General

  • Target

    mpsl.elf

  • Size

    31KB

  • Sample

    240809-k5dw3ayfpm

  • MD5

    fbcdec043062dde0a1a64ec0d264e0a9

  • SHA1

    05a6b1d8bc3afeda2729554100b5630381fa77c3

  • SHA256

    0854a42139615471591f9ceb0a6775c43b748e878cadc2ffcde503ea1886ab3d

  • SHA512

    70c230c2b2c7914a70648dd452bffa026d1aee862918ba5a458358b12259460867dbbcd986c13d8d8a9012cbcd680174041d106ae61724aaff74218062fa311c

  • SSDEEP

    768:YAhla+Lu1EwnQ9gfNaFRMwsYS9v0Qghcp6YnBbWP:plZLIrQ+NaFOL7l0v63nM

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      mpsl.elf

    • Size

      31KB

    • MD5

      fbcdec043062dde0a1a64ec0d264e0a9

    • SHA1

      05a6b1d8bc3afeda2729554100b5630381fa77c3

    • SHA256

      0854a42139615471591f9ceb0a6775c43b748e878cadc2ffcde503ea1886ab3d

    • SHA512

      70c230c2b2c7914a70648dd452bffa026d1aee862918ba5a458358b12259460867dbbcd986c13d8d8a9012cbcd680174041d106ae61724aaff74218062fa311c

    • SSDEEP

      768:YAhla+Lu1EwnQ9gfNaFRMwsYS9v0Qghcp6YnBbWP:plZLIrQ+NaFOL7l0v63nM

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Contacts a large (20489) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

MITRE ATT&CK Enterprise v15

Tasks