Connecting El Jefe 2.0 with the Cuckoo malware sandbox
Common Information
Type Value
UUID bb4d93f6-37da-457e-921d-ef58d7266920
Fingerprint e41bb4dc5e387c0
Analysis status DONE
Considered CTI value 0
Text language
Published May 8, 2014, 12:44 p.m.
Added to db Jan. 18, 2023, 9:48 p.m.
Last updated Dec. 22, 2024, 9:28 p.m.
Headline Immunity Products
Title Connecting El Jefe 2.0 with the Cuckoo malware sandbox
Detected Hints/Tags/Attributes 25/1/27
Attributes
Details Type #Events CTI Value
Details Domain 3
www.mongodb.org
Details Domain 2
docs.cuckoosandbox.org
Details Domain 10
www.cuckoosandbox.org
Details Domain 19
settings.py
Details Domain 1
eljefexmlserver.py
Details Domain 33
views.py
Details Domain 1
www.pythonware.com
Details Domain 7
agent.py
Details Domain 1
cuckoo.py
Details File 90
download.html
Details File 20
settings.py
Details File 1
eljefexmlserver.py
Details File 31
views.py
Details File 1
base_.html
Details File 29
www.py
Details File 8
agent.py
Details File 1
cuckoo.py
Details IPv4 7
192.168.100.0
Details IPv4 2
192.168.100.100
Details IPv4 165
255.255.255.0
Details IPv4 24
192.168.100.1
Details IPv4 5
192.168.56.0
Details Url 1
http://www.mongodb.org/downloads.
Details Url 1
http://docs.cuckoosandbox.org/en/latest/installation/host/requirements/#installing
Details Url 1
http://www.cuckoosandbox.org/download.html
Details Url 1
http://docs.cuckoosandbox.org/en/latest/installation/guest/.
Details Url 1
http://www.pythonware.com/products/pil