Analysis
-
max time kernel
5s -
platform
debian-9_armhf -
resource
debian9-armhf-20240729-en -
resource tags
arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
09-09-2024 13:34
Static task
static1
Behavioral task
behavioral1
Sample
d66aca73387d8ab787f71544777285b5_JaffaCakes118
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
d66aca73387d8ab787f71544777285b5_JaffaCakes118
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
d66aca73387d8ab787f71544777285b5_JaffaCakes118
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
d66aca73387d8ab787f71544777285b5_JaffaCakes118
Resource
debian9-mipsel-20240611-en
General
-
Target
d66aca73387d8ab787f71544777285b5_JaffaCakes118
-
Size
36KB
-
MD5
d66aca73387d8ab787f71544777285b5
-
SHA1
526715af85f935e34b15f124d4b57c8fc37fc1a5
-
SHA256
3c7faf7512565d86b1ec4fe2810b2006b75c3476b4a5b955f0141d9a1c237d38
-
SHA512
c9ab083fa7d6a49c333020c13e241303da28afe5a8bd2cf60733fc419ecabef91a9360ac70b5425ee85109367554f3d2a9bf1434dd918ab514fe6ac8800de5ed
-
SSDEEP
384:x7DQQwQHDf6jlpTWg3vMQ4Qdre21jT58vKpG2Y0orcfKLUv0KZnNEVdeUoJpJyd5:x7kFNc48FkcOYq0xvQGd51ZdAAPPD
Malware Config
Signatures
-
Deletes system logs 1 TTPs 1 IoCs
Deletes log file which contains global system messages. Adversaries may delete system logs to minimize their footprint.
Processes:
rmdescription ioc Process File deleted /var/log/syslog rm -
Flushes firewall rules 1 IoCs
Flushes/ disables firewall rules inside the Linux kernel.
Processes:
iptablespid Process 678 iptables -
Attempts to change immutable files 15 IoCs
Modifies inode attributes on the filesystem to allow changing of immutable files.
Processes:
xargsxargsxargsxargschattrgrepxargsxargsxargsxargsxargsxargschattrgrepxargspid Process 704 xargs 721 xargs 751 xargs 757 xargs 673 chattr 693 grep 715 xargs 709 xargs 745 xargs 733 xargs 739 xargs 763 xargs 675 chattr 696 grep 727 xargs -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads CPU attributes 1 TTPs 3 IoCs
Processes:
pssysctlpsdescription ioc Process File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online sysctl File opened for reading /sys/devices/system/cpu/online ps -
Processes:
pspsxargsxargsawkxargssysctldescription ioc Process File opened for reading /proc/26/status ps File opened for reading /proc/43/stat ps File opened for reading /proc/22/cmdline ps File opened for reading /proc/177/stat ps File opened for reading /proc/598/stat ps File opened for reading /proc/16/status ps File opened for reading /proc/13/cmdline ps File opened for reading /proc/646/stat ps File opened for reading /proc/227/stat ps File opened for reading /proc/1/status ps File opened for reading /proc/199/stat ps File opened for reading /proc/311/status ps File opened for reading /proc/601/status ps File opened for reading /proc/self/fd xargs File opened for reading /proc/3/stat ps File opened for reading /proc/6/stat ps File opened for reading /proc/103/stat ps File opened for reading /proc/28/status ps File opened for reading /proc/115/stat ps File opened for reading /proc/644/status ps File opened for reading /proc/8/status ps File opened for reading /proc/81/cmdline ps File opened for reading /proc/self/fd xargs File opened for reading /proc/16/stat ps File opened for reading /proc/4/cmdline ps File opened for reading /proc/8/stat ps File opened for reading /proc/157/cmdline ps File opened for reading /proc/self/maps awk File opened for reading /proc/28/stat ps File opened for reading /proc/29/status ps File opened for reading /proc/639/stat ps File opened for reading /proc/9/stat ps File opened for reading /proc/9/cmdline ps File opened for reading /proc/323/stat ps File opened for reading /proc/692/cmdline ps File opened for reading /proc/26/stat ps File opened for reading /proc/29/stat ps File opened for reading /proc/644/cmdline ps File opened for reading /proc/691/cmdline ps File opened for reading /proc/103/status ps File opened for reading /proc/2/stat ps File opened for reading /proc/279/status ps File opened for reading /proc/13/status ps File opened for reading /proc/114/cmdline ps File opened for reading /proc/145/status ps File opened for reading /proc/595/stat ps File opened for reading /proc/2/status ps File opened for reading /proc/227/cmdline ps File opened for reading /proc/644/stat ps File opened for reading /proc/279/stat ps File opened for reading /proc/293/cmdline ps File opened for reading /proc/self/fd xargs File opened for reading /proc/112/cmdline ps File opened for reading /proc/199/cmdline ps File opened for reading /proc/580/stat ps File opened for reading /proc/12/status ps File opened for reading /proc/177/status ps File opened for reading /proc/11/cmdline ps File opened for reading /proc/691/stat ps File opened for reading /proc/8/status ps File opened for reading /proc/311/status ps File opened for reading /proc/280/status ps File opened for reading /proc/639/status ps File opened for reading /proc/sys/kernel/osrelease sysctl -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
