Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240226-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    10-04-2024 20:15

General

  • Target

    ebe6eacc20e3159f72b7f46e8830ff81_JaffaCakes118

  • Size

    21KB

  • MD5

    ebe6eacc20e3159f72b7f46e8830ff81

  • SHA1

    6c74f46f3612cb8af7f43dfda7d1c73f190232cb

  • SHA256

    cf929ca58f4d6d78897edfa5231ba09a1d530c5bc94c9f75cbade559ad1dab4b

  • SHA512

    33703d2a5d8c9471722851d689a4253db9b3b669ed7b5eca5c888f3e5afe8c1c1bd97cc5697f71e4fb19f68833989598121574f762d94b569b24be1326f1887d

  • SSDEEP

    384:YAmog4c6L5i4+stIW01vhQIE2TQKMpI8QwxZVFjfPnSb+zchymdGUop5hXr:Ypoh/DxCvhdR4IjWVFbSCws3UozJr

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

Processes

  • /tmp/ebe6eacc20e3159f72b7f46e8830ff81_JaffaCakes118
    /tmp/ebe6eacc20e3159f72b7f46e8830ff81_JaffaCakes118
    1⤵
      PID:663

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/663-1-0x00008000-0x0001bfb0-memory.dmp