Analysis

  • max time kernel
    0s
  • max time network
    158s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240221-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    18-12-2024 05:19

General

  • Target

    fa4215305594fc3e7938ddcdc4f0d706_JaffaCakes118

  • Size

    32KB

  • MD5

    fa4215305594fc3e7938ddcdc4f0d706

  • SHA1

    e6cfc8919731c75982423c122b97d502da036e52

  • SHA256

    cca08f35f8242e31bff5fb1642984cac8d81b4bc9ec821e52f37cf6ac4f1974c

  • SHA512

    01dd75f0c516ffcb04d82bb9b2642e373264408e1d09ec6202a1182b32a1552e58cec4fd9de4ad05e2a31fa448a450913633ed1b8ac832dc7949ead466235caf

  • SSDEEP

    768:rXUXJ+rcqP1hQloVSQ+hFdigBrYLY39K6yq3UID3:gXNIhQOYd+cthL

Malware Config

Extracted

Family

mirai

Botnet

UNSTABLE

C2

cnc.casualaffinity.net

scan.casualaffinity.net

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/fa4215305594fc3e7938ddcdc4f0d706_JaffaCakes118
    /tmp/fa4215305594fc3e7938ddcdc4f0d706_JaffaCakes118
    1⤵
    • Reads runtime system information
    PID:710

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads