General
-
Target
fde529998c9208800c6d4090256e096c_JaffaCakes118
-
Size
133KB
-
Sample
240929-gayq7svapb
-
MD5
fde529998c9208800c6d4090256e096c
-
SHA1
881ab53bf67a25c86b7455f9cd3330ed825047e8
-
SHA256
470760a69440b7c05392d8264dadbe607a5c5c245597439d0d14fa79e3060567
-
SHA512
2cb5d2d92e66a9ade39b9bbbddd821099e5509416194f09a095ef6044a1cfa6c1e9b3e06d5db0a773b6a7441755da1fea7dc8c7a7a766ad79ed586bd594f6533
-
SSDEEP
3072:T4HuW35v1Kw/zi+PXbatLgD/YOfhHzNay0mxm29aboRm7leVhYwukpYQNb:T4vT/hfbap+/YExB0URm7leVhYwukpYG
Behavioral task
behavioral1
Sample
fde529998c9208800c6d4090256e096c_JaffaCakes118
Resource
ubuntu2204-amd64-20240522.1-en
Malware Config
Targets
-
-
Target
fde529998c9208800c6d4090256e096c_JaffaCakes118
-
Size
133KB
-
MD5
fde529998c9208800c6d4090256e096c
-
SHA1
881ab53bf67a25c86b7455f9cd3330ed825047e8
-
SHA256
470760a69440b7c05392d8264dadbe607a5c5c245597439d0d14fa79e3060567
-
SHA512
2cb5d2d92e66a9ade39b9bbbddd821099e5509416194f09a095ef6044a1cfa6c1e9b3e06d5db0a773b6a7441755da1fea7dc8c7a7a766ad79ed586bd594f6533
-
SSDEEP
3072:T4HuW35v1Kw/zi+PXbatLgD/YOfhHzNay0mxm29aboRm7leVhYwukpYQNb:T4vT/hfbap+/YExB0URm7leVhYwukpYG
Score9/10-
Contacts a large (15920) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-