General

  • Target

    f4ac166ab3b83dfb05acb44a00978ea6_JaffaCakes118

  • Size

    30KB

  • Sample

    241215-s7sf8symdy

  • MD5

    f4ac166ab3b83dfb05acb44a00978ea6

  • SHA1

    f35bad3e72abf1a3077171d13b676b2f2d7e5e5d

  • SHA256

    9aaba08a566dffe2923e9e5037baab65dc24f9bda8ee6e4ce03ce09418a66a4b

  • SHA512

    243043434be05b09b4e8a53fb8d8330b6e8178dc5e94f73c1560c1d3367e5279142d65552b32994334f286a6d3abe960b1f747a1c22e04782b5e8557e4049201

  • SSDEEP

    768:4IyvYLznDEB2iC+sD6PGL29pVhMJ8yoj63XjJgGlzDpbuR1JX:43YnnDEBI+siJpEJtV5VJu5

Malware Config

Extracted

Family

mirai

Botnet

UNST

Targets

    • Target

      f4ac166ab3b83dfb05acb44a00978ea6_JaffaCakes118

    • Size

      30KB

    • MD5

      f4ac166ab3b83dfb05acb44a00978ea6

    • SHA1

      f35bad3e72abf1a3077171d13b676b2f2d7e5e5d

    • SHA256

      9aaba08a566dffe2923e9e5037baab65dc24f9bda8ee6e4ce03ce09418a66a4b

    • SHA512

      243043434be05b09b4e8a53fb8d8330b6e8178dc5e94f73c1560c1d3367e5279142d65552b32994334f286a6d3abe960b1f747a1c22e04782b5e8557e4049201

    • SSDEEP

      768:4IyvYLznDEB2iC+sD6PGL29pVhMJ8yoj63XjJgGlzDpbuR1JX:43YnnDEBI+siJpEJtV5VJu5

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • Contacts a large (20252) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks