General

  • Target

    4eeaf33672a5849e6991c647bae4f1c4_JaffaCakes118

  • Size

    64KB

  • Sample

    240517-hvkkraeg4t

  • MD5

    4eeaf33672a5849e6991c647bae4f1c4

  • SHA1

    88acbf894afeab4b326718301c31dc7dac85b665

  • SHA256

    6ace71de6d5e33bb39ac139e614ced1e1ac07ac4829b83ad2816d100f5c9ee2a

  • SHA512

    20095ffe861ef159688b0ad3ba844d489648b81814f90946418540a9b48cd084d5394aa876eb30e355ec488a3af5f16345d5a6c9740b9989a90667d0cd3300fe

  • SSDEEP

    1536:ogjZ5ba9Whfk4joX426AwJ76rnQ8fyPNHT0caF1gp7Gs:ogjZ5ba9Whfk4joo26J7anQFT1a8pqs

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      4eeaf33672a5849e6991c647bae4f1c4_JaffaCakes118

    • Size

      64KB

    • MD5

      4eeaf33672a5849e6991c647bae4f1c4

    • SHA1

      88acbf894afeab4b326718301c31dc7dac85b665

    • SHA256

      6ace71de6d5e33bb39ac139e614ced1e1ac07ac4829b83ad2816d100f5c9ee2a

    • SHA512

      20095ffe861ef159688b0ad3ba844d489648b81814f90946418540a9b48cd084d5394aa876eb30e355ec488a3af5f16345d5a6c9740b9989a90667d0cd3300fe

    • SSDEEP

      1536:ogjZ5ba9Whfk4joX426AwJ76rnQ8fyPNHT0caF1gp7Gs:ogjZ5ba9Whfk4joo26J7anQFT1a8pqs

    Score
    9/10
    • Contacts a large (10287) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks