General

  • Target

    dbd9855f4f836b8cf6912e58591c0a1f_JaffaCakes118

  • Size

    40KB

  • Sample

    241209-2fxfjstngw

  • MD5

    dbd9855f4f836b8cf6912e58591c0a1f

  • SHA1

    17c3f4ac0cb897833828847618b47b9dc9ee394c

  • SHA256

    7574957d7875b1ff3fa42df03bcf2c8d0d6ef1a8788626e96583e5f75860123a

  • SHA512

    9f377b0bbec758bd9918c1e1188a3927fd78193129943f3825eecc553d294b797f2f3c0d5ddb8b3a1e45d765ba18b17e4a47bc83f444e734ad4ce6a98f729f81

  • SSDEEP

    768:XNj6FUjiQQp4jhH4xcPPqBYSoDwKiWi+dwbwuw9ptVL48VqWRB:wA0p+qB2DBi8dowuKptlfVj

Malware Config

Extracted

Family

mirai

Botnet

KYTON

Targets

    • Target

      dbd9855f4f836b8cf6912e58591c0a1f_JaffaCakes118

    • Size

      40KB

    • MD5

      dbd9855f4f836b8cf6912e58591c0a1f

    • SHA1

      17c3f4ac0cb897833828847618b47b9dc9ee394c

    • SHA256

      7574957d7875b1ff3fa42df03bcf2c8d0d6ef1a8788626e96583e5f75860123a

    • SHA512

      9f377b0bbec758bd9918c1e1188a3927fd78193129943f3825eecc553d294b797f2f3c0d5ddb8b3a1e45d765ba18b17e4a47bc83f444e734ad4ce6a98f729f81

    • SSDEEP

      768:XNj6FUjiQQp4jhH4xcPPqBYSoDwKiWi+dwbwuw9ptVL48VqWRB:wA0p+qB2DBi8dowuKptlfVj

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • Contacts a large (62295) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks