Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240226-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    10-04-2024 17:15

General

  • Target

    eb959c0408d63d9afa27d2ebd9c599798c1354db594be1718bb9710afb949f7b_JaffaCakes118

  • Size

    27KB

  • MD5

    58fcf8d536f14fabfb11c1678a307219

  • SHA1

    aa2e05670aacb4f8a97fce74dd111e66bcb3268f

  • SHA256

    eb959c0408d63d9afa27d2ebd9c599798c1354db594be1718bb9710afb949f7b

  • SHA512

    6b331dad0f4ab272ec8aa59731530a8750f1874ee7f13d830f3faccf344fc76927b12c99af8b3e5928186404632074fcacac2d8705988a28d99aa944c3f6ea69

  • SSDEEP

    384:ARt/koxisa34beDtZwuaCBsk+G9lLSsLYSTFs9u8OtqlrNElVbhh43hymdGUop5Z:A7soTAZ3alkXLvFh8nNElPh8s3UozZ

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/eb959c0408d63d9afa27d2ebd9c599798c1354db594be1718bb9710afb949f7b_JaffaCakes118
    /tmp/eb959c0408d63d9afa27d2ebd9c599798c1354db594be1718bb9710afb949f7b_JaffaCakes118
    1⤵
    • Reads runtime system information
    PID:640

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/640-1-0x00008000-0x00020ffc-memory.dmp