Analysis
-
max time kernel
150s -
max time network
153s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240226-en -
resource tags
arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
07-04-2024 02:10
General
-
Target
e3d2013b2863d5c761103cfd0904b811_JaffaCakes118
-
Size
31KB
-
MD5
e3d2013b2863d5c761103cfd0904b811
-
SHA1
0ebdb58cea71f19e60078f57624c5e5dadee33f0
-
SHA256
0fc8b6e034ea1d973aea96d1651709745116da91aa4cb88a5c0c02b48e15a4b2
-
SHA512
5ef74f674b7b679421f7acfed17583241ee4ef928909597d1fe97b4efcdbea8525538e7f6607b34c9dccbb2efba62525e2ec5ae39437c7bd4d5f47c4a3e70c5c
-
SSDEEP
384:X3fpCLrsjHIX69URc+hmnulY1qHprFKt6zhS45vDajssVwfzira39RWGVCz0Nv2s:nfpWcehzJFYKgULAssKfWa3LWa
Malware Config
Extracted
mirai
LZRD
Signatures
-
Contacts a large (20411) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/net/tcp -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
description ioc File opened for reading /proc/net/tcp -
Reads runtime system information 48 IoCs
Reads data from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/705/exe File opened for reading /proc/782/exe File opened for reading /proc/803/exe File opened for reading /proc/237/fd File opened for reading /proc/716/fd File opened for reading /proc/688/exe File opened for reading /proc/533/fd File opened for reading /proc/584/fd File opened for reading /proc/720/fd File opened for reading /proc/584/exe File opened for reading /proc/702/exe File opened for reading /proc/173/fd File opened for reading /proc/365/fd File opened for reading /proc/389/fd File opened for reading /proc/709/exe File opened for reading /proc/717/exe File opened for reading /proc/722/fd File opened for reading /proc/533/exe File opened for reading /proc/583/fd File opened for reading /proc/702/fd File opened for reading /proc/717/fd File opened for reading /proc/379/fd File opened for reading /proc/706/fd File opened for reading /proc/713/fd File opened for reading /proc/714/fd File opened for reading /proc/1/fd File opened for reading /proc/548/fd File opened for reading /proc/711/fd File opened for reading /proc/711/exe File opened for reading /proc/583/exe File opened for reading /proc/728/exe File opened for reading /proc/778/exe File opened for reading /proc/151/fd File opened for reading /proc/330/fd File opened for reading /proc/406/fd File opened for reading /proc/703/exe File opened for reading /proc/804/exe File opened for reading /proc/362/fd File opened for reading /proc/363/fd File opened for reading /proc/703/fd File opened for reading /proc/406/exe File opened for reading /proc/548/exe File opened for reading /proc/708/exe File opened for reading /proc/724/exe File opened for reading /proc/745/exe File opened for reading /proc/327/fd File opened for reading /proc/378/fd File opened for reading /proc/688/fd
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/710-1-0x00400000-0x00455bd8-memory.dmp