General

  • Target

    781564ba08bc4785e9ed08eba98c7490

  • Size

    89KB

  • Sample

    231220-bnvzkshae7

  • MD5

    781564ba08bc4785e9ed08eba98c7490

  • SHA1

    62e5e829fce0cb0003ee3b04976b4522ef741775

  • SHA256

    9343d0da5c9b1daefbd8e6d16eafadbbdd5bad4b507efe74c7233c8924af1067

  • SHA512

    962c7e9f84dcfe943516653142679669bdd81635b3e628a482f9354dc187a73a561e870e28337f3f109fc15675c5b303455365039b94b4b6a252cded08b405fa

  • SSDEEP

    1536:4YRS2cWY6f6utWSVSDYFMMwqZ9adsR0vf7y9vnk5zlf/A4mqvrrb95K2M:1I2cWRyutWCSDU9aE0Hm9Azlf/A4mOro

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      781564ba08bc4785e9ed08eba98c7490

    • Size

      89KB

    • MD5

      781564ba08bc4785e9ed08eba98c7490

    • SHA1

      62e5e829fce0cb0003ee3b04976b4522ef741775

    • SHA256

      9343d0da5c9b1daefbd8e6d16eafadbbdd5bad4b507efe74c7233c8924af1067

    • SHA512

      962c7e9f84dcfe943516653142679669bdd81635b3e628a482f9354dc187a73a561e870e28337f3f109fc15675c5b303455365039b94b4b6a252cded08b405fa

    • SSDEEP

      1536:4YRS2cWY6f6utWSVSDYFMMwqZ9adsR0vf7y9vnk5zlf/A4mqvrrb95K2M:1I2cWRyutWCSDU9aE0Hm9Azlf/A4mOro

    Score
    9/10
    • Contacts a large (20349) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks