Analysis
-
max time kernel
108s -
max time network
153s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
11-12-2024 00:17
Static task
static1
Behavioral task
behavioral1
Sample
df1ca2c26c02f24a5b0a0a34b7143083_JaffaCakes118
Resource
debian9-armhf-20240611-en
General
-
Target
df1ca2c26c02f24a5b0a0a34b7143083_JaffaCakes118
-
Size
61KB
-
MD5
df1ca2c26c02f24a5b0a0a34b7143083
-
SHA1
ec4a90a4007075e7b0298343a30d17cf86920d40
-
SHA256
e424ae440a0cc64ae441a935d9165ccc0d169d2cd4fb122e1573d8c7b447dc3c
-
SHA512
e6f0521bfa557b7a44b74fbda256e37cbda583921474a8d74e90761a60e5d5f51614b5c0929711bcf066e34aa82c24db9c3aeaafb4791051a16632c5fe92507c
-
SSDEEP
1536:YMrnXCpJ1e5KK/6gKpETwnGcbWwFNyhFokniy:YAWqr/R3UxWYyYy
Malware Config
Extracted
mirai
KYTON
Signatures
-
Mirai family
-
Contacts a large (106346) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog df1ca2c26c02f24a5b0a0a34b7143083_JaffaCakes118 File opened for modification /dev/misc/watchdog df1ca2c26c02f24a5b0a0a34b7143083_JaffaCakes118 -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp df1ca2c26c02f24a5b0a0a34b7143083_JaffaCakes118 -
Writes file to system bin folder 1 IoCs
description ioc Process File opened for modification /bin/watchdog df1ca2c26c02f24a5b0a0a34b7143083_JaffaCakes118 -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself Twcfc7VV7u5usc7m5gUc 647 df1ca2c26c02f24a5b0a0a34b7143083_JaffaCakes118 -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp df1ca2c26c02f24a5b0a0a34b7143083_JaffaCakes118 -
description ioc Process File opened for reading /proc/self/exe df1ca2c26c02f24a5b0a0a34b7143083_JaffaCakes118 File opened for reading /proc/651/exe df1ca2c26c02f24a5b0a0a34b7143083_JaffaCakes118
Processes
-
/tmp/df1ca2c26c02f24a5b0a0a34b7143083_JaffaCakes118/tmp/df1ca2c26c02f24a5b0a0a34b7143083_JaffaCakes1181⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:647