General

  • Target

    meerkat.x86.elf

  • Size

    73KB

  • Sample

    241112-x8yf4azbqf

  • MD5

    1fb69900d79f2d1fa80b89a352a7545a

  • SHA1

    95d8537b51ba65fb7b97567d2dc7cc04a677e1ab

  • SHA256

    61fa903ce9d7a88e55f1361f706731511fb0647e73b7272fdb90284d2af4a4d5

  • SHA512

    1025605866c2334bc1ae4869b292632e5503b420173ca10f51205c7a031dd323641cebcb7ed6f87b51b5227cb2b4a2504125588316342c3d5f9b9df8787d7dc9

  • SSDEEP

    1536:pWq2VcPy61MQW1RSoM4vn0xR+B7sPOykaL8/qhsA70C6uyK/omCrmA/Srr:LpPyQMQW1RSoPvn0xR+B7sPOykaY/Chj

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      meerkat.x86.elf

    • Size

      73KB

    • MD5

      1fb69900d79f2d1fa80b89a352a7545a

    • SHA1

      95d8537b51ba65fb7b97567d2dc7cc04a677e1ab

    • SHA256

      61fa903ce9d7a88e55f1361f706731511fb0647e73b7272fdb90284d2af4a4d5

    • SHA512

      1025605866c2334bc1ae4869b292632e5503b420173ca10f51205c7a031dd323641cebcb7ed6f87b51b5227cb2b4a2504125588316342c3d5f9b9df8787d7dc9

    • SSDEEP

      1536:pWq2VcPy61MQW1RSoM4vn0xR+B7sPOykaL8/qhsA70C6uyK/omCrmA/Srr:LpPyQMQW1RSoPvn0xR+B7sPOykaY/Chj

    • Contacts a large (23992) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks