General

  • Target

    abab0713669f4a0d4be22828b3492f08c5498096636f3b671834cc7ce6ca9128.sh

  • Size

    4KB

  • Sample

    241018-c2ncbs1hqg

  • MD5

    a8d146efd93e92e80d28cbfb06d788b1

  • SHA1

    d98a629d8028de12d68a513892ca32d3d84a9ae3

  • SHA256

    abab0713669f4a0d4be22828b3492f08c5498096636f3b671834cc7ce6ca9128

  • SHA512

    2c3864f4291a9a0c8e724719930f64ad2f65159981e4f27014c8ba97b906f2b7a8aafaaab38df318f56e1f07fa7be0703aa752cdee96cee8bb66dd9aab224d1b

  • SSDEEP

    96:vNVjRNw4yNx/lNN7JNdMdEpF8Nn9jNUsWN2m4NRf1N3tLNueoNySUNGWwNPlY:KO4FQ

Malware Config

Extracted

Family

mirai

Botnet

UNSTABLE

Extracted

Family

mirai

Botnet

UNSTABLE

Extracted

Family

mirai

Botnet

UNSTABLE

Targets

    • Target

      abab0713669f4a0d4be22828b3492f08c5498096636f3b671834cc7ce6ca9128.sh

    • Size

      4KB

    • MD5

      a8d146efd93e92e80d28cbfb06d788b1

    • SHA1

      d98a629d8028de12d68a513892ca32d3d84a9ae3

    • SHA256

      abab0713669f4a0d4be22828b3492f08c5498096636f3b671834cc7ce6ca9128

    • SHA512

      2c3864f4291a9a0c8e724719930f64ad2f65159981e4f27014c8ba97b906f2b7a8aafaaab38df318f56e1f07fa7be0703aa752cdee96cee8bb66dd9aab224d1b

    • SSDEEP

      96:vNVjRNw4yNx/lNN7JNdMdEpF8Nn9jNUsWN2m4NRf1N3tLNueoNySUNGWwNPlY:KO4FQ

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Contacts a large (207584) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks