Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240226-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    17-04-2024 13:49

General

  • Target

    f5eb5ef263607d083b3ec13b51ca9a09_JaffaCakes118

  • Size

    28KB

  • MD5

    f5eb5ef263607d083b3ec13b51ca9a09

  • SHA1

    6d90dfca935f6a6791a1ab4096bafd4c3a434882

  • SHA256

    b44ee054239c35e3f359395098c229bbaffc5365367719c2c4c75f56149d9ef3

  • SHA512

    1d98157aae67c3cb12fb3ec61b9cc4cadc7af16935e70781aad6eb201bfa8631e4773317fd18689aeb9c46a8ea65d16fe003cbc7407c02cef2ce5d4001f403d0

  • SSDEEP

    768:EusHfRavjynNKnjFcZIhQzhKMXgbh9q3UEL7U:WRwynNIOQQ1KMw4LI

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/f5eb5ef263607d083b3ec13b51ca9a09_JaffaCakes118
    /tmp/f5eb5ef263607d083b3ec13b51ca9a09_JaffaCakes118
    1⤵
    • Reads runtime system information
    PID:659

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/659-1-0x00008000-0x00022780-memory.dmp