General

  • Target

    ub8ehJSePAfc9FYqZIT6.arm7.elf

  • Size

    155KB

  • Sample

    241120-jegdtsthrk

  • MD5

    8b0ae426f2d0a6355e2c5ee8fad587db

  • SHA1

    89604fd8577b6142812b9d4d186126c791f1b496

  • SHA256

    78c9f80697df7bb4152b5602f74b9fb519ecb5f9937e1b4810bcb9346411a2eb

  • SHA512

    4c77827772cd2549c977bdd65d26e0558927e985f79ac7f0087ef86a568837a3c87bd9449fc65d04cea59da596559b990424f921a9f475914e6e662a0968ab71

  • SSDEEP

    3072:w0jlwv74BRae/xGPZ06v/mYp+C9T6MjYHDjyoM/9Rv03:w0jlwyRae/xGPd/z+cT6OYHDj1M/9V03

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      ub8ehJSePAfc9FYqZIT6.arm7.elf

    • Size

      155KB

    • MD5

      8b0ae426f2d0a6355e2c5ee8fad587db

    • SHA1

      89604fd8577b6142812b9d4d186126c791f1b496

    • SHA256

      78c9f80697df7bb4152b5602f74b9fb519ecb5f9937e1b4810bcb9346411a2eb

    • SHA512

      4c77827772cd2549c977bdd65d26e0558927e985f79ac7f0087ef86a568837a3c87bd9449fc65d04cea59da596559b990424f921a9f475914e6e662a0968ab71

    • SSDEEP

      3072:w0jlwv74BRae/xGPZ06v/mYp+C9T6MjYHDjyoM/9Rv03:w0jlwyRae/xGPd/z+cT6OYHDj1M/9V03

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks