Analysis
-
max time kernel
149s -
max time network
151s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240729-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
18-09-2024 19:22
Behavioral task
behavioral1
Sample
e9d0ceb7c823a511a2f59af62cb2186f_JaffaCakes118
Resource
ubuntu2004-amd64-20240729-en
General
-
Target
e9d0ceb7c823a511a2f59af62cb2186f_JaffaCakes118
-
Size
1.1MB
-
MD5
e9d0ceb7c823a511a2f59af62cb2186f
-
SHA1
c59f119553d18aaa69363179506cec8bf1ff5f47
-
SHA256
bd725c4105df8194d29f7a39bc2356113ed9d840f4629ec222aa1bbd269c9f1a
-
SHA512
149d5d532252b2d956b0d9c9db09bf4714a6b9fa7d10254ccd6723ceea16aa16d59361a6b3f439839052bbaa28c76069dec62fd05410018ed0429b78c648f70b
-
SSDEEP
24576:4vRE7caCfKGPqVEDNLFxKsfarI+gIGYuuCol7r:4vREKfPqVE5jKsfarRHGVo7r
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
Processes:
resource yara_rule behavioral1/files/fstream-4.dat family_mrblack -
File and Directory Permissions Modification 1 TTPs 8 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodshchmodshchmodshchmodshpid Process 1503 chmod 1508 sh 1509 chmod 1514 sh 1515 chmod 1494 sh 1495 chmod 1502 sh -
Executes dropped EXE 2 IoCs
Processes:
getty.sshdioc pid Process /usr/bin/bsd-port/getty 1455 getty /usr/bin/.sshd 1463 .sshd -
Processes:
e9d0ceb7c823a511a2f59af62cb2186f_JaffaCakes118gettydescription ioc Process File opened for modification /etc/init.d/DbSecuritySpt e9d0ceb7c823a511a2f59af62cb2186f_JaffaCakes118 File opened for modification /etc/init.d/selinux getty -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
Processes:
gettydescription ioc Process File opened for reading /proc/net/route getty -
Write file to user bin folder 10 IoCs
Processes:
cpcpcpcpcpgettye9d0ceb7c823a511a2f59af62cb2186f_JaffaCakes118cpdescription ioc Process File opened for modification /usr/bin/bsd-port/getty cp File opened for modification /usr/bin/.sshd cp File opened for modification /usr/bin/dpkgd/ps cp File opened for modification /usr/bin/lsof cp File opened for modification /usr/bin/ps cp File opened for modification /usr/bin/bsd-port/conf.n getty File opened for modification /usr/bin/bsd-port/getty.lock e9d0ceb7c823a511a2f59af62cb2186f_JaffaCakes118 File opened for modification /usr/bin/bsd-port/udevd.lock e9d0ceb7c823a511a2f59af62cb2186f_JaffaCakes118 File opened for modification /usr/bin/bsd-port/getty.lock getty File opened for modification /usr/bin/dpkgd/lsof cp -
Writes file to system bin folder 2 IoCs
Processes:
cpcpdescription ioc Process File opened for modification /bin/lsof cp File opened for modification /bin/ps cp -
Checks CPU configuration 1 TTPs 2 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
e9d0ceb7c823a511a2f59af62cb2186f_JaffaCakes118gettydescription ioc Process File opened for reading /proc/cpuinfo e9d0ceb7c823a511a2f59af62cb2186f_JaffaCakes118 File opened for reading /proc/cpuinfo getty -
Reads system network configuration 1 TTPs 4 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
e9d0ceb7c823a511a2f59af62cb2186f_JaffaCakes118gettydescription ioc Process File opened for reading /proc/net/dev e9d0ceb7c823a511a2f59af62cb2186f_JaffaCakes118 File opened for reading /proc/net/dev getty File opened for reading /proc/net/route getty File opened for reading /proc/net/arp getty -
Processes:
cpmkdirinsmodcpcpmkdircpe9d0ceb7c823a511a2f59af62cb2186f_JaffaCakes118cpmkdircp.sshdmkdircpmkdirgettymkdircpinsmodmkdirdescription ioc Process File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/sys/kernel/version e9d0ceb7c823a511a2f59af62cb2186f_JaffaCakes118 File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/sys/kernel/version .sshd File opened for reading /proc/meminfo e9d0ceb7c823a511a2f59af62cb2186f_JaffaCakes118 File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/meminfo getty File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/cmdline insmod File opened for reading /proc/sys/kernel/version getty File opened for reading /proc/filesystems mkdir File opened for reading /proc/stat getty File opened for reading /proc/stat e9d0ceb7c823a511a2f59af62cb2186f_JaffaCakes118 -
Writes file to tmp directory 7 IoCs
Malware often drops required files in the /tmp directory.
Processes:
e9d0ceb7c823a511a2f59af62cb2186f_JaffaCakes118.sshddescription ioc Process File opened for modification /tmp/moni.lock e9d0ceb7c823a511a2f59af62cb2186f_JaffaCakes118 File opened for modification /tmp/bill.lock e9d0ceb7c823a511a2f59af62cb2186f_JaffaCakes118 File opened for modification /tmp/gates.lock e9d0ceb7c823a511a2f59af62cb2186f_JaffaCakes118 File opened for modification /tmp/notify.file e9d0ceb7c823a511a2f59af62cb2186f_JaffaCakes118 File opened for modification /tmp/moni.lock .sshd File opened for modification /tmp/notify.file .sshd File opened for modification /tmp/gates.lock .sshd
Processes
-
/tmp/e9d0ceb7c823a511a2f59af62cb2186f_JaffaCakes118/tmp/e9d0ceb7c823a511a2f59af62cb2186f_JaffaCakes1181⤵
- Modifies init.d
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
- Writes file to tmp directory
PID:1398 -
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt"2⤵PID:1439
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt3⤵PID:1440
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt"2⤵PID:1441
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt3⤵PID:1442
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt"2⤵PID:1443
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt3⤵PID:1444
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt"2⤵PID:1445
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt3⤵PID:1446
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt"2⤵PID:1447
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt3⤵PID:1448
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"2⤵PID:1449
-
/usr/bin/mkdirmkdir -p /usr/bin/bsd-port3⤵
- Reads runtime system information
PID:1450
-
-
-
/bin/shsh -c "cp -f /tmp/e9d0ceb7c823a511a2f59af62cb2186f_JaffaCakes118 /usr/bin/bsd-port/getty"2⤵PID:1451
-
/usr/bin/cpcp -f /tmp/e9d0ceb7c823a511a2f59af62cb2186f_JaffaCakes118 /usr/bin/bsd-port/getty3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1452
-
-
-
/bin/shsh -c /usr/bin/bsd-port/getty2⤵PID:1454
-
/usr/bin/bsd-port/getty/usr/bin/bsd-port/getty3⤵
- Executes dropped EXE
- Modifies init.d
- Reads system routing table
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
PID:1455 -
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"4⤵PID:1475
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux5⤵PID:1476
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"4⤵PID:1477
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux5⤵PID:1478
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"4⤵PID:1479
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux5⤵PID:1480
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"4⤵PID:1481
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux5⤵PID:1482
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"4⤵PID:1483
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux5⤵PID:1485
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"4⤵PID:1486
-
/usr/bin/mkdirmkdir -p /usr/bin/dpkgd5⤵
- Reads runtime system information
PID:1487
-
-
-
/bin/shsh -c "cp -f /bin/lsof /usr/bin/dpkgd/lsof"4⤵PID:1488
-
/usr/bin/cpcp -f /bin/lsof /usr/bin/dpkgd/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1489
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1490
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1491
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/lsof"4⤵PID:1492
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /bin/lsof5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1493
-
-
-
/bin/shsh -c "chmod 0755 /bin/lsof"4⤵
- File and Directory Permissions Modification
PID:1494 -
/usr/bin/chmodchmod 0755 /bin/lsof5⤵
- File and Directory Permissions Modification
PID:1495
-
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"4⤵PID:1496
-
/usr/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1497
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1498
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1499
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ps"4⤵PID:1500
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ps5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1501
-
-
-
/bin/shsh -c "chmod 0755 /bin/ps"4⤵
- File and Directory Permissions Modification
PID:1502 -
/usr/bin/chmodchmod 0755 /bin/ps5⤵
- File and Directory Permissions Modification
PID:1503
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1504
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1505
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/lsof"4⤵PID:1506
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1507
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"4⤵
- File and Directory Permissions Modification
PID:1508 -
/usr/bin/chmodchmod 0755 /usr/bin/lsof5⤵
- File and Directory Permissions Modification
PID:1509
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1510
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1511
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/ps"4⤵PID:1512
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1513
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/ps"4⤵
- File and Directory Permissions Modification
PID:1514 -
/usr/bin/chmodchmod 0755 /usr/bin/ps5⤵
- File and Directory Permissions Modification
PID:1515
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"4⤵PID:1516
-
/usr/sbin/insmodinsmod /usr/lib/xpacket.ko5⤵
- Reads runtime system information
PID:1517
-
-
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"2⤵PID:1457
-
/usr/bin/mkdirmkdir -p /usr/bin3⤵
- Reads runtime system information
PID:1458
-
-
-
/bin/shsh -c "cp -f /tmp/e9d0ceb7c823a511a2f59af62cb2186f_JaffaCakes118 /usr/bin/.sshd"2⤵PID:1459
-
/usr/bin/cpcp -f /tmp/e9d0ceb7c823a511a2f59af62cb2186f_JaffaCakes118 /usr/bin/.sshd3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1460
-
-
-
/bin/shsh -c /usr/bin/.sshd2⤵PID:1462
-
/usr/bin/.sshd/usr/bin/.sshd3⤵
- Executes dropped EXE
- Reads runtime system information
- Writes file to tmp directory
PID:1463
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"2⤵PID:1465
-
/usr/sbin/insmodinsmod /usr/lib/xpacket.ko3⤵
- Reads runtime system information
PID:1468
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Privilege Escalation
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD590064bc219f5db26c022a56a80d2fcbe
SHA110c728730a789027444fe01c7c997e0f32873b2a
SHA2560da4e35abd1a34298d2f9c72c061d8e95a56b261041958e8165bc7afd5b06fff
SHA512f00772c2abbd656edf7a106a1e1c3a60a6b6f6dcee257c29b9cfc3b84315be127608c3e667e33eef5b6655a760cfa2009ec08adb1497e3995a010287ad16524b
-
Filesize
36B
MD5993cc15058142d96c3daf7852c3d5ee8
SHA10950b8b391b04dd3895ea33cd3141543ebd2525d
SHA2568171d077918611803d93088409f220c66fae1c670b297e1aa5d8cbd548ce9208
SHA5120c4256c00a3710f97e92581b552682b36b62afc35fe72622c491323c618c19ea62611ac04ccafc3dfcde2254a2ebbd93b69b66795b16e36332293bed83adb928
-
Filesize
4B
MD5602d1305678a8d5fdb372271e980da6a
SHA187b2eb969f96afe3b467215f279262e98c868d27
SHA2563485da2e4aaa4c692d04e570406af48b512f13137ab9e57718753a7a9f7b6e1c
SHA512dcdb6d1e88228353412b1a7973492d15d9a7d60e2042851981f9067198f592502538e18683a255e58ab137d49e6882b9171aa5c6b0201782efcbfa4b86f0b05d
-
Filesize
4B
MD5c913303f392ffc643f7240b180602652
SHA1655030540aed981b558d2f880b20cca6217d24e6
SHA2564753e699ede615170936d7dd4c55a57c11c2965a2f8854e9d5738a387aa11e3a
SHA512a5d67239eab15f51fa903435b3ecee59cdfde6a92eb1c79a294ad0b8d70eb9af1edf0950b6006f6cb41bd2ff7c8624b0b9c99bf0ce1b9393c3e6387888479c3e
-
Filesize
51B
MD57190c2e6ac3d4e30400315f7e500e49a
SHA194c879eb645fd9796c92c6a90d3487ff06eae499
SHA25638b155816b42328061454419f095a03d7b46d29ad50497d80eef9330b884c221
SHA512f11b9405048979450744ce03c6a010e7af8746b555ab329b118caff9d555a5524e62f0af1248b532b7b265a78234269fcb7e4d46f3d1d822bf6f21129086248d
-
Filesize
69B
MD52923a1c1a42ef0ab35abeb8ca115db55
SHA1536528be8dd93273808cd2378125ad5914299c74
SHA2561212bf4db9efe963d1571cc12754bf1dde999e89df56c2a9defccef41980e87e
SHA512eac287453eb8fd7c91a4dd9d9fe0148f6f97a3cf7e2c984ee69c74dca04df7ba01b911fe42aed37c9902701960668feb0d6555dba1ea74d72060f3c61d911f0e
-
Filesize
1.1MB
MD5e9d0ceb7c823a511a2f59af62cb2186f
SHA1c59f119553d18aaa69363179506cec8bf1ff5f47
SHA256bd725c4105df8194d29f7a39bc2356113ed9d840f4629ec222aa1bbd269c9f1a
SHA512149d5d532252b2d956b0d9c9db09bf4714a6b9fa7d10254ccd6723ceea16aa16d59361a6b3f439839052bbaa28c76069dec62fd05410018ed0429b78c648f70b
-
Filesize
171KB
MD5061386937ec7acf924438a2643a32be0
SHA101a044b9e58839bea3e58c66cb32acc16241bf91
SHA2568a26bbae9eb85aa98ef29cfe5b0a291234db6eb394c3e0c2841983dcf7dda959
SHA5122de2e56ac4c32f47b4a1945ccfb0db378e6d59019ee8004e3e5d2ec8935efb5aa8ee14b8a0b21c61a267e195d42a3232a6dcade8720de06118fd579277f59db7
-
Filesize
134KB
MD5d194576b899af45b1d2a448612ec21e5
SHA1492f7d8f28cd4397ce22fcf0d8bf3304ea93465a
SHA256a8cf81f3a1137c999c3cf336507ce120b3065e633ade01db6280d427b7d986ca
SHA512b323babd9580b91772cde29c9f22ae75b27f5ce8ce0268a48ca41713c3545dd72409932a5c48f6af66ac6e43127eb5461d1f686bd667fa1b0e56a1564db3c539