General

  • Target

    e80f5bf6c877aa6b984cd9c89f5b1a69_JaffaCakes118

  • Size

    70KB

  • Sample

    240408-wd21csae3x

  • MD5

    e80f5bf6c877aa6b984cd9c89f5b1a69

  • SHA1

    59469af16aafe950b6ec8325d2f81ef6e229bb08

  • SHA256

    9c67db1ef310f2d4728e75d22746f44f677d3b1974ca1ee240c47fdafcd1b103

  • SHA512

    50038d5a3f4ef641c57026b9d73cb3bd2066537e6ef745e5c97518ad2cbd3e26b5df9cbc88f05abd74da049ab01ea1034c7a26798a7b842522e9ad505b085b1f

  • SSDEEP

    1536:GbtexU5L9XouIRhb96pUQzXtwavaJ3V8OHxouJeZWDFI8qM:GbtexU0r8QCKw2FbT

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      e80f5bf6c877aa6b984cd9c89f5b1a69_JaffaCakes118

    • Size

      70KB

    • MD5

      e80f5bf6c877aa6b984cd9c89f5b1a69

    • SHA1

      59469af16aafe950b6ec8325d2f81ef6e229bb08

    • SHA256

      9c67db1ef310f2d4728e75d22746f44f677d3b1974ca1ee240c47fdafcd1b103

    • SHA512

      50038d5a3f4ef641c57026b9d73cb3bd2066537e6ef745e5c97518ad2cbd3e26b5df9cbc88f05abd74da049ab01ea1034c7a26798a7b842522e9ad505b085b1f

    • SSDEEP

      1536:GbtexU5L9XouIRhb96pUQzXtwavaJ3V8OHxouJeZWDFI8qM:GbtexU0r8QCKw2FbT

    Score
    9/10
    • Contacts a large (20333) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks