Analysis

  • max time kernel
    14s
  • max time network
    19s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240611-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    11-12-2024 06:43

General

  • Target

    e04b14b5a824043ce8e1fd9ef4f7de3e_JaffaCakes118

  • Size

    29KB

  • MD5

    e04b14b5a824043ce8e1fd9ef4f7de3e

  • SHA1

    1de4094762f2e20ca0c165de6140511b992fdefd

  • SHA256

    cf08c26bc68462ebbefe453bd2cda333e2378b2f4c465acac9b0a5b88bce2f97

  • SHA512

    84cd8eb7b4ed45509c117ea904bb199462a295c80f016725b0e3c485a6298b2d1487703eda7e1e79477a43a25f60d4d4719574f8aa71f4eabb84654491f3c2aa

  • SSDEEP

    768:eHbKO/gkgnb5i/n1EbuA8+4iejlMPnnJOrZGKyXMsOIroNJgGlzDpbuR1Jf:POjgnb5i/nqbudwnJcQcsMnVJul

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Contacts a large (1640) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 32 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/e04b14b5a824043ce8e1fd9ef4f7de3e_JaffaCakes118
    /tmp/e04b14b5a824043ce8e1fd9ef4f7de3e_JaffaCakes118
    1⤵
    • Modifies Watchdog functionality
    • Enumerates active TCP sockets
    • Reads system network configuration
    • Reads runtime system information
    PID:692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads