Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20240611-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    19/09/2024, 07:33

General

  • Target

    eadc0404e64837d4032c279262029b93_JaffaCakes118

  • Size

    40KB

  • MD5

    eadc0404e64837d4032c279262029b93

  • SHA1

    669a5909c76140b3dc4ec8a096b5d127c3cdfe74

  • SHA256

    ba7b429944aaf4c35603590eaef634ad4dc6d2a76903da8893482857d51e703a

  • SHA512

    71bb01340e14a4de6484ae183234b4f256189cd98a6fe3ce8ade11e0bfa6a52610cd81f9e0ef468ab72087263960918854b6caefc7940690d3493016e55bc3c5

  • SSDEEP

    768:H3oosBcSbp479TceWTUqv4LshKqriRxiJVayhkGxeWRW:4oq6xcdUqQYhHriRzSx0

Malware Config

Extracted

Family

mirai

Botnet

KYTON

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Contacts a large (111537) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Writes file to system bin folder 1 IoCs
  • Changes its process name 1 IoCs
  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 2 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/eadc0404e64837d4032c279262029b93_JaffaCakes118
    /tmp/eadc0404e64837d4032c279262029b93_JaffaCakes118
    1⤵
    • Modifies Watchdog functionality
    • Enumerates active TCP sockets
    • Writes file to system bin folder
    • Changes its process name
    • Reads system network configuration
    • Reads runtime system information
    PID:707

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads