General

  • Target

    32140eb221573a4bd15ece871fee37d0.bin

  • Size

    37KB

  • Sample

    241114-bg6shasell

  • MD5

    1a5bd055b94c59c69920b149f76fca07

  • SHA1

    acb14da6ff80272c439ba7f9b8913c70438aa435

  • SHA256

    a9d2dbe2041b77ac4c2453e3f92a349918cadf9ebbd607407ee6ab856c1aed15

  • SHA512

    a7b230ed2989fe46277cdcf6f03a1ed6b30775fb0f675a0e3e89bfb77289ee4637a94d24bc0e8da582f15ab3e2f84e98e1b4d072ddb7f6174ce1653e3b69e107

  • SSDEEP

    768:ZK3F5k3eUiSe3e/lK/RLeWeAa24srfM9c5HLzMvQcGF2+GLWu:S/k3Kb3IQVf+2DrU9c5HLzOGFM3

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      d0c85e0905fcbf13c289d4670f387c722b08fdc619356340dbac9575d678e1ab.elf

    • Size

      102KB

    • MD5

      32140eb221573a4bd15ece871fee37d0

    • SHA1

      d7be27d2fbcb5341eccd868087572c94f407316b

    • SHA256

      d0c85e0905fcbf13c289d4670f387c722b08fdc619356340dbac9575d678e1ab

    • SHA512

      b00706a1e53b0e9115c8f96bf1804de8342783e251cdca84be59a9cb20499ae44e4c86e477fe032e1adeef3ec532b90c942f508ff0173de74294e05dcc49d62b

    • SSDEEP

      3072:DnxTMqWSiBdO/00ar55sOPfRyS+liITYbASlvAPam:r5ePVfRyS+liI80rPam

    • Contacts a large (18873) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

MITRE ATT&CK Enterprise v15

Tasks