General

  • Target

    36710x000080000x00026460memory_JC.dmp

  • Size

    76KB

  • Sample

    230901-s35k1aff3v

  • MD5

    8bc0f7717434f0634554c0d276302ef7

  • SHA1

    9ee7acedb13cf5fe76b9d6c5fef346af9648651c

  • SHA256

    0f8070e806278f339f2bfe6b9f555181d1718c85ef292825f604327ac6142277

  • SHA512

    168429ef529e93fe89dae259c2b85df1331a8898bcd1d94a55314da70b7b6b76e2ccdb9ffd0bbbef1158181a920d1ab07ce210eb1f33b28de19731f825d03e25

  • SSDEEP

    1536:O0n09sBw8wu66UyKe8RK1IPL7vrQ/yRSxscBqlIull42piLGIvdWKE0:K8wxuQyBKaeWyRSxscBqPmGIvdWD0

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      36710x000080000x00026460memory_JC.dmp

    • Size

      76KB

    • MD5

      8bc0f7717434f0634554c0d276302ef7

    • SHA1

      9ee7acedb13cf5fe76b9d6c5fef346af9648651c

    • SHA256

      0f8070e806278f339f2bfe6b9f555181d1718c85ef292825f604327ac6142277

    • SHA512

      168429ef529e93fe89dae259c2b85df1331a8898bcd1d94a55314da70b7b6b76e2ccdb9ffd0bbbef1158181a920d1ab07ce210eb1f33b28de19731f825d03e25

    • SSDEEP

      1536:O0n09sBw8wu66UyKe8RK1IPL7vrQ/yRSxscBqlIull42piLGIvdWKE0:K8wxuQyBKaeWyRSxscBqPmGIvdWD0

    Score
    7/10
    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks