General

  • Target

    731e88ae5f22ba01372a3b0cc5adccdf_JaffaCakes118

  • Size

    2.7MB

  • Sample

    240401-revkfsff6t

  • MD5

    731e88ae5f22ba01372a3b0cc5adccdf

  • SHA1

    893db829a8b0af8e37f3e0c25d63779afdc575b9

  • SHA256

    751014e0154d219dea8c2e999714c32fd98f817782588cd7af355d2488eb1c80

  • SHA512

    523094ef2170dc5a0333f7a9e0b1f3c2fc025295198b7c9b9ac36e5c130cc5c5b091f3bb541601e45f6efd081f79f50322affce355a1a2b4f83c9058566390f0

  • SSDEEP

    49152:Q4LOseggj73q9sgK4TCbbwWg0+/Y8jk1OkIlDdohcjJq:tlMVPwWIYMOOkIQh2Jq

Score
10/10

Malware Config

Targets

    • Target

      731e88ae5f22ba01372a3b0cc5adccdf_JaffaCakes118

    • Size

      2.7MB

    • MD5

      731e88ae5f22ba01372a3b0cc5adccdf

    • SHA1

      893db829a8b0af8e37f3e0c25d63779afdc575b9

    • SHA256

      751014e0154d219dea8c2e999714c32fd98f817782588cd7af355d2488eb1c80

    • SHA512

      523094ef2170dc5a0333f7a9e0b1f3c2fc025295198b7c9b9ac36e5c130cc5c5b091f3bb541601e45f6efd081f79f50322affce355a1a2b4f83c9058566390f0

    • SSDEEP

      49152:Q4LOseggj73q9sgK4TCbbwWg0+/Y8jk1OkIlDdohcjJq:tlMVPwWIYMOOkIQh2Jq

    Score
    10/10
    • Detects Kaiten/Tsunami Payload

    • Detects Kaiten/Tsunami payload

    • Kaiten/Tsunami

      Linux-based IoT botnet which is controlled through IRC and normally used to carry out DDoS attacks.

    • Runs EXE from memory

      Runs an executable from memory, likely to minimize footprint

MITRE ATT&CK Matrix ATT&CK v13

Tasks