General

  • Target

    meerkat.mpsl.elf

  • Size

    106KB

  • Sample

    241112-x8yrvsspak

  • MD5

    0ba4d5e0b8979db40263569d0a00e0ea

  • SHA1

    1d123fc6b2f6815946985fa882469e84a29eb8c7

  • SHA256

    dedb091ebd4b77f40694fe37f58b72b8347e8ea06f6c4b10d741db28230a2cd9

  • SHA512

    4d4078481680290e5fa7e00f9b677e12ef2b0bdd40be212f455d0f865233099aa6fce15c9d8a3c298affa492c972b04945165c68a72bb468caa58ffc1e1c756e

  • SSDEEP

    1536:mNK/DoMWrTnIEb9An4SBSBCrGTHdp9Z/+eaz0HN:mNK/MMWrR9bOcHdjckN

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      meerkat.mpsl.elf

    • Size

      106KB

    • MD5

      0ba4d5e0b8979db40263569d0a00e0ea

    • SHA1

      1d123fc6b2f6815946985fa882469e84a29eb8c7

    • SHA256

      dedb091ebd4b77f40694fe37f58b72b8347e8ea06f6c4b10d741db28230a2cd9

    • SHA512

      4d4078481680290e5fa7e00f9b677e12ef2b0bdd40be212f455d0f865233099aa6fce15c9d8a3c298affa492c972b04945165c68a72bb468caa58ffc1e1c756e

    • SSDEEP

      1536:mNK/DoMWrTnIEb9An4SBSBCrGTHdp9Z/+eaz0HN:mNK/MMWrR9bOcHdjckN

    • Contacts a large (23989) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

MITRE ATT&CK Enterprise v15

Tasks