General

  • Target

    77b673f2a4bf201174409274ff5ab549.bin

  • Size

    616B

  • Sample

    241112-bthans1hjm

  • MD5

    050f3bc0ee1b2d5bb07a5fcfed6dd8e5

  • SHA1

    7b2f77c3e8b9cad0f389fd8802456a72d4996e7f

  • SHA256

    39937c6dbc698d063927165959cae1e5627f6dae5277ed87da7cef8d09533704

  • SHA512

    60cdbe8c0a51abcc2fdcc576a94dd91fa5f93ea7e4376e6fd2c63a3f7434930a14df5c79bfb5cad13f100f04e0ab9798b0c6253b4a8c841f6e932b685a89eb0f

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18.sh

    • Size

      3KB

    • MD5

      77b673f2a4bf201174409274ff5ab549

    • SHA1

      07239713e9551c0e0fafb75149b86b0ce0515a0a

    • SHA256

      1f807348db851d7ab9103ef670906f36006bdd4af7f09080794b65b85dae0c18

    • SHA512

      66922611e0e8c796248b3ea6ebe4a02c638a2548eb8348b98ce913d9a1127c8a7f0bb6340484d25418e4d1da35d7bfde0b22a142697734197cafce40591fce3c

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks