Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    29-09-2024 00:05

General

  • Target

    fd69fde034b317ddfbc7b65e1f53d129_JaffaCakes118

  • Size

    41KB

  • MD5

    fd69fde034b317ddfbc7b65e1f53d129

  • SHA1

    aa36c71960ef0914dc47713e4dbf16e17c0e0472

  • SHA256

    ce4becd0693e0bb9a75ed2f313d183ef57c0cd66010d17ed40b0e811dc36e236

  • SHA512

    0ed12cc24c00b74580baba1c6b2b3020c3e08915b1a5c6ef4ab8b924b14dade4078643c0ae7161b989ad22a8dbdc7d643115da35ef869206919bdbde2e3e9026

  • SSDEEP

    768:j2jtXth32sbgUThxIJSace9zlse7p8mGGWjlqcASbFpOAK/x9q3UELrb:6jtXtxb5hzGlB7ojlZflLX

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/fd69fde034b317ddfbc7b65e1f53d129_JaffaCakes118
    /tmp/fd69fde034b317ddfbc7b65e1f53d129_JaffaCakes118
    1⤵
    • Reads runtime system information
    PID:656

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/656-1-0x00008000-0x00034e10-memory.dmp