Analysis

  • max time kernel
    0s
  • max time network
    139s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240221-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    08/12/2024, 04:36

General

  • Target

    d5443b570b673592c84ac222001bddbb_JaffaCakes118

  • Size

    50KB

  • MD5

    d5443b570b673592c84ac222001bddbb

  • SHA1

    1afe1c088559cb2a7eae00b3045dc5c6b2b1566b

  • SHA256

    aeb26990123e071ba64d663332215235f3fc80e954e9094624fa1aea6a41ea05

  • SHA512

    7c9a7d1f27d1068cbd9b12c6dd2b484c04bbb1b9b454ec0f658616632281d8eb3c31856c3297e68a51f6a856cfe4f286e5f94d7154fe7ef6a5072d2e0b241c97

  • SSDEEP

    1536:vHbD8FSEtJr32vS5z8BM9KvsYbQQW/7+caHMfs:v7MJr3oSBSb/W6cGSs

Malware Config

Extracted

Family

mirai

Botnet

APEP

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/d5443b570b673592c84ac222001bddbb_JaffaCakes118
    /tmp/d5443b570b673592c84ac222001bddbb_JaffaCakes118
    1⤵
    • Reads runtime system information
    PID:708

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads