Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    ubuntu-20.04_amd64
  • resource
    ubuntu2004-amd64-20240729-en
  • resource tags

    arch:amd64arch:i386image:ubuntu2004-amd64-20240729-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system
  • submitted
    29/09/2024, 07:50

General

  • Target

    fe1595f0117b67a1d9cb68913d5725d6_JaffaCakes118

  • Size

    56KB

  • MD5

    fe1595f0117b67a1d9cb68913d5725d6

  • SHA1

    1bafed34b999de0338b5f57f3396f96e34273d85

  • SHA256

    43a3c7cf3ddcc5ba31385af9bbcbeb9dce1a9870d72a7dc0c8f78b995d510891

  • SHA512

    ff94a398608cb5a4f320cb3fa215e248bd7097284f7b1793bf60b0308b8f29ef0a56bc1a321590ae2f87c809b31834bd4de5786b128b6b77a35480307cf43d71

  • SSDEEP

    1536:f8RIjnggLVDc1eN+ImCi+Frt3WQjXHcedCvH:YIbggLV6m++HJt3WeXHpkv

Malware Config

Signatures

  • Contacts a large (5438) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Deletes itself 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Changes its process name 1 IoCs
  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

Processes

  • /tmp/fe1595f0117b67a1d9cb68913d5725d6_JaffaCakes118
    /tmp/fe1595f0117b67a1d9cb68913d5725d6_JaffaCakes118
    1⤵
    • Deletes itself
    • Modifies Watchdog functionality
    • Enumerates active TCP sockets
    • Changes its process name
    • Reads system network configuration
    PID:1386

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads