General

  • Target

    5ee781c11a0a34c5ef0fd481df91239f

  • Size

    64KB

  • Sample

    231219-3cvcfshbd2

  • MD5

    5ee781c11a0a34c5ef0fd481df91239f

  • SHA1

    fa7b6d4ddc96b1209a7b2e7c77f12c16223257d9

  • SHA256

    a9d1f056bea89bce9964d8c7788e727ca77888bea435b35bb331f4253e7800df

  • SHA512

    d6edc093cfc8a914eb673ba32f8538179f5f34ad1f9fcf256b7b5b231493cf3fd31f7a523acedf24f284c01ab00edfcb0285e1bb89cecada4df9fc42824a3848

  • SSDEEP

    1536:+N4JQjitMJrzQFNMe5LRz/apl7H6WSWuX/MMOCs2qg6U4:m4JQjitMJrzQFNMedUpl/SWs/dOC3qR9

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      5ee781c11a0a34c5ef0fd481df91239f

    • Size

      64KB

    • MD5

      5ee781c11a0a34c5ef0fd481df91239f

    • SHA1

      fa7b6d4ddc96b1209a7b2e7c77f12c16223257d9

    • SHA256

      a9d1f056bea89bce9964d8c7788e727ca77888bea435b35bb331f4253e7800df

    • SHA512

      d6edc093cfc8a914eb673ba32f8538179f5f34ad1f9fcf256b7b5b231493cf3fd31f7a523acedf24f284c01ab00edfcb0285e1bb89cecada4df9fc42824a3848

    • SSDEEP

      1536:+N4JQjitMJrzQFNMe5LRz/apl7H6WSWuX/MMOCs2qg6U4:m4JQjitMJrzQFNMedUpl/SWs/dOC3qR9

    Score
    9/10
    • Contacts a large (20475) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks