Analysis
-
max time kernel
149s -
max time network
162s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
10-12-2024 05:23
General
-
Target
dd323ee36dd29687b4322d377679ce90_JaffaCakes118
-
Size
27KB
-
MD5
dd323ee36dd29687b4322d377679ce90
-
SHA1
c07dbf079dbac50720abcd7214a7c8b32318f318
-
SHA256
9aa8b17b5885709d959b1d7cfccbd474a4fd374672e9ec99cb551df6b1faf072
-
SHA512
3500676d30f1f9b4a080abc80a4bdd888de9704172dab02f5ee325e17367dbb01f3d69947d8225b758c582abc1ee81f617b410718c40abcda1562ac0279aaaee
-
SSDEEP
768:4Zhh6UaU0EtKqek0HO9OaFDme1oGADi4s3Uozh6:UaU71wq5DqNutzc
Malware Config
Extracted
Family
mirai
Botnet
UNST
Signatures
-
Mirai family
-
Contacts a large (20674) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
description ioc Process File opened for reading /proc/self/exe dd323ee36dd29687b4322d377679ce90_JaffaCakes118