Analysis
-
max time kernel
149s -
max time network
151s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240522.1-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240522.1-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
28-09-2024 13:57
Behavioral task
behavioral1
Sample
fc7157213488275cdd9b82b59ab15657_JaffaCakes118
Resource
ubuntu2204-amd64-20240522.1-en
General
-
Target
fc7157213488275cdd9b82b59ab15657_JaffaCakes118
-
Size
1.1MB
-
MD5
fc7157213488275cdd9b82b59ab15657
-
SHA1
3c0b0b4b4408adc8022e96ae83daf38da01dd9fa
-
SHA256
5803553052a81f6a0a7c79fafd26be7a0a23c01bf3d1d53fc9cf6360e73ae03b
-
SHA512
b77568dd49d00c866c1a9abd2a2b0de489471676f9dd062fadf44f62a420eedefd0a1d0ef584570d59b4a488a3c65c41e766c8a7f83852a6c4c61ae626cded6a
-
SSDEEP
24576:4vRE7caCfKGPqVEDNLFxKsfaQI+gIGYuuCol7r:4vREKfPqVE5jKsfaQRHGVo7r
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
Processes:
resource yara_rule /usr/bin/bsd-port/knerl family_mrblack -
File and Directory Permissions Modification 1 TTPs 8 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
shchmodshchmodshchmodshchmodpid process 1635 sh 1636 chmod 1644 sh 1645 chmod 1650 sh 1653 chmod 1658 sh 1659 chmod -
Executes dropped EXE 2 IoCs
Processes:
knerlpythnoioc pid process /usr/bin/bsd-port/knerl 1600 knerl /usr/bin/pythno 1608 pythno -
Processes:
fc7157213488275cdd9b82b59ab15657_JaffaCakes118knerldescription ioc process File opened for modification /etc/init.d/VsystemsshMdt fc7157213488275cdd9b82b59ab15657_JaffaCakes118 File opened for modification /etc/init.d/selinux knerl -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
Processes:
fc7157213488275cdd9b82b59ab15657_JaffaCakes118description ioc process File opened for reading /proc/net/route fc7157213488275cdd9b82b59ab15657_JaffaCakes118 -
Write file to user bin folder 9 IoCs
Processes:
cpfc7157213488275cdd9b82b59ab15657_JaffaCakes118knerlcpcpcpcpcpdescription ioc process File opened for modification /usr/bin/lsof cp File opened for modification /usr/bin/bsd-port/knerl.conf fc7157213488275cdd9b82b59ab15657_JaffaCakes118 File opened for modification /usr/bin/bsd-port/knerl.conf knerl File opened for modification /usr/bin/dpkgd/lsof cp File opened for modification /usr/bin/dpkgd/ps cp File opened for modification /usr/bin/bsd-port/udevd.conf fc7157213488275cdd9b82b59ab15657_JaffaCakes118 File opened for modification /usr/bin/bsd-port/knerl cp File opened for modification /usr/bin/pythno cp File opened for modification /usr/bin/ps cp -
Writes file to system bin folder 2 IoCs
Processes:
cpcpdescription ioc process File opened for modification /bin/lsof cp File opened for modification /bin/ps cp -
Checks CPU configuration 1 TTPs 2 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
fc7157213488275cdd9b82b59ab15657_JaffaCakes118knerldescription ioc process File opened for reading /proc/cpuinfo fc7157213488275cdd9b82b59ab15657_JaffaCakes118 File opened for reading /proc/cpuinfo knerl -
Reads system network configuration 1 TTPs 4 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
fc7157213488275cdd9b82b59ab15657_JaffaCakes118knerldescription ioc process File opened for reading /proc/net/dev fc7157213488275cdd9b82b59ab15657_JaffaCakes118 File opened for reading /proc/net/route fc7157213488275cdd9b82b59ab15657_JaffaCakes118 File opened for reading /proc/net/arp fc7157213488275cdd9b82b59ab15657_JaffaCakes118 File opened for reading /proc/net/dev knerl -
Processes:
cpmkdircpcpknerlcpfc7157213488275cdd9b82b59ab15657_JaffaCakes118mkdircpmkdirmkdirmkdirinsmodcpmkdircpinsmodmkdircppythnodescription ioc process File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/stat knerl File opened for reading /proc/filesystems cp File opened for reading /proc/stat fc7157213488275cdd9b82b59ab15657_JaffaCakes118 File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/sys/kernel/version fc7157213488275cdd9b82b59ab15657_JaffaCakes118 File opened for reading /proc/filesystems mkdir File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems cp File opened for reading /proc/sys/kernel/version knerl File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/meminfo fc7157213488275cdd9b82b59ab15657_JaffaCakes118 File opened for reading /proc/meminfo knerl File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/sys/kernel/version pythno -
Writes file to tmp directory 8 IoCs
Malware often drops required files in the /tmp directory.
Processes:
pythnofc7157213488275cdd9b82b59ab15657_JaffaCakes118description ioc process File opened for modification /tmp/vga.conf pythno File opened for modification /tmp/idus.log fc7157213488275cdd9b82b59ab15657_JaffaCakes118 File opened for modification /tmp/apsh.conf fc7157213488275cdd9b82b59ab15657_JaffaCakes118 File opened for modification /tmp/vga.conf fc7157213488275cdd9b82b59ab15657_JaffaCakes118 File opened for modification /tmp/notify.file fc7157213488275cdd9b82b59ab15657_JaffaCakes118 File opened for modification /tmp/idus.log pythno File opened for modification /tmp/notify.file pythno File opened for modification /tmp/conf.n fc7157213488275cdd9b82b59ab15657_JaffaCakes118
Processes
-
/tmp/fc7157213488275cdd9b82b59ab15657_JaffaCakes118/tmp/fc7157213488275cdd9b82b59ab15657_JaffaCakes1181⤵
- Modifies init.d
- Reads system routing table
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
- Writes file to tmp directory
PID:1558 -
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMdt /etc/rc1.d/S97VsystemsshMdt"2⤵PID:1584
-
/usr/bin/lnln -s /etc/init.d/VsystemsshMdt /etc/rc1.d/S97VsystemsshMdt3⤵PID:1585
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMdt /etc/rc2.d/S97VsystemsshMdt"2⤵PID:1586
-
/usr/bin/lnln -s /etc/init.d/VsystemsshMdt /etc/rc2.d/S97VsystemsshMdt3⤵PID:1587
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMdt /etc/rc3.d/S97VsystemsshMdt"2⤵PID:1588
-
/usr/bin/lnln -s /etc/init.d/VsystemsshMdt /etc/rc3.d/S97VsystemsshMdt3⤵PID:1589
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMdt /etc/rc4.d/S97VsystemsshMdt"2⤵PID:1590
-
/usr/bin/lnln -s /etc/init.d/VsystemsshMdt /etc/rc4.d/S97VsystemsshMdt3⤵PID:1591
-
-
-
/bin/shsh -c "ln -s /etc/init.d/VsystemsshMdt /etc/rc5.d/S97VsystemsshMdt"2⤵PID:1592
-
/usr/bin/lnln -s /etc/init.d/VsystemsshMdt /etc/rc5.d/S97VsystemsshMdt3⤵PID:1593
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"2⤵PID:1594
-
/usr/bin/mkdirmkdir -p /usr/bin/bsd-port3⤵
- Reads runtime system information
PID:1595
-
-
-
/bin/shsh -c "cp -f /tmp/fc7157213488275cdd9b82b59ab15657_JaffaCakes118 /usr/bin/bsd-port/knerl"2⤵PID:1596
-
/usr/bin/cpcp -f /tmp/fc7157213488275cdd9b82b59ab15657_JaffaCakes118 /usr/bin/bsd-port/knerl3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1597
-
-
-
/bin/shsh -c /usr/bin/bsd-port/knerl2⤵PID:1599
-
/usr/bin/bsd-port/knerl/usr/bin/bsd-port/knerl3⤵
- Executes dropped EXE
- Modifies init.d
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
PID:1600 -
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"4⤵PID:1615
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux5⤵PID:1616
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"4⤵PID:1617
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux5⤵PID:1618
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"4⤵PID:1619
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux5⤵PID:1620
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"4⤵PID:1621
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux5⤵PID:1622
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"4⤵PID:1623
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux5⤵PID:1624
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"4⤵PID:1625
-
/usr/bin/mkdirmkdir -p /usr/bin/dpkgd5⤵
- Reads runtime system information
PID:1627
-
-
-
/bin/shsh -c "cp -f /bin/lsof /usr/bin/dpkgd/lsof"4⤵PID:1628
-
/usr/bin/cpcp -f /bin/lsof /usr/bin/dpkgd/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1629
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1630
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1631
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/knerl /bin/lsof"4⤵PID:1632
-
/usr/bin/cpcp -f /usr/bin/bsd-port/knerl /bin/lsof5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1633
-
-
-
/bin/shsh -c "chmod 0755 /bin/lsof"4⤵
- File and Directory Permissions Modification
PID:1635 -
/usr/bin/chmodchmod 0755 /bin/lsof5⤵
- File and Directory Permissions Modification
PID:1636
-
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"4⤵PID:1637
-
/usr/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1638
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1639
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1640
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/knerl /bin/ps"4⤵PID:1641
-
/usr/bin/cpcp -f /usr/bin/bsd-port/knerl /bin/ps5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1642
-
-
-
/bin/shsh -c "chmod 0755 /bin/ps"4⤵
- File and Directory Permissions Modification
PID:1644 -
/usr/bin/chmodchmod 0755 /bin/ps5⤵
- File and Directory Permissions Modification
PID:1645
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1646
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1647
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/knerl /usr/bin/lsof"4⤵PID:1648
-
/usr/bin/cpcp -f /usr/bin/bsd-port/knerl /usr/bin/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1649
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"4⤵
- File and Directory Permissions Modification
PID:1650 -
/usr/bin/chmodchmod 0755 /usr/bin/lsof5⤵
- File and Directory Permissions Modification
PID:1653
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1654
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1655
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/knerl /usr/bin/ps"4⤵PID:1656
-
/usr/bin/cpcp -f /usr/bin/bsd-port/knerl /usr/bin/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1657
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/ps"4⤵
- File and Directory Permissions Modification
PID:1658 -
/usr/bin/chmodchmod 0755 /usr/bin/ps5⤵
- File and Directory Permissions Modification
PID:1659
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"4⤵PID:1660
-
/usr/sbin/insmodinsmod /usr/lib/xpacket.ko5⤵
- Reads runtime system information
PID:1661
-
-
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"2⤵PID:1602
-
/usr/bin/mkdirmkdir -p /usr/bin3⤵
- Reads runtime system information
PID:1603
-
-
-
/bin/shsh -c "cp -f /tmp/fc7157213488275cdd9b82b59ab15657_JaffaCakes118 /usr/bin/pythno"2⤵PID:1604
-
/usr/bin/cpcp -f /tmp/fc7157213488275cdd9b82b59ab15657_JaffaCakes118 /usr/bin/pythno3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1605
-
-
-
/bin/shsh -c /usr/bin/pythno2⤵PID:1607
-
