Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20240508-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20240508-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    08-05-2024 20:21

General

  • Target

    26913fb9e3478836f7ce89e4e2a29c78_JaffaCakes118

  • Size

    30KB

  • MD5

    26913fb9e3478836f7ce89e4e2a29c78

  • SHA1

    22578bf400cc6336ce22a915aaeeb86c3fad834a

  • SHA256

    12ab7ef93a2945151cffa26210f6e939c5ea966178ba4413ed6b6adcb4bb5737

  • SHA512

    186404e8f6656b0a4f40477916c8f6ff57901507f1797c08b61fba3b7dbead9076399097b04880eae5610f01b7c4f349889f7a1392afa0665b1d234c73878eef

  • SSDEEP

    768:oHEfFF4xYasK7S6weygSVwVOzeMV8xtPdTInbcuyD7URQRjp:oUFbaXbweygSVwsVIddEnouy8RyN

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Contacts a large (20724) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/26913fb9e3478836f7ce89e4e2a29c78_JaffaCakes118
    /tmp/26913fb9e3478836f7ce89e4e2a29c78_JaffaCakes118
    1⤵
    • Modifies Watchdog functionality
    • Enumerates active TCP sockets
    • Reads system network configuration
    • Reads runtime system information
    PID:1477

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1477-1-0x0000000008048000-0x0000000008059900-memory.dmp