Analysis

  • max time kernel
    0s
  • max time network
    157s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240221-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    10/12/2024, 08:45

General

  • Target

    ddef3719ad5cbf493a4342f1f06fc379_JaffaCakes118

  • Size

    30KB

  • MD5

    ddef3719ad5cbf493a4342f1f06fc379

  • SHA1

    10590b15dd0f22723b4031c127981450f1b7c37b

  • SHA256

    6a3794285a323a3a8b635df36220ac90ab69b0e390da5cd739bfdb98eb3bc5ad

  • SHA512

    e7074971dcc8c0750417df896cd7c41215b6cb18abfbec1899e875de50157770201c2d060c522a42e8e4b273093d3b18390e6c610399fa9e41c5499f9f772cc8

  • SSDEEP

    768:GF3xwD4ZsDHoiFrAk0By68vKCsSvNE9q3UELEQ:GFnEHtrr68vKfqtL5

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/ddef3719ad5cbf493a4342f1f06fc379_JaffaCakes118
    /tmp/ddef3719ad5cbf493a4342f1f06fc379_JaffaCakes118
    1⤵
    • Reads runtime system information
    PID:713

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads