General
-
Target
lg.sh
-
Size
2KB
-
Sample
241103-ry56asyqhm
-
MD5
bc5d26efda012ff6acde82ad9df727ba
-
SHA1
ca673c3c525f1e35bcab62dc95a426620d844850
-
SHA256
f90209498b787e94cb54a58c548994667bc712526f541bf86142a14ac6cd3bcf
-
SHA512
2718a545aa565f06edd6dae806b09dfa0a2e57ee4a21f954d5295400691daf5db8b69d7b429c8614fa1d1dc50be5446caccdce7662d448b5fea4d4a32818dc55
Static task
static1
Behavioral task
behavioral1
Sample
lg.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
lg.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
lg.sh
Resource
debian9-mipsbe-20240418-en
Malware Config
Extracted
mirai
SORA
Extracted
mirai
SORA
Extracted
mirai
SORA
Extracted
mirai
SORA
Targets
-
-
Target
lg.sh
-
Size
2KB
-
MD5
bc5d26efda012ff6acde82ad9df727ba
-
SHA1
ca673c3c525f1e35bcab62dc95a426620d844850
-
SHA256
f90209498b787e94cb54a58c548994667bc712526f541bf86142a14ac6cd3bcf
-
SHA512
2718a545aa565f06edd6dae806b09dfa0a2e57ee4a21f954d5295400691daf5db8b69d7b429c8614fa1d1dc50be5446caccdce7662d448b5fea4d4a32818dc55
-
Mirai family
-
Contacts a large (47076) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1