Processes:
d66aca73387d8ab787f71544777285b5_JaffaCakes118description ioc Process File opened for modification /tmp/dev/null d66aca73387d8ab787f71544777285b5_JaffaCakes118
Processes
-
/tmp/d66aca73387d8ab787f71544777285b5_JaffaCakes118/tmp/d66aca73387d8ab787f71544777285b5_JaffaCakes1181⤵
- Writes file to tmp directory
PID:646 -
/bin/syncsync2⤵PID:648
-
-
/bin/catcat /var/spool/cron/2⤵PID:651
-
-
/bin/catcat /root/.ssh/authorized_keys2⤵PID:656
-
-
/bin/mvmv /usr/bin/curl /usr/bin/url2⤵PID:661
-
-
/bin/mvmv /usr/bin/url /usr/bin/cdl2⤵PID:663
-
-
/bin/mvmv /usr/bin/wget /usr/bin/get2⤵PID:665
-
-
/bin/mvmv /usr/bin/get /usr/bin/wdl2⤵PID:668
-
-
/bin/rmrm -rf /var/log/syslog2⤵
- Deletes system logs
PID:671
-
-
/usr/bin/chattrchattr -iua /tmp/2⤵
- Attempts to change immutable files
PID:673
-
-
/usr/bin/chattrchattr -iua /var/tmp/2⤵
- Attempts to change immutable files
PID:675
-
-
/sbin/iptablesiptables -F2⤵
- Flushes firewall rules
PID:678
-
-
/usr/sbin/userdeluserdel akay2⤵PID:682
-
-
/usr/sbin/userdeluserdel vfinder2⤵PID:685
-
-
/bin/rmrm -rf "/tmp/addres*"2⤵PID:686
-
-
/bin/rmrm -rf "/tmp/walle*"2⤵PID:688
-
-
/bin/rmrm -rf /tmp/keys2⤵PID:690
-
-
/bin/grepgrep -i "[a]liyun"2⤵
- Attempts to change immutable files
PID:693
-
-
/bin/psps aux2⤵
- Reads CPU attributes
- Reads runtime system information
PID:692
-
-
/bin/grepgrep -i "[y]unjing"2⤵
- Attempts to change immutable files
PID:696
-
-
/bin/psps aux2⤵
- Reads CPU attributes
- Reads runtime system information
PID:695
-
-
/bin/rmrm -f /tmp/.null2⤵PID:698
-
-
/sbin/sysctlsysctl -w "vm.nr_hugepages=128"2⤵
- Reads CPU attributes
- Reads runtime system information
PID:699
-
-
/bin/grepgrep 185.71.65.2382⤵PID:701
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:702
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:703
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
- Reads runtime system information
PID:704
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:709
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:708
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:707
-
-
/bin/grepgrep 140.82.52.872⤵PID:706
-
-
/bin/grepgrep -v -2⤵PID:714
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:713
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:712
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:715
-
-
/bin/grepgrep :4432⤵PID:711
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:719
-
-
/bin/grepgrep -v -2⤵PID:720
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:718
-
-
/bin/grepgrep :232⤵PID:717
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:721
-
-
/bin/grepgrep -v -2⤵PID:726
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:725
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:724
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:727
-
-
/bin/grepgrep :4432⤵PID:723
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:731
-
-
/bin/grepgrep -v -2⤵PID:732
-
-
/usr/bin/awkawk "{print \$7}"2⤵
- Reads runtime system information
PID:730
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:733
-
-
/bin/grepgrep :1432⤵PID:729
-
-
/bin/grepgrep -v -2⤵PID:738
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:737
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:736
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
- Reads runtime system information
PID:739
-
-
/bin/grepgrep :22222⤵PID:735
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:743
-
-
/bin/grepgrep -v -2⤵PID:744
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:742
-
-
/bin/grepgrep :33332⤵PID:741
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:745
-
-
/bin/grepgrep -v -2⤵PID:750
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:749
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:748
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:751
-
-
/bin/grepgrep :33892⤵PID:747
-
-
/bin/grepgrep -v -2⤵PID:756
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:755
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:754
-
-
/bin/grepgrep :44442⤵PID:753
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
- Reads runtime system information
PID:757
-
-
/bin/grepgrep -v -2⤵PID:762
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:761
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:760
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:763
-
-
/bin/grepgrep :55552⤵PID:759
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5b026324c6904b2a9cb4b88d6d61c81d1
SHA1e5fa44f2b31c1fb553b6021e7360d07d5d91ff5e
SHA2564355a46b19d348dc2f57c046f8ef63d4538ebb936000f3c9ee954a27460dd865
SHA5123abb6677af34ac57c0ca5828fd94f9d886c26ce59a8ce60ecf6778079423dccff1d6f19cb655805d56098e6d38a1a710dee59523eed7511e5a9e4b8ccb3a4686