General

  • Target

    Mozi.m

  • Size

    300KB

  • Sample

    210623-tapa9nkc9n

  • MD5

    19988cd0ad0712945a7afe5ff8a6b17e

  • SHA1

    256c46d0f7043eb2af61412a94df7171840517f8

  • SHA256

    dadaeba2a8def4b7471b8aca2fd51acf6ceabd5fd336184e95f40ca44b590dbd

  • SHA512

    5aca56777ba4c5fb9a8a4780fa71879b9f7ecd963b4f4b8c926b84530504363abf2e9b9ca8c693f4b65af039bbde37292f2d4dd5944dc033faa693bc438220a7

Score
9/10

Malware Config

Targets

    • Target

      Mozi.m

    • Size

      300KB

    • MD5

      19988cd0ad0712945a7afe5ff8a6b17e

    • SHA1

      256c46d0f7043eb2af61412a94df7171840517f8

    • SHA256

      dadaeba2a8def4b7471b8aca2fd51acf6ceabd5fd336184e95f40ca44b590dbd

    • SHA512

      5aca56777ba4c5fb9a8a4780fa71879b9f7ecd963b4f4b8c926b84530504363abf2e9b9ca8c693f4b65af039bbde37292f2d4dd5944dc033faa693bc438220a7

    Score
    9/10
    • Modifies the Watchdog daemon

      Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

    • Writes file to system bin folder

    • Modifies hosts file

      Adds to hosts file used for mapping hosts to IP addresses.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Reads system network configuration

      Uses contents of /proc filesystem to enumerate network settings.

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

    • Writes file to tmp directory

      Malware often drops required files in the /tmp directory.

MITRE ATT&CK Enterprise v6

Tasks