Analysis

  • max time kernel
    152s
  • max time network
    163s
  • platform
    debian-12_mipsel
  • resource
    debian12-mipsel-20240221-en
  • resource tags

    arch:mipselimage:debian12-mipsel-20240221-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem
  • submitted
    08/12/2024, 16:58

General

  • Target

    d814a1dd2acc0ccbb2f8636681d6f1a4_JaffaCakes118

  • Size

    32KB

  • MD5

    d814a1dd2acc0ccbb2f8636681d6f1a4

  • SHA1

    04d9a8eacdd602b9ee3552bb030996cd040aceeb

  • SHA256

    03d81203018c2c61e0ed6806a66e17a58cad8e2403a9f7624e202e1ee3fd4663

  • SHA512

    49860e0b4bc8e563ddc97eaf430ee0abe5f0dd21af93ca64b1cbe2c81ccde37291490d55b8fe021d2fbb6bf9688328b1644a1f9a43e7ca08ff9852f878bc2e46

  • SSDEEP

    384:GatIUSvIisL8qvXPy2iYEwNXEu8+SbcHs1mijnxLaebQyXr4RSPY2enkYluI+iAt:FIUAsYaXP6yM5jJzn4qM1lKHcLmWRU

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Contacts a large (23509) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Reads runtime system information 27 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/d814a1dd2acc0ccbb2f8636681d6f1a4_JaffaCakes118
    /tmp/d814a1dd2acc0ccbb2f8636681d6f1a4_JaffaCakes118
    1⤵
    • Modifies Watchdog functionality
    • Reads runtime system information
    PID:741

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads