Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    19-12-2024 05:58

General

  • Target

    feb8225e9015404d94407db797a3857c_JaffaCakes118

  • Size

    34KB

  • MD5

    feb8225e9015404d94407db797a3857c

  • SHA1

    0425d8f470d71066638014db5beed07434161724

  • SHA256

    bb20f13dd244340eb08ce0e969b9bd2d3f7dba331e738d4cd0ff3477eed0db86

  • SHA512

    1be71fbf28c6ccf9a34d7e6b2d5e4beddcca861cb634522c1a4a3f79c5c58806b6e212d7547547cb044d2f0f148f6569eaf50f0e84b8878d2ea2c9ba3ca773ac

  • SSDEEP

    768:ylFPucHNZKTrIBQiMDCpDZvft9tq3UIo3:ylJTtZNNMDGDZ+o

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/feb8225e9015404d94407db797a3857c_JaffaCakes118
    /tmp/feb8225e9015404d94407db797a3857c_JaffaCakes118
    1⤵
    • Reads runtime system information
    PID:659

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads