General

  • Target

    b1779b237c735431f4d1104eac42a873c2d688c046004e3a77de451af8bae95c.elf

  • Size

    53KB

  • Sample

    240212-fst1aseg55

  • MD5

    9d0592b05fcc9c461279958832151e3c

  • SHA1

    f6868f9d328cbd9564e4746abc37464938a7dcb1

  • SHA256

    b1779b237c735431f4d1104eac42a873c2d688c046004e3a77de451af8bae95c

  • SHA512

    f02886ff8187bfa7f083e5e421e53f1a648339583b6af5fb5c5714011a249c8baa6b16f0472af2febf37c6078fdceddd36c95b69d1cd5ba5b41270d32d71ea68

  • SSDEEP

    768:SfYcj17BglTIJ/sITKUEPgK+4CaS7HA691CO1zBAx3/9S2BxXVhcTqmq16US0s2:6DgIJ/sITaoECaCzulhYqmG6R52

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      b1779b237c735431f4d1104eac42a873c2d688c046004e3a77de451af8bae95c.elf

    • Size

      53KB

    • MD5

      9d0592b05fcc9c461279958832151e3c

    • SHA1

      f6868f9d328cbd9564e4746abc37464938a7dcb1

    • SHA256

      b1779b237c735431f4d1104eac42a873c2d688c046004e3a77de451af8bae95c

    • SHA512

      f02886ff8187bfa7f083e5e421e53f1a648339583b6af5fb5c5714011a249c8baa6b16f0472af2febf37c6078fdceddd36c95b69d1cd5ba5b41270d32d71ea68

    • SSDEEP

      768:SfYcj17BglTIJ/sITKUEPgK+4CaS7HA691CO1zBAx3/9S2BxXVhcTqmq16US0s2:6DgIJ/sITaoECaCzulhYqmG6R52

    Score
    7/10
    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks