General

  • Target

    029a1611b4d870b6a35f06a10ffb4bb8fee072097251a4a166ac7e195550dc1c.elf

  • Size

    22KB

  • Sample

    240424-bdcp9add45

  • MD5

    39d4d14f93994a794b5ca197601c5ace

  • SHA1

    488b605a6f528a367333c43908310ca372da591f

  • SHA256

    029a1611b4d870b6a35f06a10ffb4bb8fee072097251a4a166ac7e195550dc1c

  • SHA512

    dfa5d369af24fb7e3e3722bca56da9bb10063d80037f86f5a8d5a197a5dd51e976d6bbb3d1b4ed638d842affc0b3bb93a5a7af48fe72ac019646dbf4930deb2d

  • SSDEEP

    384:9FYfwf/izXcR3fivuQUhJX9tDttu0fOM9Yx/DmpO5wuHnrbV8YSqcKsDCN2lM5Bc:rikKzXctauJX9t+WO5lCpUdvONqyCNSh

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      029a1611b4d870b6a35f06a10ffb4bb8fee072097251a4a166ac7e195550dc1c.elf

    • Size

      22KB

    • MD5

      39d4d14f93994a794b5ca197601c5ace

    • SHA1

      488b605a6f528a367333c43908310ca372da591f

    • SHA256

      029a1611b4d870b6a35f06a10ffb4bb8fee072097251a4a166ac7e195550dc1c

    • SHA512

      dfa5d369af24fb7e3e3722bca56da9bb10063d80037f86f5a8d5a197a5dd51e976d6bbb3d1b4ed638d842affc0b3bb93a5a7af48fe72ac019646dbf4930deb2d

    • SSDEEP

      384:9FYfwf/izXcR3fivuQUhJX9tDttu0fOM9Yx/DmpO5wuHnrbV8YSqcKsDCN2lM5Bc:rikKzXctauJX9t+WO5lCpUdvONqyCNSh

    Score
    10/10
    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Tasks