Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20240226-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    06-04-2024 21:03

General

  • Target

    e346f0286cc04d058447c3f7792cd05c_JaffaCakes118

  • Size

    30KB

  • MD5

    e346f0286cc04d058447c3f7792cd05c

  • SHA1

    cfdae58e7e595283668b3a4d9e947a1e54ecf6fa

  • SHA256

    a0900c119505695f1c14a605c5a794a9608d010e16de4c84c7b716e678281099

  • SHA512

    ea663485d8c7dafaa566aca582a4b4522ae45df7f2c7ab2ef48fbc59a7d60e7a29a8e8d4dea0f7af7bc24191aa3a02517f9672d2b53de2cb17cd0420d8233320

  • SSDEEP

    768:NygIKfw8EBsLpWEvMW9gvvDM8RY/O77WW:bh3EBsLplvTYTR/

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Contacts a large (17404) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/e346f0286cc04d058447c3f7792cd05c_JaffaCakes118
    /tmp/e346f0286cc04d058447c3f7792cd05c_JaffaCakes118
    1⤵
      PID:712

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/712-1-0x00400000-0x00455960-memory.dmp