Analysis
-
max time kernel
5s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
16-09-2024 03:56
Static task
static1
Behavioral task
behavioral1
Sample
e3fb4dc382dfa4fe37498329727bea34_JaffaCakes118
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
e3fb4dc382dfa4fe37498329727bea34_JaffaCakes118
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
e3fb4dc382dfa4fe37498329727bea34_JaffaCakes118
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
e3fb4dc382dfa4fe37498329727bea34_JaffaCakes118
Resource
debian9-mipsel-20240226-en
General
-
Target
e3fb4dc382dfa4fe37498329727bea34_JaffaCakes118
-
Size
28KB
-
MD5
e3fb4dc382dfa4fe37498329727bea34
-
SHA1
a2aa6b00de3fb975fce1c3ab6d8e4f290df9a3fd
-
SHA256
b7b12dcb15e682c62eb4151041251b62a4ac86e76ac87f4af65be0818b648174
-
SHA512
177954ced290f48bd34fe3d0b2c3bdbc3683772cbd2256c174675cd00a4606ca2fa42b2da4f3d5fbf3c124209b8e367c287bc769378253bcce61fcc57792baaf
-
SSDEEP
384:p7pQQwQHDf6jlpTWg3vMGQiKMvU/4Qdre21jT58vKpG2Y0orcfKLUv0KZnNEVdeg:p7JVFNcD8FLcIwgiYq0xFB25
Malware Config
Signatures
-
Deletes system logs 1 TTPs 1 IoCs
Deletes log file which contains global system messages. Adversaries may delete system logs to minimize their footprint.
description ioc Process File deleted /var/log/syslog rm -
Flushes firewall rules 1 IoCs
Flushes/ disables firewall rules inside the Linux kernel.
pid Process 663 iptables -
Abuse Elevation Control Mechanism: Sudo and Sudo Caching 1 TTPs 1 IoCs
Abuse sudo or cached sudo credentials to execute code.
pid Process 669 sudo -
Attempts to change immutable files 17 IoCs
Modifies inode attributes on the filesystem to allow changing of immutable files.
pid Process 658 chattr 681 chattr 710 xargs 716 xargs 722 xargs 734 xargs 654 chattr 661 chattr 688 grep 748 xargs 651 chattr 692 grep 704 xargs 742 xargs 679 chattr 698 xargs 728 xargs -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads CPU attributes 1 TTPs 2 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps -
description ioc Process File opened for reading /proc/16/status ps File opened for reading /proc/25/stat ps File opened for reading /proc/29/stat ps File opened for reading /proc/41/cmdline ps File opened for reading /proc/151/cmdline ps File opened for reading /proc/21/cmdline ps File opened for reading /proc/646/status ps File opened for reading /proc/2/stat ps File opened for reading /proc/109/status ps File opened for reading /proc/691/cmdline ps File opened for reading /proc/self/maps awk File opened for reading /proc/9/status ps File opened for reading /proc/25/cmdline ps File opened for reading /proc/297/stat ps File opened for reading /proc/5/stat ps File opened for reading /proc/688/stat ps File opened for reading /proc/16/stat ps File opened for reading /proc/645/cmdline ps File opened for reading /proc/109/stat ps File opened for reading /proc/599/stat ps File opened for reading /proc/21/status ps File opened for reading /proc/23/stat ps File opened for reading /proc/332/cmdline ps File opened for reading /proc/690/cmdline ps File opened for reading /proc/28/stat ps File opened for reading /proc/8/stat ps File opened for reading /proc/20/cmdline ps File opened for reading /proc/tty/drivers ps File opened for reading /proc/self/maps awk File opened for reading /proc/43/stat ps File opened for reading /proc/43/cmdline ps File opened for reading /proc/14/stat ps File opened for reading /proc/4/cmdline ps File opened for reading /proc/6/stat ps File opened for reading /proc/self/fd xargs File opened for reading /proc/139/cmdline ps File opened for reading /proc/106/status ps File opened for reading /proc/645/stat ps File opened for reading /proc/19/cmdline ps File opened for reading /proc/213/status ps File opened for reading /proc/self/fd xargs File opened for reading /proc/3/cmdline ps File opened for reading /proc/140/status ps File opened for reading /proc/307/status ps File opened for reading /proc/28/cmdline ps File opened for reading /proc/106/status ps File opened for reading /proc/22/status ps File opened for reading /proc/22/stat ps File opened for reading /proc/19/stat ps File opened for reading /proc/587/cmdline ps File opened for reading /proc/8/cmdline ps File opened for reading /proc/29/cmdline ps File opened for reading /proc/687/cmdline ps File opened for reading /proc/42/status ps File opened for reading /proc/151/stat ps File opened for reading /proc/600/cmdline ps File opened for reading /proc/41/stat ps File opened for reading /proc/108/status ps File opened for reading /proc/648/stat ps File opened for reading /proc/692/cmdline ps File opened for reading /proc/599/cmdline ps File opened for reading /proc/634/stat ps File opened for reading /proc/106/cmdline ps File opened for reading /proc/20/cmdline ps -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/log_rot e3fb4dc382dfa4fe37498329727bea34_JaffaCakes118
Processes
-
/tmp/e3fb4dc382dfa4fe37498329727bea34_JaffaCakes118/tmp/e3fb4dc382dfa4fe37498329727bea34_JaffaCakes1181⤵
- Writes file to tmp directory
PID:648 -
/bin/rmrm -rf /var/log/syslog2⤵
- Deletes system logs
PID:649
-
-
/usr/bin/chattrchattr -iua /tmp/2⤵
- Attempts to change immutable files
PID:651
-
-
/usr/bin/chattrchattr -iua /var/tmp/2⤵
- Attempts to change immutable files
PID:654
-
-
/usr/bin/chattrchattr -R -i /var/spool/cron2⤵
- Attempts to change immutable files
PID:658
-
-
/usr/bin/chattrchattr -i /etc/crontab2⤵
- Attempts to change immutable files
PID:661
-
-
/sbin/iptablesiptables -F2⤵
- Flushes firewall rules
PID:663
-
-
/usr/bin/sudosudo sysctl "kernel.nmi_watchdog=0"2⤵
- Abuse Elevation Control Mechanism: Sudo and Sudo Caching
PID:669
-
-
/usr/sbin/userdeluserdel akay2⤵PID:675
-
-
/usr/sbin/userdeluserdel vfinder2⤵PID:678
-
-
/usr/bin/chattrchattr -iae /root/.ssh/2⤵
- Attempts to change immutable files
PID:679
-
-
/usr/bin/chattrchattr -iae /root/.ssh/authorized_keys2⤵
- Attempts to change immutable files
PID:681
-
-
/bin/rmrm -rf "/tmp/addres*"2⤵PID:683
-
-
/bin/rmrm -rf "/tmp/walle*"2⤵PID:684
-
-
/bin/rmrm -rf /tmp/keys2⤵PID:685
-
-
/bin/psps aux2⤵
- Reads CPU attributes
- Reads runtime system information
PID:687
-
-
/bin/grepgrep -i "[a]liyun"2⤵
- Attempts to change immutable files
PID:688
-
-
/bin/grepgrep -i "[y]unjing"2⤵
- Attempts to change immutable files
PID:692
-
-
/bin/psps aux2⤵
- Reads CPU attributes
- Reads runtime system information
PID:691
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:696
-
-
/bin/grepgrep 185.71.65.2382⤵PID:695
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵
- Reads runtime system information
PID:697
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
- Reads runtime system information
PID:698
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:702
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:703
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:704
-
-
/bin/grepgrep 140.82.52.872⤵PID:701
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:708
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:707
-
-
/bin/grepgrep -v -2⤵PID:709
-
-
/bin/grepgrep :4432⤵PID:706
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:710
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:713
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:714
-
-
/bin/grepgrep :232⤵PID:712
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
- Reads runtime system information
PID:716
-
-
/bin/grepgrep -v -2⤵PID:715
-
-
/bin/grepgrep -v -2⤵PID:721
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:720
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:719
-
-
/bin/grepgrep :4432⤵PID:718
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:722
-
-
/bin/grepgrep -v -2⤵PID:727
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:726
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:725
-
-
/bin/grepgrep :1432⤵PID:724
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:728
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:732
-
-
/bin/grepgrep -v -2⤵PID:733
-
-
/bin/grepgrep :22222⤵PID:730
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:734
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:731
-
-
/bin/grepgrep -v -2⤵PID:741
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵
- Reads runtime system information
PID:740
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:739
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:742
-
-
/bin/grepgrep :33332⤵PID:738
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:745
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:746
-
-
/bin/grepgrep :33892⤵PID:744
-
-
/bin/grepgrep -v -2⤵PID:747
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5B
MD5727479ef7cedf30c03459bec7d87b0f0
SHA12082e7f715f058acab2398d25d135cf5f4c0ce41
SHA25629872037c9573567744ef10ed2de57864ded7554c9fa2ef03fc1244c65794ba6
SHA5124cb59d37f8481f9bb2745f494baa0910a68aad40ac2903ef1513547e091e1e772a5f9436f789ab91fcafb75b8a28c2112ede89004be41f33c01d936b542ca6ba