General

  • Target

    1fddd8b0aadb0a02ea890f698caff89c_JaffaCakes118

  • Size

    60KB

  • Sample

    240507-h6t9bshe42

  • MD5

    1fddd8b0aadb0a02ea890f698caff89c

  • SHA1

    211110ccd5195d8eb3124899b656774741e91429

  • SHA256

    e4b97889fd03e2d12d395cee75c7316cd655689cff616e8ae64f72759322b00c

  • SHA512

    aa5b1109741c9983d7bcc15e32fbacf36e4d011316bb19ec282703435133a63117d59aae1e32936e32577baeccd9488d41f3b6c7a618d93c4458e7185d5cbf1a

  • SSDEEP

    1536:ItLBpV4/JSWE/h8RAv+QvQpiIXRySsuZG:YBpV4/JSWE/hgARQpd8V

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      1fddd8b0aadb0a02ea890f698caff89c_JaffaCakes118

    • Size

      60KB

    • MD5

      1fddd8b0aadb0a02ea890f698caff89c

    • SHA1

      211110ccd5195d8eb3124899b656774741e91429

    • SHA256

      e4b97889fd03e2d12d395cee75c7316cd655689cff616e8ae64f72759322b00c

    • SHA512

      aa5b1109741c9983d7bcc15e32fbacf36e4d011316bb19ec282703435133a63117d59aae1e32936e32577baeccd9488d41f3b6c7a618d93c4458e7185d5cbf1a

    • SSDEEP

      1536:ItLBpV4/JSWE/h8RAv+QvQpiIXRySsuZG:YBpV4/JSWE/hgARQpd8V

    Score
    9/10
    • Contacts a large (103431) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Impair Defenses

1
T1562

Discovery

Network Service Discovery

2
T1046

Tasks