General

  • Target

    107faafdfa59a434e8b0bd20e5e2e68c6b313ef872b0c949962de53e402d6084.elf

  • Size

    70KB

  • Sample

    240212-cka1nshb55

  • MD5

    dd98595d5e03f5ecedd69ba4c3229dda

  • SHA1

    7a6dabbda972d075230774fc9a26b45379a51775

  • SHA256

    107faafdfa59a434e8b0bd20e5e2e68c6b313ef872b0c949962de53e402d6084

  • SHA512

    937aec3ebfa153e64f96c127c8eda0b886d762ec5bfee27802c73a3ea10c7e3e74f4ad1c6dc89d9aa2d8a29c0a933e4a483e0f87829b13616768e02d64f06146

  • SSDEEP

    1536:YfaPVPXyGxOaXQp4H8fIJgnIP1um/zPMXU:/BRXusWIP1umrP8U

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      107faafdfa59a434e8b0bd20e5e2e68c6b313ef872b0c949962de53e402d6084.elf

    • Size

      70KB

    • MD5

      dd98595d5e03f5ecedd69ba4c3229dda

    • SHA1

      7a6dabbda972d075230774fc9a26b45379a51775

    • SHA256

      107faafdfa59a434e8b0bd20e5e2e68c6b313ef872b0c949962de53e402d6084

    • SHA512

      937aec3ebfa153e64f96c127c8eda0b886d762ec5bfee27802c73a3ea10c7e3e74f4ad1c6dc89d9aa2d8a29c0a933e4a483e0f87829b13616768e02d64f06146

    • SSDEEP

      1536:YfaPVPXyGxOaXQp4H8fIJgnIP1um/zPMXU:/BRXusWIP1umrP8U

    Score
    7/10
    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks