General
-
Target
1533-1-0x0000000000400000-0x000000000060e700-memory.dmp
-
Size
54KB
-
Sample
240503-c2mqssfb38
-
MD5
31fe8c61ba5e89b524e97e2b8f0fcfb3
-
SHA1
d07ea324a3404bff85c5720c457dac83399a74e1
-
SHA256
5f08dec1cb8a10c71e6b882d7f011d221f0efd9235c188996e735e6300207e3d
-
SHA512
3b3f2ce59cb0bac8b1a26102d5c49ac86a22fcf00b1c2dd5d7b43620cd93eedc7bb7165e9ae5018f016dc28d50f1d6dd293de34308a3b47a1238cc7ea25acece
-
SSDEEP
1536:7zm4N5hpp6TIuk/chY3UnThJy9UZRLDHTV:24HcTthNu9U73zV
Behavioral task
behavioral1
Sample
1533-1-0x0000000000400000-0x000000000060e700-memory.dmp
Resource
ubuntu1804-amd64-20240418-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
1533-1-0x0000000000400000-0x000000000060e700-memory.dmp
-
Size
54KB
-
MD5
31fe8c61ba5e89b524e97e2b8f0fcfb3
-
SHA1
d07ea324a3404bff85c5720c457dac83399a74e1
-
SHA256
5f08dec1cb8a10c71e6b882d7f011d221f0efd9235c188996e735e6300207e3d
-
SHA512
3b3f2ce59cb0bac8b1a26102d5c49ac86a22fcf00b1c2dd5d7b43620cd93eedc7bb7165e9ae5018f016dc28d50f1d6dd293de34308a3b47a1238cc7ea25acece
-
SSDEEP
1536:7zm4N5hpp6TIuk/chY3UnThJy9UZRLDHTV:24HcTthNu9U73zV
Score7/10-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder
-