General

  • Target

    realtek.sh

  • Size

    2KB

  • Sample

    241103-ry56asxckq

  • MD5

    5da53ff8a84b621ec81f2688731de0aa

  • SHA1

    30c63294b36c7ce652a32dfb74b6e590d53c3d3b

  • SHA256

    9ede79df1b2136ef9be538e21d3cf922527bd6010eeae9970a1eca134db18713

  • SHA512

    ed8dc1fa2ba6243c4d713fbf7f9d98ac4888ff685130718bf5cb559ed71c643a0630a8dff26558b0d4d1cae00fd02f9a632f337ca93a5dfadd8e522d8db8660f

Malware Config

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Targets

    • Target

      realtek.sh

    • Size

      2KB

    • MD5

      5da53ff8a84b621ec81f2688731de0aa

    • SHA1

      30c63294b36c7ce652a32dfb74b6e590d53c3d3b

    • SHA256

      9ede79df1b2136ef9be538e21d3cf922527bd6010eeae9970a1eca134db18713

    • SHA512

      ed8dc1fa2ba6243c4d713fbf7f9d98ac4888ff685130718bf5cb559ed71c643a0630a8dff26558b0d4d1cae00fd02f9a632f337ca93a5dfadd8e522d8db8660f

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • Contacts a large (46338) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks