General

  • Target

    1475-1-0x0000000008048000-0x0000000008057900-memory.dmp

  • Size

    60KB

  • Sample

    240504-bwkhtahg3v

  • MD5

    fc5b2ced1bdfe8182b5cfe1b70c99786

  • SHA1

    9cb4f1538fadbe70b1c42a2f2c375cd49467e36b

  • SHA256

    c224610d8189e1f85152381bd2fe834a118e9b87649a4daad898efe87eb86ed3

  • SHA512

    a027ee40b878c53b15d7aff83a8f655c3c8f9d59c703b50fa31891589e07dbe2a5b44e44bbd6ddc21c655e897e2afdc77d455bcf32f4f957d4af2440475026b2

  • SSDEEP

    1536:kSTEh2ejR+4KGq0hZRASW8/SzwIkZS/vYdL:kSYh2iRB/hZaSW8/SzlqogdL

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      1475-1-0x0000000008048000-0x0000000008057900-memory.dmp

    • Size

      60KB

    • MD5

      fc5b2ced1bdfe8182b5cfe1b70c99786

    • SHA1

      9cb4f1538fadbe70b1c42a2f2c375cd49467e36b

    • SHA256

      c224610d8189e1f85152381bd2fe834a118e9b87649a4daad898efe87eb86ed3

    • SHA512

      a027ee40b878c53b15d7aff83a8f655c3c8f9d59c703b50fa31891589e07dbe2a5b44e44bbd6ddc21c655e897e2afdc77d455bcf32f4f957d4af2440475026b2

    • SSDEEP

      1536:kSTEh2ejR+4KGq0hZRASW8/SzwIkZS/vYdL:kSYh2iRB/hZaSW8/SzlqogdL

    Score
    9/10
    • Contacts a large (20297) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks