General

  • Target

    322886be2addf148c6bfd0bcb104ba15_JaffaCakes118

  • Size

    64KB

  • Sample

    240511-cfwrkshg35

  • MD5

    322886be2addf148c6bfd0bcb104ba15

  • SHA1

    8f09a5a3252caa7652443b134f1bcb6691f992a0

  • SHA256

    6d0e7d4cca4c9034489b13e09697e1f114ded712d96c06d5a8c4b4d4606ffa94

  • SHA512

    ad234e0397d51a73bba64fcdaf998c82d06be4345f1f610d4136702e9b3fbcc2738a88c4dade945afc97aa7232d580c338448435df32a7c4f7a80edd2368f36a

  • SSDEEP

    1536:IoRC9170vwHbQXZ5+qXDEuXi90dSW7V/DjObeFt6PuQ4Z2:PC917iwHbQXZ5+qXA594SWZ/XObeb6G7

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      322886be2addf148c6bfd0bcb104ba15_JaffaCakes118

    • Size

      64KB

    • MD5

      322886be2addf148c6bfd0bcb104ba15

    • SHA1

      8f09a5a3252caa7652443b134f1bcb6691f992a0

    • SHA256

      6d0e7d4cca4c9034489b13e09697e1f114ded712d96c06d5a8c4b4d4606ffa94

    • SHA512

      ad234e0397d51a73bba64fcdaf998c82d06be4345f1f610d4136702e9b3fbcc2738a88c4dade945afc97aa7232d580c338448435df32a7c4f7a80edd2368f36a

    • SSDEEP

      1536:IoRC9170vwHbQXZ5+qXDEuXi90dSW7V/DjObeFt6PuQ4Z2:PC917iwHbQXZ5+qXA594SWZ/XObeb6G7

    Score
    9/10
    • Contacts a large (20505) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks