Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240729-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    10-01-2025 01:27

General

  • Target

    JaffaCakes118_d7596e4f7533eab504a8a81ca4d913e7

  • Size

    58KB

  • MD5

    d7596e4f7533eab504a8a81ca4d913e7

  • SHA1

    88ba8952e1ebe94a2119b50233b8f73660255ace

  • SHA256

    ef98f8e3f7a40f90b07512eb4207a8f132483918b92c4e64e5df214680dffac2

  • SHA512

    e65ff8e620f8a03529243f7b599817e314d5305bf3d0c12d50dadf3a5183def0ef6a6ac8b9bd380c540923caabff14c3be38891c1e9b1254a2445eb271b80f92

  • SSDEEP

    1536:ly2ZHTO1iwmkCG18p4V10cGSOkGirR9IM3/csZze/6:o2ZHTTUBrBQO0s0/6

Malware Config

Extracted

Family

mirai

Botnet

UNSTABLE

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Contacts a large (198126) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 2 IoCs
  • Changes its process name 1 IoCs
  • Reads runtime system information 15 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/JaffaCakes118_d7596e4f7533eab504a8a81ca4d913e7
    /tmp/JaffaCakes118_d7596e4f7533eab504a8a81ca4d913e7
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Changes its process name
    • Reads runtime system information
    PID:704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads