General

  • Target

    de08e1c31d779d833d9abfbeed7cd0cc

  • Size

    64KB

  • Sample

    240325-pwn3wsag6s

  • MD5

    de08e1c31d779d833d9abfbeed7cd0cc

  • SHA1

    4bcdb596bf04519c662fe14698404de2f2895ea4

  • SHA256

    855c291c8107df74d819bc7b7f861d2bf94288f5eeb673f3b6c86242a177f7e7

  • SHA512

    52bd344cf88c77edd51b1a5d089cb422400f7952e87491feb073838993336410f04345f55da2e59bd683a6358576729839b90eee8d8a9d3bce6105a0bef6c856

  • SSDEEP

    1536:IoRC9170vwHbQXZ5+qXDEuXi90dSW7V/DjObeFt6PuQ4Zc:PC917iwHbQXZ5+qXA594SWZ/XObeb6G7

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      de08e1c31d779d833d9abfbeed7cd0cc

    • Size

      64KB

    • MD5

      de08e1c31d779d833d9abfbeed7cd0cc

    • SHA1

      4bcdb596bf04519c662fe14698404de2f2895ea4

    • SHA256

      855c291c8107df74d819bc7b7f861d2bf94288f5eeb673f3b6c86242a177f7e7

    • SHA512

      52bd344cf88c77edd51b1a5d089cb422400f7952e87491feb073838993336410f04345f55da2e59bd683a6358576729839b90eee8d8a9d3bce6105a0bef6c856

    • SSDEEP

      1536:IoRC9170vwHbQXZ5+qXDEuXi90dSW7V/DjObeFt6PuQ4Zc:PC917iwHbQXZ5+qXA594SWZ/XObeb6G7

    Score
    9/10
    • Contacts a large (20473) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Impair Defenses

1
T1562

Discovery

Network Service Discovery

2
T1046

System Network Connections Discovery

1
T1049

System Network Configuration Discovery

1
T1016

Tasks