General

  • Target

    1485-1-0x0000000008048000-0x0000000008058de0-memory.dmp

  • Size

    61KB

  • Sample

    241122-wpswtsvqfw

  • MD5

    ad7306ddd0e19db576bd7d96376ee8ca

  • SHA1

    a6caf38ef1b732d8b1eb8e95fcae0e026cd609af

  • SHA256

    18b17e0c30425b2e4ef1907588dce4eb244f75883c2b8f7a880c3a7718548641

  • SHA512

    e436ec767c1c82fc940707bd4243c0475f1b705c26cbcd6af2836ea44cf1f2bd56a5d141747785fd8ce2c6ba05e54e9fe94229da5b4ea6e603b2fb057f8fc376

  • SSDEEP

    1536:dxw3hN0SAV7yC76X61jB74l4PYo2hO5qsBFsOH2TOioz2zn:PwRN0jV7yC76X61SuPYo2hO7BFsOHIO8

Malware Config

Extracted

Family

mirai

Botnet

LZRD

C2

www.sushiking.world

s.sushiking.world

Targets

    • Target

      1485-1-0x0000000008048000-0x0000000008058de0-memory.dmp

    • Size

      61KB

    • MD5

      ad7306ddd0e19db576bd7d96376ee8ca

    • SHA1

      a6caf38ef1b732d8b1eb8e95fcae0e026cd609af

    • SHA256

      18b17e0c30425b2e4ef1907588dce4eb244f75883c2b8f7a880c3a7718548641

    • SHA512

      e436ec767c1c82fc940707bd4243c0475f1b705c26cbcd6af2836ea44cf1f2bd56a5d141747785fd8ce2c6ba05e54e9fe94229da5b4ea6e603b2fb057f8fc376

    • SSDEEP

      1536:dxw3hN0SAV7yC76X61jB74l4PYo2hO5qsBFsOH2TOioz2zn:PwRN0jV7yC76X61SuPYo2hO7BFsOHIO8

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks