General

  • Target

    xd.arm7.elf

  • Size

    52KB

  • Sample

    231002-nz5z5shh6v

  • MD5

    fabc720108a88836b1c89fceba5f8bd5

  • SHA1

    723150e31d1828a05631dec2567fb62534a67a40

  • SHA256

    170e7226c064bd77b2582c20bac31cb4ae964d5ec23b54165401a3ab0551408b

  • SHA512

    5698ea6cbd5176246ae17e985323458128dbea733a258eabbed5b8c7ff07df3421b6c3013f460c997a18d5f141abf41139e9ecc0da52dc54aec3ec62995ee4ca

  • SSDEEP

    768:BMte5B4PACtw/YcmRIe18D9q63TxZQbSORe7Su2QJnKE79TLrN9q3UELbOs8qMLw:BM84ISRX63dZQbS5rzZgLIVmWjI

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      xd.arm7.elf

    • Size

      52KB

    • MD5

      fabc720108a88836b1c89fceba5f8bd5

    • SHA1

      723150e31d1828a05631dec2567fb62534a67a40

    • SHA256

      170e7226c064bd77b2582c20bac31cb4ae964d5ec23b54165401a3ab0551408b

    • SHA512

      5698ea6cbd5176246ae17e985323458128dbea733a258eabbed5b8c7ff07df3421b6c3013f460c997a18d5f141abf41139e9ecc0da52dc54aec3ec62995ee4ca

    • SSDEEP

      768:BMte5B4PACtw/YcmRIe18D9q63TxZQbSORe7Su2QJnKE79TLrN9q3UELbOs8qMLw:BM84ISRX63dZQbS5rzZgLIVmWjI

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Contacts a large (18255) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks