General

  • Target

    ea9c53eab41df86268fa09749f25a24b_JaffaCakes118

  • Size

    85KB

  • Sample

    240919-fdjk1s1gkg

  • MD5

    ea9c53eab41df86268fa09749f25a24b

  • SHA1

    bfb6d1c00286e3261510384b001a18f3611a7983

  • SHA256

    3c9ddd9e172aeb8a4d4086006ae1f637f67e02c745b40f245c8d7ccfc499a1c1

  • SHA512

    49bbd65031d255d90062b83644fc52d081632ef30bc3e01328f2e4ad1f460e42c6f6a29157c53538dae25aaaa5df928edabd813d5a8118ef07d198c9ab1152da

  • SSDEEP

    1536:s+QkP+p0Y3i1JwYf+6QPcuDJHSQf2rvK21:dQK+gyC82

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Targets

    • Target

      ea9c53eab41df86268fa09749f25a24b_JaffaCakes118

    • Size

      85KB

    • MD5

      ea9c53eab41df86268fa09749f25a24b

    • SHA1

      bfb6d1c00286e3261510384b001a18f3611a7983

    • SHA256

      3c9ddd9e172aeb8a4d4086006ae1f637f67e02c745b40f245c8d7ccfc499a1c1

    • SHA512

      49bbd65031d255d90062b83644fc52d081632ef30bc3e01328f2e4ad1f460e42c6f6a29157c53538dae25aaaa5df928edabd813d5a8118ef07d198c9ab1152da

    • SSDEEP

      1536:s+QkP+p0Y3i1JwYf+6QPcuDJHSQf2rvK21:dQK+gyC82

    • Contacts a large (20180) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks