General

  • Target

    2b404255f46cc50edb66b11d3c559636_JaffaCakes118

  • Size

    57KB

  • Sample

    240728-3ltsaa1epn

  • MD5

    2b404255f46cc50edb66b11d3c559636

  • SHA1

    149d024cd07e346b9bc983153ccd544997efa77a

  • SHA256

    594a4bc0f819e60976e43139ae1f09259a87c5c014e1bfde62efabe34997beb7

  • SHA512

    6ff44170d0b610d3ffa2b8c61b2cc70b68b856b1d8b065e77299c49e8e0f6d6cb9b06a37325332b8c330ff7405bbc5ebd64824b67018b4247f3ef16e16c05047

  • SSDEEP

    1536:/oo48wXR5lvyN76/KTRAjDSzEhVcuqqBW:AopwXR55+6STzsV7vBW

Malware Config

Targets

    • Target

      2b404255f46cc50edb66b11d3c559636_JaffaCakes118

    • Size

      57KB

    • MD5

      2b404255f46cc50edb66b11d3c559636

    • SHA1

      149d024cd07e346b9bc983153ccd544997efa77a

    • SHA256

      594a4bc0f819e60976e43139ae1f09259a87c5c014e1bfde62efabe34997beb7

    • SHA512

      6ff44170d0b610d3ffa2b8c61b2cc70b68b856b1d8b065e77299c49e8e0f6d6cb9b06a37325332b8c330ff7405bbc5ebd64824b67018b4247f3ef16e16c05047

    • SSDEEP

      1536:/oo48wXR5lvyN76/KTRAjDSzEhVcuqqBW:AopwXR55+6STzsV7vBW

    • Detects Kaiten/Tsunami Payload

    • Kaiten/Tsunami

      Linux-based IoT botnet which is controlled through IRC and normally used to carry out DDoS attacks.

    • Writes DNS configuration

      Writes data to DNS resolver config file.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks