Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240226-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    31-03-2024 03:03

General

  • Target

    4b6d2c90c5109a86e6d44074c88ce33a_JaffaCakes118

  • Size

    28KB

  • MD5

    4b6d2c90c5109a86e6d44074c88ce33a

  • SHA1

    91dc58fa8656c087c6227f65daa7b130557862cf

  • SHA256

    1ef8f13d4ddbd90df8b7eb013cd29951222d0042e50faf0ca053dd49cd59def3

  • SHA512

    cd31d0a8c84a191a371f908c9dff1c4de673107eda24db7c2d46d42b888c913497339a2fea34eb1f3833e095d670ea4e7ae43da5edff3f8828bfb37cbed7a562

  • SSDEEP

    768:FusHfRavjynNKnjFcZIhQzhKMXg4G9q3UEL7p:VRwynNIOQQ1KMwiLl

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/4b6d2c90c5109a86e6d44074c88ce33a_JaffaCakes118
    /tmp/4b6d2c90c5109a86e6d44074c88ce33a_JaffaCakes118
    1⤵
    • Reads runtime system information
    PID:643

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/643-1-0x00008000-0x00022780-memory.dmp