Filesize
1.1MB
MD5be9e6e33ce58d7572b0a089a9be20dd0
SHA15f3788156d48b1e1865a471a9a34019aa63f1a1b
SHA2561ea1b4edcc7e1ba2ba0e549ff3fcdd35efabd69f4e671b905a7d38ec97a7d9d9
SHA5128b20ab73a1aa5ad3c1cf09af600e538cfb519a509c599ea76a6b07189d04e679112e2c273ed2e8ae1de677af614c74b4332ab973542e0c6bb8d5b5968aa97b07
-
Filesize
163KB
MD5ab57b66cc531ae0f996963223e632b60
SHA1bf7e5becd33f21c2539f5a75ffa0ab61c49c8795
SHA2562484863a7bfda7f97b90bfd5dfceed4ec9f27dd51f9c5158c8daabbf4309b1df
SHA512908acef13f3c1d80b7169ec3b16bb67006013453348fff75550bc3c6c2137e798b21d7990edbd5be63d756d9c41b06160aebf38aa80547e4bafa3a62596057f6
-
Filesize
138KB
MD58146139c2ad7e550b1d1f49480997446
SHA1074db8890c3227bd8a588417f5b9bde637bcf3af
SHA256207df9d438f75185ab3af2ab1173d104831a6631c28ef40d38b2ab43de27b40f
SHA512b6d71d537f593b9af833e6f798e412e95fc486a313414ed8cca9639f61be7ac9dca700e9f861c0d07c7f65b3783127a67f829f422472cad8938ba01d397ab9de