General
-
Target
facf9c49c38b9ec5ddc32d06d19b4824_JaffaCakes118
-
Size
37KB
-
Sample
240419-v2he7aaf64
-
MD5
facf9c49c38b9ec5ddc32d06d19b4824
-
SHA1
2e4b26afab4c7f2fa5e2021a5f97b445ded9c68f
-
SHA256
fea0d187213ca105b2ca028e9007ff01411a4b4091e6d74f366ba6171c202b7e
-
SHA512
d451e358b4ac8ac7019f074f4df1c2a2076f00fe62300579095ed5e1909f7f02da6b4178e592761bedcb5b8e1e91be1546b82bccecfe35f4aab51b226dbc13e6
-
SSDEEP
768:wPWl1tts6LBznOo26ThOVH0GbmttFElqnrEmJgGlzDpxYsp:9l1ttZRnOo26VUbmtfrESVrYK
Static task
static1
Malware Config
Extracted
mirai
KYTON
Targets
-
-
Target
facf9c49c38b9ec5ddc32d06d19b4824_JaffaCakes118
-
Size
37KB
-
MD5
facf9c49c38b9ec5ddc32d06d19b4824
-
SHA1
2e4b26afab4c7f2fa5e2021a5f97b445ded9c68f
-
SHA256
fea0d187213ca105b2ca028e9007ff01411a4b4091e6d74f366ba6171c202b7e
-
SHA512
d451e358b4ac8ac7019f074f4df1c2a2076f00fe62300579095ed5e1909f7f02da6b4178e592761bedcb5b8e1e91be1546b82bccecfe35f4aab51b226dbc13e6
-
SSDEEP
768:wPWl1tts6LBznOo26ThOVH0GbmttFElqnrEmJgGlzDpxYsp:9l1ttZRnOo26VUbmtfrESVrYK
-
Contacts a large (111536) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Changes its process name
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Writes file to system bin folder
-