General

  • Target

    c56a1003db8f5beb3c582f366909afcf

  • Size

    87KB

  • Sample

    240313-j9hkdaae38

  • MD5

    c56a1003db8f5beb3c582f366909afcf

  • SHA1

    bb3d50c294627cf84c9571706e173df3f4ae3efc

  • SHA256

    6e50f63e75dfdf0b0eab0fedd7481165d4606c7e42e7055ec999df78ac2bd95a

  • SHA512

    b6672b6e2639eac4405e03787c7952f10bc9170cbc38344306cd8929edb3eda48a1d2dbf521e453290b8e3974b9064f3f26c24286e226289abc344fa316b9f86

  • SSDEEP

    1536:1YRdsnDd6C6gb/ZVyDYjMbwqZ9f0vfwW9ufY1C+KBtyRirfXDOiO/3J:CHsnD8/gb/zyDv9f0HD9FC+KBtyR6/D4

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      c56a1003db8f5beb3c582f366909afcf

    • Size

      87KB

    • MD5

      c56a1003db8f5beb3c582f366909afcf

    • SHA1

      bb3d50c294627cf84c9571706e173df3f4ae3efc

    • SHA256

      6e50f63e75dfdf0b0eab0fedd7481165d4606c7e42e7055ec999df78ac2bd95a

    • SHA512

      b6672b6e2639eac4405e03787c7952f10bc9170cbc38344306cd8929edb3eda48a1d2dbf521e453290b8e3974b9064f3f26c24286e226289abc344fa316b9f86

    • SSDEEP

      1536:1YRdsnDd6C6gb/ZVyDYjMbwqZ9f0vfwW9ufY1C+KBtyRirfXDOiO/3J:CHsnD8/gb/zyDv9f0HD9FC+KBtyR6/D4

    Score
    9/10
    • Contacts a large (20420) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks