General

  • Target

    1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18.sh

  • Size

    3KB

  • Sample

    241111-clm2matlbn

  • MD5

    77b673f2a4bf201174409274ff5ab549

  • SHA1

    07239713e9551c0e0fafb75149b86b0ce0515a0a

  • SHA256

    1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18

  • SHA512

    66922611e0e8c796248b3ea6ebe4a02c638a2548eb8348b98ce913d9a1127c8a7f0bb6340484d25418e4d1da35d7bfde0b22a142697734197cafce40591fce3c

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18.sh

    • Size

      3KB

    • MD5

      77b673f2a4bf201174409274ff5ab549

    • SHA1

      07239713e9551c0e0fafb75149b86b0ce0515a0a

    • SHA256

      1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18

    • SHA512

      66922611e0e8c796248b3ea6ebe4a02c638a2548eb8348b98ce913d9a1127c8a7f0bb6340484d25418e4d1da35d7bfde0b22a142697734197cafce40591fce3c

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks