General
-
Target
d66aca73387d8ab787f71544777285b5_JaffaCakes118
-
Size
36KB
-
Sample
240909-qt6etszhpp
-
MD5
d66aca73387d8ab787f71544777285b5
-
SHA1
526715af85f935e34b15f124d4b57c8fc37fc1a5
-
SHA256
3c7faf7512565d86b1ec4fe2810b2006b75c3476b4a5b955f0141d9a1c237d38
-
SHA512
c9ab083fa7d6a49c333020c13e241303da28afe5a8bd2cf60733fc419ecabef91a9360ac70b5425ee85109367554f3d2a9bf1434dd918ab514fe6ac8800de5ed
-
SSDEEP
384:x7DQQwQHDf6jlpTWg3vMQ4Qdre21jT58vKpG2Y0orcfKLUv0KZnNEVdeUoJpJyd5:x7kFNc48FkcOYq0xvQGd51ZdAAPPD
Static task
static1
Behavioral task
behavioral1
Sample
d66aca73387d8ab787f71544777285b5_JaffaCakes118
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
d66aca73387d8ab787f71544777285b5_JaffaCakes118
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
d66aca73387d8ab787f71544777285b5_JaffaCakes118
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
d66aca73387d8ab787f71544777285b5_JaffaCakes118
Resource
debian9-mipsel-20240611-en
Malware Config
Targets
-
-
Target
d66aca73387d8ab787f71544777285b5_JaffaCakes118
-
Size
36KB
-
MD5
d66aca73387d8ab787f71544777285b5
-
SHA1
526715af85f935e34b15f124d4b57c8fc37fc1a5
-
SHA256
3c7faf7512565d86b1ec4fe2810b2006b75c3476b4a5b955f0141d9a1c237d38
-
SHA512
c9ab083fa7d6a49c333020c13e241303da28afe5a8bd2cf60733fc419ecabef91a9360ac70b5425ee85109367554f3d2a9bf1434dd918ab514fe6ac8800de5ed
-
SSDEEP
384:x7DQQwQHDf6jlpTWg3vMQ4Qdre21jT58vKpG2Y0orcfKLUv0KZnNEVdeUoJpJyd5:x7kFNc48FkcOYq0xvQGd51ZdAAPPD
-
Adds new SSH keys
Linux special file to hold SSH keys. The threat actor may add new keys for further remote access.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Deletes system logs
Deletes log file which contains global system messages. Adversaries may delete system logs to minimize their footprint.
-
Executes dropped EXE
-
Flushes firewall rules
Flushes/ disables firewall rules inside the Linux kernel.
-
Attempts to change immutable files
Modifies inode attributes on the filesystem to allow changing of immutable files.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Disables AppArmor
Disables AppArmor security module.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Unix Shell
1Scheduled Task/Job
1Cron
1Software Deployment Tools
1Persistence
Account Manipulation
1SSH Authorized Keys
1Scheduled Task/Job
1Cron
1Privilege Escalation
Account Manipulation
1SSH Authorized Keys
1Scheduled Task/Job
1Cron
1