General

  • Target

    eadc0404e64837d4032c279262029b93_JaffaCakes118

  • Size

    40KB

  • Sample

    240919-jdylqaxfqr

  • MD5

    eadc0404e64837d4032c279262029b93

  • SHA1

    669a5909c76140b3dc4ec8a096b5d127c3cdfe74

  • SHA256

    ba7b429944aaf4c35603590eaef634ad4dc6d2a76903da8893482857d51e703a

  • SHA512

    71bb01340e14a4de6484ae183234b4f256189cd98a6fe3ce8ade11e0bfa6a52610cd81f9e0ef468ab72087263960918854b6caefc7940690d3493016e55bc3c5

  • SSDEEP

    768:H3oosBcSbp479TceWTUqv4LshKqriRxiJVayhkGxeWRW:4oq6xcdUqQYhHriRzSx0

Malware Config

Extracted

Family

mirai

Botnet

KYTON

Targets

    • Target

      eadc0404e64837d4032c279262029b93_JaffaCakes118

    • Size

      40KB

    • MD5

      eadc0404e64837d4032c279262029b93

    • SHA1

      669a5909c76140b3dc4ec8a096b5d127c3cdfe74

    • SHA256

      ba7b429944aaf4c35603590eaef634ad4dc6d2a76903da8893482857d51e703a

    • SHA512

      71bb01340e14a4de6484ae183234b4f256189cd98a6fe3ce8ade11e0bfa6a52610cd81f9e0ef468ab72087263960918854b6caefc7940690d3493016e55bc3c5

    • SSDEEP

      768:H3oosBcSbp479TceWTUqv4LshKqriRxiJVayhkGxeWRW:4oq6xcdUqQYhHriRzSx0

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Contacts a large (111537) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks