General

  • Target

    meerkat.mips.elf

  • Size

    102KB

  • Sample

    241112-x8yf4azbrr

  • MD5

    32140eb221573a4bd15ece871fee37d0

  • SHA1

    d7be27d2fbcb5341eccd868087572c94f407316b

  • SHA256

    d0c85e0905fcbf13c289d4670f387c722b08fdc619356340dbac9575d678e1ab

  • SHA512

    b00706a1e53b0e9115c8f96bf1804de8342783e251cdca84be59a9cb20499ae44e4c86e477fe032e1adeef3ec532b90c942f508ff0173de74294e05dcc49d62b

  • SSDEEP

    3072:DnxTMqWSiBdO/00ar55sOPfRyS+liITYbASlvAPam:r5ePVfRyS+liI80rPam

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      meerkat.mips.elf

    • Size

      102KB

    • MD5

      32140eb221573a4bd15ece871fee37d0

    • SHA1

      d7be27d2fbcb5341eccd868087572c94f407316b

    • SHA256

      d0c85e0905fcbf13c289d4670f387c722b08fdc619356340dbac9575d678e1ab

    • SHA512

      b00706a1e53b0e9115c8f96bf1804de8342783e251cdca84be59a9cb20499ae44e4c86e477fe032e1adeef3ec532b90c942f508ff0173de74294e05dcc49d62b

    • SSDEEP

      3072:DnxTMqWSiBdO/00ar55sOPfRyS+liITYbASlvAPam:r5ePVfRyS+liI80rPam

    • Contacts a large (23828) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

MITRE ATT&CK Enterprise v15

Tasks