Analysis
-
max time kernel
150s -
max time network
152s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240226-en -
resource tags
arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
11-04-2024 03:39
General
-
Target
ec970d2d138393d61f99f5a690f1f1f6_JaffaCakes118
-
Size
31KB
-
MD5
ec970d2d138393d61f99f5a690f1f1f6
-
SHA1
936f5bb003da33244ff72a5d5cb1e818e15e4b6c
-
SHA256
5fc1480de5a29d1025801bcfe47f4eb6811e4072bd55ce69121fed8a324aaaca
-
SHA512
7208f53b7a2e3321360303d20d3976f4da32a18fcab654dea367949cd157ca6045e9e7db50934672b86e94b3cf6c978eb73ab4d25c2aa5bbecab1da9206e1212
-
SSDEEP
384:X3fpCLrsjHIX69URc+hmnulY1qHprFKt6zhS45vDajssVwfaaojFtwg+a39RWGVQ:nfpWcehzJFYKgULAssKfaamFWg+a3LWv
Malware Config
Extracted
mirai
LZRD
Signatures
-
Contacts a large (20182) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/net/tcp -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
description ioc File opened for reading /proc/net/tcp -
Reads runtime system information 30 IoCs
Reads data from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/323/fd File opened for reading /proc/781/exe File opened for reading /proc/700/exe File opened for reading /proc/789/exe File opened for reading /proc/413/exe File opened for reading /proc/515/exe File opened for reading /proc/728/exe File opened for reading /proc/232/fd File opened for reading /proc/357/fd File opened for reading /proc/501/exe File opened for reading /proc/777/exe File opened for reading /proc/173/fd File opened for reading /proc/378/fd File opened for reading /proc/354/fd File opened for reading /proc/712/exe File opened for reading /proc/709/exe File opened for reading /proc/687/exe File opened for reading /proc/704/exe File opened for reading /proc/706/exe File opened for reading /proc/1/fd File opened for reading /proc/151/fd File opened for reading /proc/707/exe File opened for reading /proc/550/exe File opened for reading /proc/557/exe File opened for reading /proc/790/exe File opened for reading /proc/352/fd File opened for reading /proc/355/fd File opened for reading /proc/715/exe File opened for reading /proc/379/fd File opened for reading /proc/389/fd
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/708-1-0x00400000-0x00455bd8-memory.dmp