Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240226-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    31-03-2024 08:45

General

  • Target

    520ec309d6b80914fa9b7e97b82b383e_JaffaCakes118

  • Size

    31KB

  • MD5

    520ec309d6b80914fa9b7e97b82b383e

  • SHA1

    74de1d593df5c3cc52c01f25b1e3292bedcf2f13

  • SHA256

    9f4327c669ce8b3f64dcef2a666c3a9107d2e5569893fd1757ebe7d2ad1298d9

  • SHA512

    27c03e93f65627418370dac7642f566b426c03ab71d36e23b5738d6a4ffd47aeacf7392bc76a6c32dcccdb11356def93f155e3b654e11d70004523c4e1830634

  • SSDEEP

    768:0nZwAmfH/GbCDJCD9Ea8byWqK4udlB7Nrt+nJ7DpGJgGlzDpbuR1Ju:0n6AsH/GmDwBJ8byWqKD7JO7DQVJuE

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Contacts a large (20150) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 2 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 2 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 22 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/520ec309d6b80914fa9b7e97b82b383e_JaffaCakes118
    /tmp/520ec309d6b80914fa9b7e97b82b383e_JaffaCakes118
    1⤵
    • Enumerates active TCP sockets
    • Reads system network configuration
    PID:696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/696-1-0x00400000-0x00456d98-memory.dmp