General

  • Target

    c0a2482d67bbdbbdf22328d63bc1018e

  • Size

    87KB

  • Sample

    240311-p32ybsfc67

  • MD5

    c0a2482d67bbdbbdf22328d63bc1018e

  • SHA1

    8573468abca33e0e9fbf86cd16180ec06782b54b

  • SHA256

    4193d53ba0e6cc2f9f341ed932d2afc4dafe7f92ba6019573157b9dd951fdc57

  • SHA512

    75c0a9639f097ec77c3600c4a722199e0e32917d73089a53a9fd6b2d421dfdde833211d886956d2fd70061b67d53768ed3e4ad69320a2ba16aeefa87d1f05458

  • SSDEEP

    1536:1YRdsnDd6C6gb/ZVyDYjMbwqZ9f0vfwW9ufY1C+KBtyRirfXDOiOP3J:CHsnD8/gb/zyDv9f0HD9FC+KBtyR6/DM

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      c0a2482d67bbdbbdf22328d63bc1018e

    • Size

      87KB

    • MD5

      c0a2482d67bbdbbdf22328d63bc1018e

    • SHA1

      8573468abca33e0e9fbf86cd16180ec06782b54b

    • SHA256

      4193d53ba0e6cc2f9f341ed932d2afc4dafe7f92ba6019573157b9dd951fdc57

    • SHA512

      75c0a9639f097ec77c3600c4a722199e0e32917d73089a53a9fd6b2d421dfdde833211d886956d2fd70061b67d53768ed3e4ad69320a2ba16aeefa87d1f05458

    • SSDEEP

      1536:1YRdsnDd6C6gb/ZVyDYjMbwqZ9f0vfwW9ufY1C+KBtyRirfXDOiOP3J:CHsnD8/gb/zyDv9f0HD9FC+KBtyR6/DM

    Score
    9/10
    • Contacts a large (20410) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks