General

  • Target

    a1b2748c32464d356352f90e9bd1d4b3

  • Size

    90KB

  • Sample

    231220-mdp65ahfbm

  • MD5

    a1b2748c32464d356352f90e9bd1d4b3

  • SHA1

    b277900279e4f5377cb244fc1e627c93c1b4d40a

  • SHA256

    028ed26b1c3b68dd650b0ad357c92ba72cd606d7143d3ad44ee1b2b7fa18cfaa

  • SHA512

    894d12cc4e9fd56419632fb670d9ccc9f611efa926e4d3ef905a1800945d03ef6f0d8cf874bc17d71c928f19e0de2c6510b3a6bf57a505a4dbc7557a75e91d58

  • SSDEEP

    1536:q5/638c6z+q9S6qwHp7lPCzYnvLXbs2LOV6p:U/s8c6G6d02L

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

C2

seven.nadns.info

Targets

    • Target

      a1b2748c32464d356352f90e9bd1d4b3

    • Size

      90KB

    • MD5

      a1b2748c32464d356352f90e9bd1d4b3

    • SHA1

      b277900279e4f5377cb244fc1e627c93c1b4d40a

    • SHA256

      028ed26b1c3b68dd650b0ad357c92ba72cd606d7143d3ad44ee1b2b7fa18cfaa

    • SHA512

      894d12cc4e9fd56419632fb670d9ccc9f611efa926e4d3ef905a1800945d03ef6f0d8cf874bc17d71c928f19e0de2c6510b3a6bf57a505a4dbc7557a75e91d58

    • SSDEEP

      1536:q5/638c6z+q9S6qwHp7lPCzYnvLXbs2LOV6p:U/s8c6G6d02L

    Score
    9/10
    • Contacts a large (20390) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks