Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240226-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    01-04-2024 12:04

General

  • Target

    717e1aa780dfa433c591e3630204efc3_JaffaCakes118

  • Size

    47KB

  • MD5

    717e1aa780dfa433c591e3630204efc3

  • SHA1

    811d1c6014daf8e61a94684b2bc72e60855540fa

  • SHA256

    3d2334f86b0901ede834ae88119d0db2fd89a91b1bf77aa3c1525be2f190ac2a

  • SHA512

    0bec0a7f69c19868c55301fdc8251382d742814e6b7d14f01fdb084fe001de614b995483a1a2687264175c33c6bc93f77ba3459c792244919f287dd48044cb40

  • SSDEEP

    768:aK7y1XGO1LCNgukEkvwtqPnH7u83nc0iFuaOJb49q3UELWt/iw+kvBGg6+fYtrBo:E12O1LCNguovDPH7TcrOVLWhiw+kvBGG

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/717e1aa780dfa433c591e3630204efc3_JaffaCakes118
    /tmp/717e1aa780dfa433c591e3630204efc3_JaffaCakes118
    1⤵
    • Reads runtime system information
    PID:655

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/655-1-0x00008000-0x00026220-memory.dmp