General

  • Target

    b720ec91e848d30018a293a31146e667.bin

  • Size

    22KB

  • Sample

    230502-cgffzsbc3t

  • MD5

    a425bdb3f519370d74b0a718394aab35

  • SHA1

    b5b26db55a6ebf0eb3a7a1d3172c99f94def74da

  • SHA256

    8f94d9a81c56223723bfed64ae06b42182323b6bfa36a5f35c08af42ea85282d

  • SHA512

    09f7c36ee93ed00c3a4240314dc932a2d57e56e30c833e4778445bd28fab5ef77ce8b8a00af61104693b8a8bba8669736f5e488239d07c2a31e2f8b3974b7af9

  • SSDEEP

    384:tdRHSo4yBcEDZj94x9i4IelAjqGSMVG3T3pd+4cTZ4flJn5N4FuHBoPAO8iABCUG:PRyo4yp54x/NlAWhMV0T3pltZUFO/NBI

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      f72dfa341e1a506fc65f3d54ed468f0936821b3ced96b939e4dfa70e72a0b5b0.elf

    • Size

      22KB

    • MD5

      b720ec91e848d30018a293a31146e667

    • SHA1

      a5a1ecbfad63853864cf7dce070a23c63c9a35aa

    • SHA256

      f72dfa341e1a506fc65f3d54ed468f0936821b3ced96b939e4dfa70e72a0b5b0

    • SHA512

      c928a54af1a1f8be5c55869b90a14718326900219c4453ce286fec566d4f2183ab84e178bbaf44fa9266a2ba558996dc2d328ce38ba150bfad1775713affda72

    • SSDEEP

      384:pDYC95A2rM7RjFrvX2V6H2XJ8LaHYsbX1chiM4HhBJhpExUC03uhHB3QJmRxkmcX:pDZ5Dw7RjFjcU+O24sDS4HhrhpEguX34

    Score
    10/10
    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Modifies the Watchdog daemon

      Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

    • Writes file to system bin folder

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Tasks