General

  • Target

    zeros6x.sh

  • Size

    2KB

  • Sample

    241115-ehxsrsyelb

  • MD5

    642df6d1dacbef4e6df51eb185893408

  • SHA1

    b5536f3af73f31a31bda2bbf6467a28eb14bd50a

  • SHA256

    c58d8c70b82f2ecb99af380bd00a926428a5883dc910edc92dea36c44bce8eab

  • SHA512

    7deb4c9a41575f1f0092b9430909ce93ccd7273f8900b4dafbd750cbe5926d559a6666dc629611de0db4a33a5c8ab5c9811a783835ae87479f02f45fdfb8a629

Malware Config

Extracted

Family

mirai

Botnet

UNSTABLE

C2

server.myway-ing.win

Extracted

Family

mirai

Botnet

UNSTABLE

Extracted

Family

mirai

Botnet

UNSTABLE

C2

server.myway-ing.win

Targets

    • Target

      zeros6x.sh

    • Size

      2KB

    • MD5

      642df6d1dacbef4e6df51eb185893408

    • SHA1

      b5536f3af73f31a31bda2bbf6467a28eb14bd50a

    • SHA256

      c58d8c70b82f2ecb99af380bd00a926428a5883dc910edc92dea36c44bce8eab

    • SHA512

      7deb4c9a41575f1f0092b9430909ce93ccd7273f8900b4dafbd750cbe5926d559a6666dc629611de0db4a33a5c8ab5c9811a783835ae87479f02f45fdfb8a629

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Deletes itself

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks