General

  • Target

    6aa1d5879d02fcedea1e4cae2434a86088947caf64f07b31fa4ab5089fc1819c.elf

  • Size

    66KB

  • Sample

    241130-c537ysxrbt

  • MD5

    859ad79c0d4c62e2292247610e6dcf32

  • SHA1

    78370a09d7dea14d543be5cdf58fe9e79149769e

  • SHA256

    6aa1d5879d02fcedea1e4cae2434a86088947caf64f07b31fa4ab5089fc1819c

  • SHA512

    6ee5d26b04c9bc432dffd67405c2d4e2f878c0bc1117ab44fd9ec68b021e94f88e9950414f5e3cc59c1da13038dfa8ac2260556cf95be794a953fda2304a642e

  • SSDEEP

    1536:tgjDJZxfnlc9yh8cdfXtCDpTAlpB9plzSWI/tYyoAh+7JciIn:GjNZxflc9yh8cdfXtCDlA59pdSWI/+y9

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      6aa1d5879d02fcedea1e4cae2434a86088947caf64f07b31fa4ab5089fc1819c.elf

    • Size

      66KB

    • MD5

      859ad79c0d4c62e2292247610e6dcf32

    • SHA1

      78370a09d7dea14d543be5cdf58fe9e79149769e

    • SHA256

      6aa1d5879d02fcedea1e4cae2434a86088947caf64f07b31fa4ab5089fc1819c

    • SHA512

      6ee5d26b04c9bc432dffd67405c2d4e2f878c0bc1117ab44fd9ec68b021e94f88e9950414f5e3cc59c1da13038dfa8ac2260556cf95be794a953fda2304a642e

    • SSDEEP

      1536:tgjDJZxfnlc9yh8cdfXtCDpTAlpB9plzSWI/tYyoAh+7JciIn:GjNZxflc9yh8cdfXtCDlA59pdSWI/+y9

    • Contacts a large (20385) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks