General

  • Target

    loligang.mips.elf

  • Size

    87KB

  • Sample

    241125-qnysssvpaj

  • MD5

    8c448911766f650cac90489adc1a8609

  • SHA1

    816899d090f677b9b7bb99c7b33ba9283a721aa6

  • SHA256

    54342ebb7797302119d1d1edc7bcb7348a3b285afb5be9d343f843d1cebe4e76

  • SHA512

    de0c59299d78efe7786a5d4173ffb45a85151841cfe9c982a3cceea5fcfa1629677c20b9dc0b312886d56af32ba97eaef5ab58fbf35091a8393600b28ad8c5e8

  • SSDEEP

    1536:9YxxZv7YjczMPcqNV0v3wm5Cz81m1dxmFa3fP0uiO03J:6TijnV0Pr5pm1dxmF+H0uTOJ

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      loligang.mips.elf

    • Size

      87KB

    • MD5

      8c448911766f650cac90489adc1a8609

    • SHA1

      816899d090f677b9b7bb99c7b33ba9283a721aa6

    • SHA256

      54342ebb7797302119d1d1edc7bcb7348a3b285afb5be9d343f843d1cebe4e76

    • SHA512

      de0c59299d78efe7786a5d4173ffb45a85151841cfe9c982a3cceea5fcfa1629677c20b9dc0b312886d56af32ba97eaef5ab58fbf35091a8393600b28ad8c5e8

    • SSDEEP

      1536:9YxxZv7YjczMPcqNV0v3wm5Cz81m1dxmFa3fP0uiO03J:6TijnV0Pr5pm1dxmF+H0uTOJ

    • Contacts a large (20120) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks