General

  • Target

    eccba1bd0adedf00340c53fd34e800d7_JaffaCakes118

  • Size

    30KB

  • Sample

    240920-egkf2sxfqm

  • MD5

    eccba1bd0adedf00340c53fd34e800d7

  • SHA1

    7b959de9d793bbc071dad336fd2e4d4cb82c7b0f

  • SHA256

    7f82d34906c480afefcd26f969b815794f352a95ce280b4ddb0687ff096c6a8b

  • SHA512

    116ca660e158a83ae12222aae2b440586604e51e58630a4f12118e1fae760a403d9bf00d7f79e4aad252d268736d699739d4665ee27b4f952a2660fd9c42f508

  • SSDEEP

    384:p7pQBDf6jlpTWg3vMGQiirhHwMyGj4CC9vEKMvU/4Qdre21jT58vKpG2Y0orcfKU:p78zQ5VFNcDAFLcIwgnoYq0xFBVdHtrn

Malware Config

Targets

    • Target

      eccba1bd0adedf00340c53fd34e800d7_JaffaCakes118

    • Size

      30KB

    • MD5

      eccba1bd0adedf00340c53fd34e800d7

    • SHA1

      7b959de9d793bbc071dad336fd2e4d4cb82c7b0f

    • SHA256

      7f82d34906c480afefcd26f969b815794f352a95ce280b4ddb0687ff096c6a8b

    • SHA512

      116ca660e158a83ae12222aae2b440586604e51e58630a4f12118e1fae760a403d9bf00d7f79e4aad252d268736d699739d4665ee27b4f952a2660fd9c42f508

    • SSDEEP

      384:p7pQBDf6jlpTWg3vMGQiirhHwMyGj4CC9vEKMvU/4Qdre21jT58vKpG2Y0orcfKU:p78zQ5VFNcDAFLcIwgnoYq0xFBVdHtrn

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Deletes system logs

      Deletes log file which contains global system messages. Adversaries may delete system logs to minimize their footprint.

    • Flushes firewall rules

      Flushes/ disables firewall rules inside the Linux kernel.

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

    • Abuse Elevation Control Mechanism: Sudo and Sudo Caching

      Abuse sudo or cached sudo credentials to execute code.

    • Attempts to change immutable files

      Modifies inode attributes on the filesystem to allow changing of immutable files.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Disables AppArmor

      Disables AppArmor security module.

    • Disables SELinux

      Disables SELinux security module.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks