General

  • Target

    Mozi.m

  • Size

    300KB

  • Sample

    210728-62eeegql1e

  • MD5

    114215eac737e49db77449bad9aa988d

  • SHA1

    e6da3f80bcb263bea8c904a0f67b25f8e77ef1de

  • SHA256

    8b1904ad6bd0696c10eed52ecc6dd8f3c1603c668768490a6dacddcc934ec6b0

  • SHA512

    0cfacbd0cf18123825935bfab98a8ab0f17c69a3c81757378b21df12e8a691247a96113da203e09e901beac010992af2a6336715afa7a5eaf02ed3fdff1da06e

Score
9/10

Malware Config

Targets

    • Target

      Mozi.m

    • Size

      300KB

    • MD5

      114215eac737e49db77449bad9aa988d

    • SHA1

      e6da3f80bcb263bea8c904a0f67b25f8e77ef1de

    • SHA256

      8b1904ad6bd0696c10eed52ecc6dd8f3c1603c668768490a6dacddcc934ec6b0

    • SHA512

      0cfacbd0cf18123825935bfab98a8ab0f17c69a3c81757378b21df12e8a691247a96113da203e09e901beac010992af2a6336715afa7a5eaf02ed3fdff1da06e

    Score
    9/10
    • Modifies the Watchdog daemon

      Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

    • Writes file to system bin folder

    • Modifies hosts file

      Adds to hosts file used for mapping hosts to IP addresses.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Reads system network configuration

      Uses contents of /proc filesystem to enumerate network settings.

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

    • Writes file to tmp directory

      Malware often drops required files in the /tmp directory.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Discovery

System Network Connections Discovery

1
T1049

System Network Configuration Discovery

2
T1016

Tasks