General

  • Target

    1533-1-0x0000000000400000-0x000000000060e700-memory.dmp

  • Size

    54KB

  • Sample

    240503-c2mqssfb38

  • MD5

    31fe8c61ba5e89b524e97e2b8f0fcfb3

  • SHA1

    d07ea324a3404bff85c5720c457dac83399a74e1

  • SHA256

    5f08dec1cb8a10c71e6b882d7f011d221f0efd9235c188996e735e6300207e3d

  • SHA512

    3b3f2ce59cb0bac8b1a26102d5c49ac86a22fcf00b1c2dd5d7b43620cd93eedc7bb7165e9ae5018f016dc28d50f1d6dd293de34308a3b47a1238cc7ea25acece

  • SSDEEP

    1536:7zm4N5hpp6TIuk/chY3UnThJy9UZRLDHTV:24HcTthNu9U73zV

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      1533-1-0x0000000000400000-0x000000000060e700-memory.dmp

    • Size

      54KB

    • MD5

      31fe8c61ba5e89b524e97e2b8f0fcfb3

    • SHA1

      d07ea324a3404bff85c5720c457dac83399a74e1

    • SHA256

      5f08dec1cb8a10c71e6b882d7f011d221f0efd9235c188996e735e6300207e3d

    • SHA512

      3b3f2ce59cb0bac8b1a26102d5c49ac86a22fcf00b1c2dd5d7b43620cd93eedc7bb7165e9ae5018f016dc28d50f1d6dd293de34308a3b47a1238cc7ea25acece

    • SSDEEP

      1536:7zm4N5hpp6TIuk/chY3UnThJy9UZRLDHTV:24HcTthNu9U73zV

    Score
    7/10
    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Tasks