General

  • Target

    0e41155a66c810f30fa2cef1a57ba3d1

  • Size

    89KB

  • Sample

    231219-2evwbsbhc2

  • MD5

    0e41155a66c810f30fa2cef1a57ba3d1

  • SHA1

    f2c7c8120c89832f94ef86f8b91d1ea5eba688fc

  • SHA256

    9f483a1f4ce3220e3ae7c227d67ab1026c405ce668e90983de2e1ef4bf45e610

  • SHA512

    c4379f5c84d0bdd0997698cbae4be491bb6372c9dd5b1c303073964b1edbca04a3f17a23aa9dae805d10b142cd978b1ca04e340d65a23d335cc483e311f363dc

  • SSDEEP

    1536:NYCYxrXP40ODyPwHRQ9PlzTRfyToNoZqEi:qCYxrKDy46Nx

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      0e41155a66c810f30fa2cef1a57ba3d1

    • Size

      89KB

    • MD5

      0e41155a66c810f30fa2cef1a57ba3d1

    • SHA1

      f2c7c8120c89832f94ef86f8b91d1ea5eba688fc

    • SHA256

      9f483a1f4ce3220e3ae7c227d67ab1026c405ce668e90983de2e1ef4bf45e610

    • SHA512

      c4379f5c84d0bdd0997698cbae4be491bb6372c9dd5b1c303073964b1edbca04a3f17a23aa9dae805d10b142cd978b1ca04e340d65a23d335cc483e311f363dc

    • SSDEEP

      1536:NYCYxrXP40ODyPwHRQ9PlzTRfyToNoZqEi:qCYxrKDy46Nx

    Score
    9/10
    • Contacts a large (20138) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks