Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    25/09/2024, 20:09

General

  • Target

    f6c640dd9430eaffacae969ccb07a6a1_JaffaCakes118

  • Size

    53KB

  • MD5

    f6c640dd9430eaffacae969ccb07a6a1

  • SHA1

    5236434d599826d7bb3a3487200da5c5a5ab64ab

  • SHA256

    72e7c3aa4ea6e17a2f45fc0bbf017a877212fee88e8e2c458df0b467cbe5a110

  • SHA512

    80622c0d1523d37583adc4f1c7f834c589fe4845c9c0d7d8cd5ee5615c45692849d473ddc24fec8ac5ed953feb1b58f5a99d95aeabe516d17b1f1e4257105ae6

  • SSDEEP

    768:kZWXW7tNxumJGxaS94MFuQa8lsKGZAkCpA2gi9mq3UIWQOyssK9uETYT+I:MWX8NxnQ1P+8uK2Cvt2yssPT+I

Malware Config

Extracted

Family

mirai

Botnet

WICKED

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/f6c640dd9430eaffacae969ccb07a6a1_JaffaCakes118
    /tmp/f6c640dd9430eaffacae969ccb07a6a1_JaffaCakes118
    1⤵
    • Reads runtime system information
    PID:639

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads