Analysis

  • max time kernel
    9s
  • max time network
    131s
  • platform
    ubuntu-24.04_amd64
  • resource
    ubuntu2404-amd64-20240523-en
  • resource tags

    arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system
  • submitted
    27-08-2024 10:35

General

  • Target

    c4d44eed4916675dd408ff0b3562fb1f_JaffaCakes118

  • Size

    184KB

  • MD5

    c4d44eed4916675dd408ff0b3562fb1f

  • SHA1

    57279a4f3ccd3f6abbc2c306682438234241598b

  • SHA256

    855557e415b485cedb9dc2c6f96d524143108aff2f84497528a8fcddf2dc86a2

  • SHA512

    6baaf6f86560da77fb2b73244db8d0dca9acffb808c3be70ea59b5b581ee4bbc20a5267aa4d3bddefa6e4cf81db5a5c479bb2f2a36db9f9f94d5489615b34401

  • SSDEEP

    3072:sxaa59s173XRtl2eymb9Nsb4nWpBqjvxThmKmgPmLJLm/PhnFkw1Y5:so71734eymb9qb4nWHuSmHhnF7Y5

Score
10/10

Malware Config

Signatures

  • Detects Kaiten/Tsunami Payload 1 IoCs
  • Detects Kaiten/Tsunami payload 1 IoCs
  • Kaiten/Tsunami

    Linux-based IoT botnet which is controlled through IRC and normally used to carry out DDoS attacks.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/c4d44eed4916675dd408ff0b3562fb1f_JaffaCakes118
    /tmp/c4d44eed4916675dd408ff0b3562fb1f_JaffaCakes118
    1⤵
    • Reads runtime system information
    • Writes file to tmp directory
    PID:2476

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads