Analysis
-
max time kernel
149s -
max time network
150s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240729-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
20-09-2024 04:30
Behavioral task
behavioral1
Sample
ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118
Resource
ubuntu2004-amd64-20240729-en
General
-
Target
ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118
-
Size
1.1MB
-
MD5
ecd85f48177089d1e7672cf04d91b8ec
-
SHA1
1de79f6fd9322ce3a3716e24bda666a7b97ed293
-
SHA256
13b31c857ca874127126dc16929e7a281f97d2dc84650fb5898bd41572efc7a8
-
SHA512
5de0f0aebd0b9daaa06cc2cd1773bb6fe39f5dc1d7d58f423b77d73a966575cc70958275aee8ccbbadfcd07841e99b92d6d84c5fc4a7864a6af5c23e4750ca0c
-
SSDEEP
24576:4vRE7caCfKGPqVEDNLFxKsfaJI+gIGYuuCol7r:4vREKfPqVE5jKsfaJRHGVo7r
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
Processes:
resource yara_rule behavioral1/files/fstream-4.dat family_mrblack -
File and Directory Permissions Modification 1 TTPs 8 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodshchmodshchmodshchmodshpid Process 1506 chmod 1511 sh 1512 chmod 1517 sh 1518 chmod 1496 sh 1498 chmod 1505 sh -
Executes dropped EXE 2 IoCs
Processes:
gettylibswioc pid Process /usr/bin/bsd-port/getty 1459 getty /usr/bin/libsw 1467 libsw -
Processes:
ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118gettydescription ioc Process File opened for modification /etc/init.d/DbSecuritySpt ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118 File opened for modification /etc/init.d/selinux getty -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
Processes:
ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118description ioc Process File opened for reading /proc/net/route ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118 -
Write file to user bin folder 9 IoCs
Processes:
cpcpcpcpcpecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118gettycpdescription ioc Process File opened for modification /usr/bin/bsd-port/getty cp File opened for modification /usr/bin/libsw cp File opened for modification /usr/bin/dpkgd/ps cp File opened for modification /usr/bin/lsof cp File opened for modification /usr/bin/ps cp File opened for modification /usr/bin/bsd-port/getty.lock ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118 File opened for modification /usr/bin/bsd-port/udevd.lock ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118 File opened for modification /usr/bin/bsd-port/getty.lock getty File opened for modification /usr/bin/dpkgd/lsof cp -
Writes file to system bin folder 2 IoCs
Processes:
cpcpdescription ioc Process File opened for modification /bin/lsof cp File opened for modification /bin/ps cp -
Checks CPU configuration 1 TTPs 2 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118gettydescription ioc Process File opened for reading /proc/cpuinfo ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118 File opened for reading /proc/cpuinfo getty -
Reads system network configuration 1 TTPs 4 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118gettydescription ioc Process File opened for reading /proc/net/dev ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118 File opened for reading /proc/net/route ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118 File opened for reading /proc/net/arp ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118 File opened for reading /proc/net/dev getty -
Processes:
mkdirmkdirmkdircpmkdircpgettyecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118cpinsmodlibswinsmodcpcpcpcpcpmkdirmkdirmkdirdescription ioc Process File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/stat getty File opened for reading /proc/meminfo getty File opened for reading /proc/sys/kernel/version ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118 File opened for reading /proc/stat ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118 File opened for reading /proc/filesystems cp File opened for reading /proc/cmdline insmod File opened for reading /proc/sys/kernel/version libsw File opened for reading /proc/meminfo ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118 File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/sys/kernel/version getty File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir -
Writes file to tmp directory 8 IoCs
Malware often drops required files in the /tmp directory.
Processes:
libswecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118description ioc Process File opened for modification /tmp/notify.file libsw File opened for modification /tmp/gates.lock libsw File opened for modification /tmp/moni.lock ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118 File opened for modification /tmp/bill.lock ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118 File opened for modification /tmp/gates.lock ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118 File opened for modification /tmp/notify.file ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118 File opened for modification /tmp/conf.n ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118 File opened for modification /tmp/moni.lock libsw
Processes
-
/tmp/ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118/tmp/ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes1181⤵
- Modifies init.d
- Reads system routing table
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
- Writes file to tmp directory
PID:1402 -
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt"2⤵PID:1443
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt3⤵PID:1444
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt"2⤵PID:1445
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt3⤵PID:1446
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt"2⤵PID:1447
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt3⤵PID:1448
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt"2⤵PID:1449
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt3⤵PID:1450
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt"2⤵PID:1451
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt3⤵PID:1452
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"2⤵PID:1453
-
/usr/bin/mkdirmkdir -p /usr/bin/bsd-port3⤵
- Reads runtime system information
PID:1454
-
-
-
/bin/shsh -c "cp -f /tmp/ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118 /usr/bin/bsd-port/getty"2⤵PID:1455
-
/usr/bin/cpcp -f /tmp/ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118 /usr/bin/bsd-port/getty3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1456
-
-
-
/bin/shsh -c /usr/bin/bsd-port/getty2⤵PID:1458
-
/usr/bin/bsd-port/getty/usr/bin/bsd-port/getty3⤵
- Executes dropped EXE
- Modifies init.d
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
PID:1459 -
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"4⤵PID:1478
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux5⤵PID:1479
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"4⤵PID:1480
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux5⤵PID:1481
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"4⤵PID:1482
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux5⤵PID:1483
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"4⤵PID:1484
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux5⤵PID:1485
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"4⤵PID:1486
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux5⤵PID:1487
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"4⤵PID:1488
-
/usr/bin/mkdirmkdir -p /usr/bin/dpkgd5⤵
- Reads runtime system information
PID:1489
-
-
-
/bin/shsh -c "cp -f /bin/lsof /usr/bin/dpkgd/lsof"4⤵PID:1490
-
/usr/bin/cpcp -f /bin/lsof /usr/bin/dpkgd/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1491
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1492
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1493
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/lsof"4⤵PID:1494
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /bin/lsof5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1495
-
-
-
/bin/shsh -c "chmod 0755 /bin/lsof"4⤵
- File and Directory Permissions Modification
PID:1496 -
/usr/bin/chmodchmod 0755 /bin/lsof5⤵
- File and Directory Permissions Modification
PID:1498
-
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"4⤵PID:1499
-
/usr/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1500
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1501
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1502
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ps"4⤵PID:1503
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ps5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1504
-
-
-
/bin/shsh -c "chmod 0755 /bin/ps"4⤵
- File and Directory Permissions Modification
PID:1505 -
/usr/bin/chmodchmod 0755 /bin/ps5⤵
- File and Directory Permissions Modification
PID:1506
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1507
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1508
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/lsof"4⤵PID:1509
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1510
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"4⤵
- File and Directory Permissions Modification
PID:1511 -
/usr/bin/chmodchmod 0755 /usr/bin/lsof5⤵
- File and Directory Permissions Modification
PID:1512
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1513
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1514
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/ps"4⤵PID:1515
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1516
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/ps"4⤵
- File and Directory Permissions Modification
PID:1517 -
/usr/bin/chmodchmod 0755 /usr/bin/ps5⤵
- File and Directory Permissions Modification
PID:1518
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"4⤵PID:1519
-
/usr/sbin/insmodinsmod /usr/lib/xpacket.ko5⤵
- Reads runtime system information
PID:1520
-
-
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"2⤵PID:1461
-
/usr/bin/mkdirmkdir -p /usr/bin3⤵
- Reads runtime system information
PID:1462
-
-
-
/bin/shsh -c "cp -f /tmp/ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118 /usr/bin/libsw"2⤵PID:1463
-
/usr/bin/cpcp -f /tmp/ecd85f48177089d1e7672cf04d91b8ec_JaffaCakes118 /usr/bin/libsw3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1464
-
-
-
/bin/shsh -c /usr/bin/libsw2⤵PID:1466
-
/usr/bin/libsw/usr/bin/libsw3⤵
- Executes dropped EXE
- Reads runtime system information
- Writes file to tmp directory
PID:1467
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"2⤵PID:1470
-
/usr/sbin/insmodinsmod /usr/lib/xpacket.ko3⤵
- Reads runtime system information
PID:1471
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Privilege Escalation
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD56cc7a6c0451855903aa4c93c0ac909ae
SHA1650445a84ff26003fa428b8a0ec3bbb23101fc82
SHA256d35021078324e29879263b1055f9a3b99e4a75e9a085f209dcc369044d1f97cd
SHA51268d86ff2eedfdf9496ce1247f36cdd932ef8fcd6809231abbe87b23da0a440d144e34efeb9e2daaa516b7d5927e8be9985d1f9019bf54db18bed21f8ebe4896b
-
Filesize
36B
MD5993cc15058142d96c3daf7852c3d5ee8
SHA10950b8b391b04dd3895ea33cd3141543ebd2525d
SHA2568171d077918611803d93088409f220c66fae1c670b297e1aa5d8cbd548ce9208
SHA5120c4256c00a3710f97e92581b552682b36b62afc35fe72622c491323c618c19ea62611ac04ccafc3dfcde2254a2ebbd93b69b66795b16e36332293bed83adb928
-
Filesize
4B
MD54edaa105d5f53590338791951e38c3ad
SHA184cbb8cb3aaa7a5a5f98ab30b5b0c948cca74f93
SHA256e8026bda3ea2eedc7dc7bce9daa640f8cc0f33e335bd73d986a872b3ba789c71
SHA5124ba97143cecd7c930f04399ee510c97ecb6db989aea923bac4d98deffe8310ed21f8928adc3438fe31206e6a0880ee3fccc9121d1fe8bb500c6bd874b37a7c41
-
Filesize
4B
MD5cec6f62cfb44b1be110b7bf70c8362d8
SHA1742f0a1ef06d6bdc8c856b05b3ad8839e2a27ba7
SHA2566b6803d3f23f64d048b7d5e5d1b828c90aac1b68bec5c590100122902a400876
SHA51275b3a6744aacae46a8de3b5b609d21cd143e701f3c73ea257d121e8cb54d27a0d3d2ed17d25cc8329a5e2b8913a298747c40f555b0af3b32ebe3dc6d22099ab8
-
Filesize
51B
MD5b47623e1654646086a4269457ef03811
SHA12f9d7227366dba95fe6b8a32aa3b650e0e80c853
SHA256dd1f46ed83cbb9ab2f0afaf5da64c2828cc028ef6e3c18129d4e72211bfbbad1
SHA512c877c302c8c65e5e930d5931c117ffb9cf6079246988397e864593b77193c778bcb00819c9a9a4a7ecfa54f1bc64aecc0a6a7d74aa09e85bfdceb16009aa0d6a
-
Filesize
1.1MB
MD5ecd85f48177089d1e7672cf04d91b8ec
SHA11de79f6fd9322ce3a3716e24bda666a7b97ed293
SHA25613b31c857ca874127126dc16929e7a281f97d2dc84650fb5898bd41572efc7a8
SHA5125de0f0aebd0b9daaa06cc2cd1773bb6fe39f5dc1d7d58f423b77d73a966575cc70958275aee8ccbbadfcd07841e99b92d6d84c5fc4a7864a6af5c23e4750ca0c
-
Filesize
171KB
MD5061386937ec7acf924438a2643a32be0
SHA101a044b9e58839bea3e58c66cb32acc16241bf91
SHA2568a26bbae9eb85aa98ef29cfe5b0a291234db6eb394c3e0c2841983dcf7dda959
SHA5122de2e56ac4c32f47b4a1945ccfb0db378e6d59019ee8004e3e5d2ec8935efb5aa8ee14b8a0b21c61a267e195d42a3232a6dcade8720de06118fd579277f59db7
-
Filesize
134KB
MD5d194576b899af45b1d2a448612ec21e5
SHA1492f7d8f28cd4397ce22fcf0d8bf3304ea93465a
SHA256a8cf81f3a1137c999c3cf336507ce120b3065e633ade01db6280d427b7d986ca
SHA512b323babd9580b91772cde29c9f22ae75b27f5ce8ce0268a48ca41713c3545dd72409932a5c48f6af66ac6e43127eb5461d1f686bd667fa1b0e56a1564db3c539