Analysis
-
max time kernel
0s -
platform
debian-9_armhf -
resource
debian9-armhf-20240226-en -
resource tags
arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
18-04-2024 19:46
General
-
Target
f8a405e29c89a3ebdd5f892337377004_JaffaCakes118
-
Size
47KB
-
MD5
f8a405e29c89a3ebdd5f892337377004
-
SHA1
b81cd00b9f4523ab1c90c1d98cd83929c62cb33a
-
SHA256
be09bc5a85187205281f402f8ac28fdcf4898970228205e63222997fef0cc4bf
-
SHA512
1dc5b804aba89f69ab478f8bd90dbfe507e586b7a8a68bc14b2602c9b82c605735b0af7a036a9a7a9191c91f54d4998e9ef3408cc277382fae56d105ee857319
-
SSDEEP
768:5QgpbT8obnlCDkzvZiLe8hNa+tvmOXxaJvX9q3UELMUqEFqSdUwd6EE5C:5zpPnnlC4zvZae8bZrXcELMVE8aUb0
Malware Config
Extracted
Family
mirai
Botnet
SORA
Signatures
-
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
f8a405e29c89a3ebdd5f892337377004_JaffaCakes118description ioc process File opened for reading /proc/self/exe f8a405e29c89a3ebdd5f892337377004_JaffaCakes118
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/644-1-0x00008000-0x00029ed0-memory.dmp