/usr/bin/pythno/usr/bin/pythno3⤵
- Executes dropped EXE
- Reads runtime system information
- Writes file to tmp directory
PID:1608
-
-
-
/bin/shsh -c "insmod /usr/lib/xpacket.ko"2⤵PID:1610
-
/usr/sbin/insmodinsmod /usr/lib/xpacket.ko3⤵
- Reads runtime system information
PID:1611
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Privilege Escalation
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD59220437c334accbb9024461a9af144bc
SHA19431262b38656fa93a1d059b21434a1e16498558
SHA25679d17aeb56e85133d01957335084871b1dc6acb59eeae19f6ea0ddf6e721bae5
SHA512028db239b519e020a88aab33891d4b6cce605472a227a6cb995be755b1f8bb209a147da344d2a24433435a81b7a621fdbc7e561d8766379ec86fbb8b25cf1c38
-
Filesize
36B
MD5caa27b819c9303446f702929874a00e8
SHA1d24199c0e376edea3f822b215148cc0dc78364bf
SHA256da9b535a14c6d9152857e211f14fb8da9056e84ba1b8d4dc27ab79c98264050b
SHA512dcd9413eb2cb24d77f637edfc00ca0bb42229a1a3b0d84e29eff94a7b91aee6ee8c126c286a4b4103e01834d1c6aec9de09ffab3927e8de8015421005f31446e
-
Filesize
69B
MD5604505bdb332c569c386564d9872c1ee
SHA129c2263d0bca4b18b722a9d1d11bebca1f2f3c6c
SHA256b1dae2591ec0b392e4e817bd316aca149a24c2d4440e13ba48656417c4bd28a2
SHA51229420e607ba82cb429896d71449ccedd7161a97e3b37f661f64d996e90464a69345f7f01a2c3fa52798a8a4cba3c9c9c3ca4428fc03caa686bbcd695b357aaa3
-
Filesize
4B
MD5a2cc63e065705fe938a4dda49092966f
SHA1ead98e0e365d07598a35ba682210564193928571
SHA2568cd6cb7e1601eb5dcd0a0d3d8f62c2dd8ee483819f9130a34259a217e927679f
SHA512559d67c6c601d021a8418fe53112d732aa3ad5d24c01ab5f9bb92f823b2db05e4e22eb759b93f29ee07b385da811edce44e84ed5f7fa5eec0839198c20aeda23
-
Filesize
51B
MD51f5533c330f66e167696705e3293b71c
SHA135928b5dae8260c283fbc7f9e6bb50752063b44e
SHA2566dd591323c9819443fe7a1e7dd9b74eb01deb95be8a3f9da6efbffe81badb6cc
SHA512ea26371f8762e66d47411a3feb8e656e089dfacdc6e5158394e7e02159104dc3513e4a66663a63063a0e57207c4e5787fcd71e3c7cad8cd01f6fe3a1e7b2324d
-
Filesize
4B
MD5020c8bfac8de160d4c5543b96d1fdede
SHA1f19483c6a9fbacfebff05eb372439d8c0403745f
SHA2561e797595727addd0e2663019e48d48a6f1dd555174ab126d482d40a5c752988b
SHA51209558996264f3665690e53af9a71eefa8ebc52edd31f3b6d1565256d6b0baa6cf9fef16d9a29dcf1dfc2bae3f9aa935d9f15c76530e62d4b98975c57fb2b567e
-
Filesize
1.1MB
MD5fc7157213488275cdd9b82b59ab15657
SHA13c0b0b4b4408adc8022e96ae83daf38da01dd9fa
SHA2565803553052a81f6a0a7c79fafd26be7a0a23c01bf3d1d53fc9cf6360e73ae03b
SHA512b77568dd49d00c866c1a9abd2a2b0de489471676f9dd062fadf44f62a420eedefd0a1d0ef584570d59b4a488a3c65c41e766c8a7f83852a6c4c61ae626cded6a
-
Filesize
163KB
MD5ab57b66cc531ae0f996963223e632b60
SHA1bf7e5becd33f21c2539f5a75ffa0ab61c49c8795
SHA2562484863a7bfda7f97b90bfd5dfceed4ec9f27dd51f9c5158c8daabbf4309b1df
SHA512908acef13f3c1d80b7169ec3b16bb67006013453348fff75550bc3c6c2137e798b21d7990edbd5be63d756d9c41b06160aebf38aa80547e4bafa3a62596057f6
-
Filesize
138KB
MD58146139c2ad7e550b1d1f49480997446
SHA1074db8890c3227bd8a588417f5b9bde637bcf3af
SHA256207df9d438f75185ab3af2ab1173d104831a6631c28ef40d38b2ab43de27b40f
SHA512b6d71d537f593b9af833e6f798e412e95fc486a313414ed8cca9639f61be7ac9dca700e9f861c0d07c7f65b3783127a67f829f422472cad8938ba01d397ab9de