General

  • Target

    1848edff393fc08766861c05d2f9ab23_JaffaCakes118

  • Size

    64KB

  • Sample

    240628-btdx9atcmd

  • MD5

    1848edff393fc08766861c05d2f9ab23

  • SHA1

    9c85ddf716868cf0db3bc63a891b8aced2a48125

  • SHA256

    7d8e529c1e4f5baff8aa42a40fc088411006ae81c4d75ed60ddfc16cf5b1166e

  • SHA512

    b44cb6bda363490f2481d0dd819cc0302c5eb340c998a1713a0092ac62396c3499545b28aa3874f6dbaa9f1d90995b4b7ab45998f310bc61e351d43b5424960e

  • SSDEEP

    1536:+rl46QWtBrYQPNseLL337hiloH6WSWuX/MMOCs2qg6U4e:G46QWtBrYQPNsef9im/SWs/dOC3qR9e

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      1848edff393fc08766861c05d2f9ab23_JaffaCakes118

    • Size

      64KB

    • MD5

      1848edff393fc08766861c05d2f9ab23

    • SHA1

      9c85ddf716868cf0db3bc63a891b8aced2a48125

    • SHA256

      7d8e529c1e4f5baff8aa42a40fc088411006ae81c4d75ed60ddfc16cf5b1166e

    • SHA512

      b44cb6bda363490f2481d0dd819cc0302c5eb340c998a1713a0092ac62396c3499545b28aa3874f6dbaa9f1d90995b4b7ab45998f310bc61e351d43b5424960e

    • SSDEEP

      1536:+rl46QWtBrYQPNseLL337hiloH6WSWuX/MMOCs2qg6U4e:G46QWtBrYQPNsef9im/SWs/dOC3qR9e

    Score
    9/10
    • Contacts a large (20307) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks