General

  • Target

    f67f7b428f2117749a88d9c0b6462f15_JaffaCakes118

  • Size

    44KB

  • Sample

    240925-vymkqsxdpr

  • MD5

    f67f7b428f2117749a88d9c0b6462f15

  • SHA1

    5ea6eb5aae9eefd5a01d9724b234d00356ab3edd

  • SHA256

    beac07a00ef63b96df33cfa31fb4d8b14ff3f491a92673145b5db23177ab4232

  • SHA512

    4b2f54c023d634e06ceff42a69131830bc08dd3f22f14f821c25ab12d2e5f4e11a06425ef4457dfcacc8405ffe04949b3402e2071b9241f31445a0092b255eba

  • SSDEEP

    768:bXDsWu5wcNVmvgM+0tTA8H16ZYcWWKdqtJ2RkTec8zpp:bXERNVmvgM+0tky1mYWsqtJ2RkKc8

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Targets

    • Target

      f67f7b428f2117749a88d9c0b6462f15_JaffaCakes118

    • Size

      44KB

    • MD5

      f67f7b428f2117749a88d9c0b6462f15

    • SHA1

      5ea6eb5aae9eefd5a01d9724b234d00356ab3edd

    • SHA256

      beac07a00ef63b96df33cfa31fb4d8b14ff3f491a92673145b5db23177ab4232

    • SHA512

      4b2f54c023d634e06ceff42a69131830bc08dd3f22f14f821c25ab12d2e5f4e11a06425ef4457dfcacc8405ffe04949b3402e2071b9241f31445a0092b255eba

    • SSDEEP

      768:bXDsWu5wcNVmvgM+0tTA8H16ZYcWWKdqtJ2RkTec8zpp:bXERNVmvgM+0tky1mYWsqtJ2RkKc8

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks