General

  • Target

    ub8ehJSePAfc9FYqZIT6.arm7.elf

  • Size

    155KB

  • Sample

    241113-s2ggsaxqhr

  • MD5

    beebb0d6a9f7ce053ee9c42812b7fbe5

  • SHA1

    68b89bb1e1564f372668eb04fdaf8e52b3741975

  • SHA256

    a85487c12e5a86dad5a98b0805e55f743572f70bfda9e11166278c71ca561763

  • SHA512

    ca8a76c286156691d3d91b116f5aa1b2d3bbc5f8da6fb40604614409d989dd601a4bf93ca99e878cf763d4e3321e9b3ecbf0f77bb03b8369a984fa449184eec0

  • SSDEEP

    3072:w0jlwv74BRae/xGPZ06v/mYp+C9T6Mj1HDjyoM/9Rv03:w0jlwyRae/xGPd/z+cT6O1HDj1M/9V03

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      ub8ehJSePAfc9FYqZIT6.arm7.elf

    • Size

      155KB

    • MD5

      beebb0d6a9f7ce053ee9c42812b7fbe5

    • SHA1

      68b89bb1e1564f372668eb04fdaf8e52b3741975

    • SHA256

      a85487c12e5a86dad5a98b0805e55f743572f70bfda9e11166278c71ca561763

    • SHA512

      ca8a76c286156691d3d91b116f5aa1b2d3bbc5f8da6fb40604614409d989dd601a4bf93ca99e878cf763d4e3321e9b3ecbf0f77bb03b8369a984fa449184eec0

    • SSDEEP

      3072:w0jlwv74BRae/xGPZ06v/mYp+C9T6Mj1HDjyoM/9Rv03:w0jlwyRae/xGPd/z+cT6O1HDj1M/9V03

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks