Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240226-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    05-04-2024 13:09

General

  • Target

    d492a3bc056b2e4a1f790a754b831ea2_JaffaCakes118

  • Size

    21KB

  • MD5

    d492a3bc056b2e4a1f790a754b831ea2

  • SHA1

    f6a171e75f17998147d56c2954db62adf5b0abe7

  • SHA256

    06a029b43ffc7cfce135bf9697374645635467ac72362e05bae1c8a005f8e1bd

  • SHA512

    59cf7b9b94d0c39989f45d724e67e24a138fdbf0a0fc30b6e9b79d64d516513df49458cb8cd6370fb22089a9c3c0d961abccc9a12de1aac60dce4963a2303bed

  • SSDEEP

    384:Yamog4c6L5i4+stIW01vhQIE2TQKMpI8QwxZVFjfPnSbBhymdGUop5hXI:YToh/DxCvhdR4IjWVFbS1s3UozJI

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

Processes

  • /tmp/d492a3bc056b2e4a1f790a754b831ea2_JaffaCakes118
    /tmp/d492a3bc056b2e4a1f790a754b831ea2_JaffaCakes118
    1⤵
      PID:645

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/645-1-0x00008000-0x0001bfb0-memory.dmp