General

  • Target

    dba6d7c0d781cf800a626d13978ee7a8

  • Size

    89KB

  • Sample

    240321-pw444sdc5s

  • MD5

    dba6d7c0d781cf800a626d13978ee7a8

  • SHA1

    dc9019376d862b799bde2b65791789c9022bf0b7

  • SHA256

    983ed7c7e23e81bd3896854e4a301695a23c5a0a32425e30651feab3e7dc6d06

  • SHA512

    be7b739f1d0b86492c9f842354df951c8f79fcc15a7ca2517d46028ea39bdbfcaa12e37b2bfc9696af6a7cd584f2a8be322dc09f855358561ff099cf69d87ec7

  • SSDEEP

    1536:NYCYxrXP40ODyPwHRQ9PlzTRfyToNoZqxi:qCYxrKDy46Ni

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      dba6d7c0d781cf800a626d13978ee7a8

    • Size

      89KB

    • MD5

      dba6d7c0d781cf800a626d13978ee7a8

    • SHA1

      dc9019376d862b799bde2b65791789c9022bf0b7

    • SHA256

      983ed7c7e23e81bd3896854e4a301695a23c5a0a32425e30651feab3e7dc6d06

    • SHA512

      be7b739f1d0b86492c9f842354df951c8f79fcc15a7ca2517d46028ea39bdbfcaa12e37b2bfc9696af6a7cd584f2a8be322dc09f855358561ff099cf69d87ec7

    • SSDEEP

      1536:NYCYxrXP40ODyPwHRQ9PlzTRfyToNoZqxi:qCYxrKDy46Ni

    Score
    9/10
    • Contacts a large (20319) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks