General

  • Target

    4fbffd3d2f320ef03860b4359d44bffa

  • Size

    85KB

  • Sample

    231219-27bcdsegd8

  • MD5

    4fbffd3d2f320ef03860b4359d44bffa

  • SHA1

    5b16283375d84dbcaa96c962e6befb7bc7c34c45

  • SHA256

    9c797b9be91f344647a255c949dcdf80ab08b8b80510e23d1ef3eb78e8a4361e

  • SHA512

    f7b5f62e377f5fd27674bc7dbbb6af1392c773759827dfee2dde78d9865cda7ef61f68966b51a1098128d83e110d85f13186b329f41223430bef4fe39b778bab

  • SSDEEP

    1536:tR4urouZ1X56QtaDi0vRA4Q9OXwkpSCYrWNEv3yJW1/:Uuo405tQ98pSCYrWNE/2q

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      4fbffd3d2f320ef03860b4359d44bffa

    • Size

      85KB

    • MD5

      4fbffd3d2f320ef03860b4359d44bffa

    • SHA1

      5b16283375d84dbcaa96c962e6befb7bc7c34c45

    • SHA256

      9c797b9be91f344647a255c949dcdf80ab08b8b80510e23d1ef3eb78e8a4361e

    • SHA512

      f7b5f62e377f5fd27674bc7dbbb6af1392c773759827dfee2dde78d9865cda7ef61f68966b51a1098128d83e110d85f13186b329f41223430bef4fe39b778bab

    • SSDEEP

      1536:tR4urouZ1X56QtaDi0vRA4Q9OXwkpSCYrWNEv3yJW1/:Uuo405tQ98pSCYrWNE/2q

    Score
    9/10
    • Contacts a large (20496) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks