General

  • Target

    18a8909eb7a57cf2776e043ad7f20438_JaffaCakes118

  • Size

    141KB

  • Sample

    240505-v5jsesgb5w

  • MD5

    18a8909eb7a57cf2776e043ad7f20438

  • SHA1

    828d10f1a4855a21870b7c013edf2d3902d75fa0

  • SHA256

    e556204ddc0ac33ee7bdc73b13e777ab9f535ee97a39fd6c219682859e96bc65

  • SHA512

    6877b117e75aafb56d4cca1571b8589103bce7261dd3d62749e1f7ec74f280f8c513c512330072344a741383dc6fb0e2ae01bd8525678567e23b71487adfcc5b

  • SSDEEP

    3072:walgM69pe0QmlTvIUdt9mrsplDKZUQQBKXAVanXX+F8JyvSPhLZ85iBMR6yoC1QH:walgM69pe0QmlTvI8t9mrsplDKZUQQBe

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      18a8909eb7a57cf2776e043ad7f20438_JaffaCakes118

    • Size

      141KB

    • MD5

      18a8909eb7a57cf2776e043ad7f20438

    • SHA1

      828d10f1a4855a21870b7c013edf2d3902d75fa0

    • SHA256

      e556204ddc0ac33ee7bdc73b13e777ab9f535ee97a39fd6c219682859e96bc65

    • SHA512

      6877b117e75aafb56d4cca1571b8589103bce7261dd3d62749e1f7ec74f280f8c513c512330072344a741383dc6fb0e2ae01bd8525678567e23b71487adfcc5b

    • SSDEEP

      3072:walgM69pe0QmlTvIUdt9mrsplDKZUQQBKXAVanXX+F8JyvSPhLZ85iBMR6yoC1QH:walgM69pe0QmlTvI8t9mrsplDKZUQQBe

    Score
    9/10
    • Contacts a large (20158) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Matrix ATT&CK v13

Tasks