Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240226-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    17-04-2024 10:24

General

  • Target

    f58e2e02cf7b770065075beaf0507167_JaffaCakes118

  • Size

    24KB

  • MD5

    f58e2e02cf7b770065075beaf0507167

  • SHA1

    2b7186cfb4087f81de12a61dc631d7681714233e

  • SHA256

    be5bb5e0bae582c3a376381d4d072d4a5a1aeddf45070753eb711e4600e24223

  • SHA512

    394b6d1c045b74b8ef032bf5dfc18271ff5ee7cbaddf679afe21c40f69870abe9ad7114432af2fe629fbd6694ba629265dfb69a828ea8898686cdb29a6a6f7f2

  • SSDEEP

    768:qX9nxn8o9wnBoWzEQf2EjKb3p5Ds3Uoze:qtn+o9wjfBAZ5uze

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/f58e2e02cf7b770065075beaf0507167_JaffaCakes118
    /tmp/f58e2e02cf7b770065075beaf0507167_JaffaCakes118
    1⤵
    • Reads runtime system information
    PID:655

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/655-1-0x00008000-0x0001dee0-memory.dmp