General

  • Target

    c78e7bd8b4d26a7e5b073bbd98cf2909

  • Size

    30KB

  • Sample

    240314-dxjn1sbf85

  • MD5

    c78e7bd8b4d26a7e5b073bbd98cf2909

  • SHA1

    f0c4195235a0774032bfcf944c2aae54180d52a7

  • SHA256

    74e04c6de8b44d454bf5ffcaad4102e1c5fe6d37dc8dc87d975d0ee83aaca631

  • SHA512

    17032bf31a646b709f0346824ec5d78c5721bdbc7163a1450f0bc508c2b9bd00a7409bcfa0ded34a3e531684a3e4a8325e31e85f3e4e8776d83ff87b0dd3cbb4

  • SSDEEP

    768:6WVQ1DPy6IdNXiWoD5u2t6duxoqt3PDKmkuJgGlzDpbuR1J+3:6We1e6gXj40duxoqRfVJuq

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      c78e7bd8b4d26a7e5b073bbd98cf2909

    • Size

      30KB

    • MD5

      c78e7bd8b4d26a7e5b073bbd98cf2909

    • SHA1

      f0c4195235a0774032bfcf944c2aae54180d52a7

    • SHA256

      74e04c6de8b44d454bf5ffcaad4102e1c5fe6d37dc8dc87d975d0ee83aaca631

    • SHA512

      17032bf31a646b709f0346824ec5d78c5721bdbc7163a1450f0bc508c2b9bd00a7409bcfa0ded34a3e531684a3e4a8325e31e85f3e4e8776d83ff87b0dd3cbb4

    • SSDEEP

      768:6WVQ1DPy6IdNXiWoD5u2t6duxoqt3PDKmkuJgGlzDpbuR1J+3:6We1e6gXj40duxoqRfVJuq

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Contacts a large (20390) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Impair Defenses

1
T1562

Discovery

Network Service Discovery

2
T1046

System Network Connections Discovery

1
T1049

System Network Configuration Discovery

1
T1016

Tasks