General

  • Target

    0fb38fe90fc2cbf71153747fbbc2db7e_JaffaCakes118

  • Size

    64KB

  • Sample

    240503-fevdxafe2s

  • MD5

    0fb38fe90fc2cbf71153747fbbc2db7e

  • SHA1

    de930635bf28b5f628f33f67e2aa23fdc63ced37

  • SHA256

    5ffc0e25a1bcd622407374cf596b1716a686b5fe4171cf9b5982a0c0796f057a

  • SHA512

    1485db0667c2e42fb82002fecbd7a4e6ae6a61842b625b4d4cb9124e5983e46f5ecb438335593193cbe79f0a3a852768b663f18bae7738573343e87b89fbb366

  • SSDEEP

    1536:IEX9170vwHbQXZ5+qXDEuXi95TSW7V/DjObeFt6PuQ4ZO:d917iwHbQXZ5+qXA599SWZ/XObeb6GZZ

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      0fb38fe90fc2cbf71153747fbbc2db7e_JaffaCakes118

    • Size

      64KB

    • MD5

      0fb38fe90fc2cbf71153747fbbc2db7e

    • SHA1

      de930635bf28b5f628f33f67e2aa23fdc63ced37

    • SHA256

      5ffc0e25a1bcd622407374cf596b1716a686b5fe4171cf9b5982a0c0796f057a

    • SHA512

      1485db0667c2e42fb82002fecbd7a4e6ae6a61842b625b4d4cb9124e5983e46f5ecb438335593193cbe79f0a3a852768b663f18bae7738573343e87b89fbb366

    • SSDEEP

      1536:IEX9170vwHbQXZ5+qXDEuXi95TSW7V/DjObeFt6PuQ4ZO:d917iwHbQXZ5+qXA599SWZ/XObeb6GZZ

    Score
    9/10
    • Contacts a large (20583) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Impair Defenses

1
T1562

Discovery

Network Service Discovery

2
T1046

System Network Connections Discovery

1
T1049

System Network Configuration Discovery

1
T1016

Tasks