General

  • Target

    03025ccdc74f6cafd89eb2f8b710eeb1_JaffaCakes118

  • Size

    139KB

  • Sample

    240427-l5qfjagc47

  • MD5

    03025ccdc74f6cafd89eb2f8b710eeb1

  • SHA1

    95629bacd4d259c28aa1793bbc32de0caa730f26

  • SHA256

    4deb03926277834d28a9e5029a380a8045f70e549f7f8384ed7055a3eb971558

  • SHA512

    6bb4ce652d972a33a4704c6b4f3cc9de1e67e590457d125b7ef2f5a090b9b5895bb36757dc43aa5845c29bff3e5b2fc92db6f33568c9154a2a47256c4d162c2f

  • SSDEEP

    3072:V0aMUPzrxQ6jJEdVQ39mrsplDKZUIQBKXAVan7X+F8JyvQlhLAgSSofoPlBdOmKe:V0aMUPzrxQ6jJEdy39mrsplDKZUIQBKP

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      03025ccdc74f6cafd89eb2f8b710eeb1_JaffaCakes118

    • Size

      139KB

    • MD5

      03025ccdc74f6cafd89eb2f8b710eeb1

    • SHA1

      95629bacd4d259c28aa1793bbc32de0caa730f26

    • SHA256

      4deb03926277834d28a9e5029a380a8045f70e549f7f8384ed7055a3eb971558

    • SHA512

      6bb4ce652d972a33a4704c6b4f3cc9de1e67e590457d125b7ef2f5a090b9b5895bb36757dc43aa5845c29bff3e5b2fc92db6f33568c9154a2a47256c4d162c2f

    • SSDEEP

      3072:V0aMUPzrxQ6jJEdVQ39mrsplDKZUIQBKXAVan7X+F8JyvQlhLAgSSofoPlBdOmKe:V0aMUPzrxQ6jJEdy39mrsplDKZUIQBKP

    Score
    9/10
    • Contacts a large (20671) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Matrix ATT&CK v13

Tasks