Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    11/08/2024, 06:44

General

  • Target

    8962678b7aa0968fd18a222d0d6d1486_JaffaCakes118

  • Size

    58KB

  • MD5

    8962678b7aa0968fd18a222d0d6d1486

  • SHA1

    a7d895da04a71c160a606433e521de61576e7489

  • SHA256

    e1427f41117e0dac3d6c36a431caa1ce9ec443419ed29d75c32879ee7c81b586

  • SHA512

    b57467a59f84a8333b8ff059be1673bcf8fac66f437616fd6625e8a18d205d7e5e21a887c4a344521d43d48a5b42f587ed3541c51bf30ab91c9826a173118028

  • SSDEEP

    1536:+FrjUAZFEm+BbBT0YBMNMbZB0j51bzyel+nVXQcBlpe4:wMkEm+Bdm7vyeaX9BHP

Score
10/10

Malware Config

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/8962678b7aa0968fd18a222d0d6d1486_JaffaCakes118
    /tmp/8962678b7aa0968fd18a222d0d6d1486_JaffaCakes118
    1⤵
    • Reads runtime system information
    PID:657

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads