General

  • Target

    lg.sh

  • Size

    2KB

  • Sample

    241103-ry56asyqhm

  • MD5

    bc5d26efda012ff6acde82ad9df727ba

  • SHA1

    ca673c3c525f1e35bcab62dc95a426620d844850

  • SHA256

    f90209498b787e94cb54a58c548994667bc712526f541bf86142a14ac6cd3bcf

  • SHA512

    2718a545aa565f06edd6dae806b09dfa0a2e57ee4a21f954d5295400691daf5db8b69d7b429c8614fa1d1dc50be5446caccdce7662d448b5fea4d4a32818dc55

Malware Config

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Targets

    • Target

      lg.sh

    • Size

      2KB

    • MD5

      bc5d26efda012ff6acde82ad9df727ba

    • SHA1

      ca673c3c525f1e35bcab62dc95a426620d844850

    • SHA256

      f90209498b787e94cb54a58c548994667bc712526f541bf86142a14ac6cd3bcf

    • SHA512

      2718a545aa565f06edd6dae806b09dfa0a2e57ee4a21f954d5295400691daf5db8b69d7b429c8614fa1d1dc50be5446caccdce7662d448b5fea4d4a32818dc55

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • Contacts a large (47076) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks