Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240226-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    18-04-2024 19:46

General

  • Target

    f8a405e29c89a3ebdd5f892337377004_JaffaCakes118

  • Size

    47KB

  • MD5

    f8a405e29c89a3ebdd5f892337377004

  • SHA1

    b81cd00b9f4523ab1c90c1d98cd83929c62cb33a

  • SHA256

    be09bc5a85187205281f402f8ac28fdcf4898970228205e63222997fef0cc4bf

  • SHA512

    1dc5b804aba89f69ab478f8bd90dbfe507e586b7a8a68bc14b2602c9b82c605735b0af7a036a9a7a9191c91f54d4998e9ef3408cc277382fae56d105ee857319

  • SSDEEP

    768:5QgpbT8obnlCDkzvZiLe8hNa+tvmOXxaJvX9q3UELMUqEFqSdUwd6EE5C:5zpPnnlC4zvZae8bZrXcELMVE8aUb0

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/f8a405e29c89a3ebdd5f892337377004_JaffaCakes118
    /tmp/f8a405e29c89a3ebdd5f892337377004_JaffaCakes118
    1⤵
    • Reads runtime system information
    PID:644

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/644-1-0x00008000-0x00029ed0-memory.dmp