Analysis
-
max time kernel
9s -
max time network
131s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20240523-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
27-08-2024 10:35
General
-
Target
c4d44eed4916675dd408ff0b3562fb1f_JaffaCakes118
-
Size
184KB
-
MD5
c4d44eed4916675dd408ff0b3562fb1f
-
SHA1
57279a4f3ccd3f6abbc2c306682438234241598b
-
SHA256
855557e415b485cedb9dc2c6f96d524143108aff2f84497528a8fcddf2dc86a2
-
SHA512
6baaf6f86560da77fb2b73244db8d0dca9acffb808c3be70ea59b5b581ee4bbc20a5267aa4d3bddefa6e4cf81db5a5c479bb2f2a36db9f9f94d5489615b34401
-
SSDEEP
3072:sxaa59s173XRtl2eymb9Nsb4nWpBqjvxThmKmgPmLJLm/PhnFkw1Y5:so71734eymb9qb4nWHuSmHhnF7Y5
Malware Config
Signatures
-
Detects Kaiten/Tsunami Payload 1 IoCs
resource yara_rule behavioral1/memory/2476-1-0x00007ccfa5481000-0x00007ccfa5495700-memory.dmp family_kaiten2 -
Detects Kaiten/Tsunami payload 1 IoCs
resource yara_rule behavioral1/memory/2476-1-0x00007ccfa5481000-0x00007ccfa5495700-memory.dmp family_kaiten -
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/self/exe c4d44eed4916675dd408ff0b3562fb1f_JaffaCakes118 -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/.python c4d44eed4916675dd408ff0b3562fb1f_JaffaCakes118