General

  • Target

    00c89470fb482e3b70e3acbf906ec116

  • Size

    87KB

  • Sample

    231219-19t2vahga5

  • MD5

    00c89470fb482e3b70e3acbf906ec116

  • SHA1

    ce60ac7448e9dec233857b31f6fd4f1bea22ffb3

  • SHA256

    be4c2c126c723f5b2fb8101b2e60da12dd15ab3905dc370b8eba1fd9df978977

  • SHA512

    6fa5754bace9bb8dcab6dcc7ce06d200003b2527287a7d39a8c80127f935ea9cc06c84105e6a1a4b9ee22a7061c20190f8565ef2812fe07db93d011d96a4105d

  • SSDEEP

    1536:1YRdsnDd6C6gb/ZVyDYjMbwqZ9b0vfwW9ufY1C+KBtyRirfXDOiOc3J:CHsnD8/gb/zyDv9b0HD9FC+KBtyR6/Dh

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      00c89470fb482e3b70e3acbf906ec116

    • Size

      87KB

    • MD5

      00c89470fb482e3b70e3acbf906ec116

    • SHA1

      ce60ac7448e9dec233857b31f6fd4f1bea22ffb3

    • SHA256

      be4c2c126c723f5b2fb8101b2e60da12dd15ab3905dc370b8eba1fd9df978977

    • SHA512

      6fa5754bace9bb8dcab6dcc7ce06d200003b2527287a7d39a8c80127f935ea9cc06c84105e6a1a4b9ee22a7061c20190f8565ef2812fe07db93d011d96a4105d

    • SSDEEP

      1536:1YRdsnDd6C6gb/ZVyDYjMbwqZ9b0vfwW9ufY1C+KBtyRirfXDOiOc3J:CHsnD8/gb/zyDv9b0HD9FC+KBtyR6/Dh

    Score
    9/10
    • Contacts a large (20039) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks