General

  • Target

    jaws

  • Size

    4KB

  • Sample

    240522-yqwp8aed6x

  • MD5

    5adf41e80215cac4dc1538446487d001

  • SHA1

    5f9e0bbe5a6dec3b9bb42a9fbeac4e024c00eb54

  • SHA256

    2867b3fd3c840aa9c868a88a5f6d417a09e4158f8209f0450a07eeb7e99ba4c8

  • SHA512

    de77b41426bc6c0a981a9317b24efedfe7aa15108ad73af8f3d46c8476e00b7fd29f6d70ffdb633a89394d55f4cbf27ff73b089b8fdab0c83ffdc40b1d241e9e

  • SSDEEP

    48:vZ0MV4k0ZT1V4QZrOrWV4hZooV4bZEMEEV4EfZskV4/ZT1V4QZPZV48ZiSV4xZyH:v7e7nVi32+bEpftMzbLZlyL0vJj1Xf

Malware Config

Extracted

Family

mirai

Botnet

UNSTABLE

C2

jswl.lbz8.top

Targets

    • Target

      jaws

    • Size

      4KB

    • MD5

      5adf41e80215cac4dc1538446487d001

    • SHA1

      5f9e0bbe5a6dec3b9bb42a9fbeac4e024c00eb54

    • SHA256

      2867b3fd3c840aa9c868a88a5f6d417a09e4158f8209f0450a07eeb7e99ba4c8

    • SHA512

      de77b41426bc6c0a981a9317b24efedfe7aa15108ad73af8f3d46c8476e00b7fd29f6d70ffdb633a89394d55f4cbf27ff73b089b8fdab0c83ffdc40b1d241e9e

    • SSDEEP

      48:vZ0MV4k0ZT1V4QZrOrWV4hZooV4bZEMEEV4EfZskV4/ZT1V4QZPZV48ZiSV4xZyH:v7e7nVi32+bEpftMzbLZlyL0vJj1Xf

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Contacts a large (3263782) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks