General

  • Target

    9ec81d2cda96856c96f982f8d34ef781

  • Size

    64KB

  • Sample

    240215-2tknxabd84

  • MD5

    9ec81d2cda96856c96f982f8d34ef781

  • SHA1

    c228e9e894287921bf88e175318db4a2b26102e4

  • SHA256

    a085fcfc2e637396e62d4f2a9e9f6b8bc0b00bd63296332616d3b0021e61d8dc

  • SHA512

    b586bafeaddc1ba6f6e2fcc90574262a8adab554a4c6f6f7c1db2586b6389ab53fdf00285c278f674ccb281e43a7bde3ea8aa432e83f905e1852f5fa6aca9e3e

  • SSDEEP

    1536:IIG9170vwHbQXZ5+qXDEuXi9aBSW7V/DjObeFt6PuQ4ZZ:I917iwHbQXZ5+qXA59eSWZ/XObeb6GZZ

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      9ec81d2cda96856c96f982f8d34ef781

    • Size

      64KB

    • MD5

      9ec81d2cda96856c96f982f8d34ef781

    • SHA1

      c228e9e894287921bf88e175318db4a2b26102e4

    • SHA256

      a085fcfc2e637396e62d4f2a9e9f6b8bc0b00bd63296332616d3b0021e61d8dc

    • SHA512

      b586bafeaddc1ba6f6e2fcc90574262a8adab554a4c6f6f7c1db2586b6389ab53fdf00285c278f674ccb281e43a7bde3ea8aa432e83f905e1852f5fa6aca9e3e

    • SSDEEP

      1536:IIG9170vwHbQXZ5+qXDEuXi9aBSW7V/DjObeFt6PuQ4ZZ:I917iwHbQXZ5+qXA59eSWZ/XObeb6GZZ

    Score
    9/10
    • Contacts a large (20414) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks