General

  • Target

    xd.x86.elf

  • Size

    34KB

  • Sample

    241115-cjz86sxape

  • MD5

    2418d9a000b6cbe0ca2cfff5d3609845

  • SHA1

    da877581a3e847d530b8eb01ebb449d9239bd897

  • SHA256

    e418494cf141c103f0ca8787f67405c35eb73464952c81bc0c1162680b8448de

  • SHA512

    08e1547e5d24cda19398521e1af710e5a98ff39e35e8e9809114621755fe0607cc62f5330884a1201d85276a1322686ee0c8f37f4ebf4aa6efdfd5d6afb122f7

  • SSDEEP

    768:Cwpimf3s1PpmFla2VIlpQwBvfo4nUGaTo5yNp0axChRVunbcuyD7UHQRjB:CQimfImja2VypQwvUIipLm3unouy8HyN

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      xd.x86.elf

    • Size

      34KB

    • MD5

      2418d9a000b6cbe0ca2cfff5d3609845

    • SHA1

      da877581a3e847d530b8eb01ebb449d9239bd897

    • SHA256

      e418494cf141c103f0ca8787f67405c35eb73464952c81bc0c1162680b8448de

    • SHA512

      08e1547e5d24cda19398521e1af710e5a98ff39e35e8e9809114621755fe0607cc62f5330884a1201d85276a1322686ee0c8f37f4ebf4aa6efdfd5d6afb122f7

    • SSDEEP

      768:Cwpimf3s1PpmFla2VIlpQwBvfo4nUGaTo5yNp0axChRVunbcuyD7UHQRjB:CQimfImja2VypQwvUIipLm3unouy8HyN

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • Contacts a large (20612) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks