General

  • Target

    58815be903baf6b0ce062f1c48f67eb9_JaffaCakes118

  • Size

    64KB

  • Sample

    240519-ewtm9sab82

  • MD5

    58815be903baf6b0ce062f1c48f67eb9

  • SHA1

    9ccd4f311ba515aaf37f91c9402e104bf57da4ae

  • SHA256

    18623f3d8267e5308370bf0b018bd3acf65e7faf563c6797aaffa3d88d012f00

  • SHA512

    5312615d12fcab7e785778587f8366908b702fbe137c7e2cc6003c86449c114ea89f8ff0e7faa64572dba7d472eb53e47d3fc2b4fd72310aeb452de9d062af0c

  • SSDEEP

    1536:IoRC9170vwHbQXZ5+qXDEuX690dSW7V/DjObeFt6PuQ4ZF:PC917iwHbQXZ5+qXAd94SWZ/XObeb6G7

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      58815be903baf6b0ce062f1c48f67eb9_JaffaCakes118

    • Size

      64KB

    • MD5

      58815be903baf6b0ce062f1c48f67eb9

    • SHA1

      9ccd4f311ba515aaf37f91c9402e104bf57da4ae

    • SHA256

      18623f3d8267e5308370bf0b018bd3acf65e7faf563c6797aaffa3d88d012f00

    • SHA512

      5312615d12fcab7e785778587f8366908b702fbe137c7e2cc6003c86449c114ea89f8ff0e7faa64572dba7d472eb53e47d3fc2b4fd72310aeb452de9d062af0c

    • SSDEEP

      1536:IoRC9170vwHbQXZ5+qXDEuX690dSW7V/DjObeFt6PuQ4ZF:PC917iwHbQXZ5+qXAd94SWZ/XObeb6G7

    Score
    9/10
    • Contacts a large (20694) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks