General

  • Target

    1dd1e82414082c4e2ab1cb6219237d3e_JaffaCakes118

  • Size

    72KB

  • Sample

    240506-w68cvagh84

  • MD5

    1dd1e82414082c4e2ab1cb6219237d3e

  • SHA1

    bf98448256514a2aa22d6f221e9c31e8fcab5901

  • SHA256

    b15752c505752431067c5b2a1279bc5416f4eeb32782a9ff984d8546328356d0

  • SHA512

    a3f7046be292002cc0806ff59982070364dae593faf945e300d937d5313b81f5f1701353ee15bfc94471b400a3d782a8e8eaadeb4eda0cff84b86871bda32bc3

  • SSDEEP

    1536:xwOgQ8JS4OZm3/W97kJ2f4ol+QLk+lTKvHSW6/ReAwJt8A73elt:q39HJ2f4ol+QLk+lTKvHSW6/oAm8iult

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      1dd1e82414082c4e2ab1cb6219237d3e_JaffaCakes118

    • Size

      72KB

    • MD5

      1dd1e82414082c4e2ab1cb6219237d3e

    • SHA1

      bf98448256514a2aa22d6f221e9c31e8fcab5901

    • SHA256

      b15752c505752431067c5b2a1279bc5416f4eeb32782a9ff984d8546328356d0

    • SHA512

      a3f7046be292002cc0806ff59982070364dae593faf945e300d937d5313b81f5f1701353ee15bfc94471b400a3d782a8e8eaadeb4eda0cff84b86871bda32bc3

    • SSDEEP

      1536:xwOgQ8JS4OZm3/W97kJ2f4ol+QLk+lTKvHSW6/ReAwJt8A73elt:q39HJ2f4ol+QLk+lTKvHSW6/oAm8iult

    Score
    9/10
    • Contacts a large (20574) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Impair Defenses

1
T1562

Discovery

Network Service Discovery

2
T1046

System Network Connections Discovery

1
T1049

System Network Configuration Discovery

1
T1016

Tasks