General

  • Target

    1469-1-0x0000000008048000-0x00000000080547a0-memory.dmp

  • Size

    48KB

  • Sample

    240316-gwhbcafc74

  • MD5

    da493663589d953fdf096ea5ec8901b4

  • SHA1

    18ecfe8fe2ae247488f88cd0446fd92735912c56

  • SHA256

    839cb5185b0e178c24167611105825452ef842ac43c442f27511374c0ea0895c

  • SHA512

    3baf137e998d57baba01c47825933ad618611e04d2b7805c99e1dd53a05bec7226963f36dd5478b2608e70b16bce6de1443363ba45536949341df831452052c9

  • SSDEEP

    1536:6nJRT4QPfZfW5XTOeY3Dve3AGX57/4Qw7bn2iBeA:Gv4QPfZfW5XTOeoEzJ7AQwf2i/

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      1469-1-0x0000000008048000-0x00000000080547a0-memory.dmp

    • Size

      48KB

    • MD5

      da493663589d953fdf096ea5ec8901b4

    • SHA1

      18ecfe8fe2ae247488f88cd0446fd92735912c56

    • SHA256

      839cb5185b0e178c24167611105825452ef842ac43c442f27511374c0ea0895c

    • SHA512

      3baf137e998d57baba01c47825933ad618611e04d2b7805c99e1dd53a05bec7226963f36dd5478b2608e70b16bce6de1443363ba45536949341df831452052c9

    • SSDEEP

      1536:6nJRT4QPfZfW5XTOeY3Dve3AGX57/4Qw7bn2iBeA:Gv4QPfZfW5XTOeoEzJ7AQwf2i/

    Score
    7/10
    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Tasks