General

  • Target

    JaffaCakes118_a1e277fc184c403ddd42de0aa959979434d3e6464edd62b1d96a0d36d569b76b

  • Size

    30KB

  • Sample

    241224-qs6dfayldx

  • MD5

    f11f9171f6aef4708a7d8266bf78f11e

  • SHA1

    ff098ded5e145c88114dbe9ab267ee938efd2f6a

  • SHA256

    a1e277fc184c403ddd42de0aa959979434d3e6464edd62b1d96a0d36d569b76b

  • SHA512

    480d0899adb0f01d785eee483b4e0da767dceea6d1d186e0b57ef06b279f39501d520f3bbf7f8ef7c2e5dbac5988d62330292d436f1f98d2005ae168c714cdd9

  • SSDEEP

    768:SlYqxRHluDfw2ObYeNvEfkqEdhMaHv+SqQm87vCjbLXOo:6xxg8cfk70u+ILyLXOo

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Targets

    • Target

      693dc90a119eaa8f3cc5354b5d907739c41eeee91c8a2b51888527ce26c1de08.elf

    • Size

      77KB

    • MD5

      267f49f4b6f2f885169c534de4348b8c

    • SHA1

      020c03acdb619c6e0af37272dcc4c6f96a29802a

    • SHA256

      693dc90a119eaa8f3cc5354b5d907739c41eeee91c8a2b51888527ce26c1de08

    • SHA512

      a723cbf06bde712bbcfbb51525df551dcd1a0c3ed64c18dcb5f91129a9e3eb42861bb916593e6be867fd5ff266bbce8a9b9e73d444da9027e91eaf9162aef540

    • SSDEEP

      1536:G4Z8LUay6+vl/R1KIdysUmR9EiYHXw6tGxZKTDJjzETd:B6ry6+vdGIdysUKqGxZUDBzId

    • Contacts a large (23350) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Deletes itself

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks