General

  • Target

    loligang.mpsl.elf

  • Size

    103KB

  • Sample

    241130-q5f93svrav

  • MD5

    8a608a30b3bec3eb52a19a979e016c22

  • SHA1

    03314f499acd0cd6bff02e091359bfa51eefdf11

  • SHA256

    9ee1ffe3520dca4f434ae9cdd9bc0f6aa3dfab036a0928ac161a5290eb407e45

  • SHA512

    f1d806a476d18321470cbb267348165a9ecc36d0d6988c1af441bb0dbeb4a129086a18bcf5ac757e55cdb0395f9e4bd7298f00fec7dfea43cce2abbf2699c0c9

  • SSDEEP

    1536:d7fjpr4NEQu3p0ZwIGH5PbpTBRRtBeiZebzELYRiYp:d7fjpr53pndeis982

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      loligang.mpsl.elf

    • Size

      103KB

    • MD5

      8a608a30b3bec3eb52a19a979e016c22

    • SHA1

      03314f499acd0cd6bff02e091359bfa51eefdf11

    • SHA256

      9ee1ffe3520dca4f434ae9cdd9bc0f6aa3dfab036a0928ac161a5290eb407e45

    • SHA512

      f1d806a476d18321470cbb267348165a9ecc36d0d6988c1af441bb0dbeb4a129086a18bcf5ac757e55cdb0395f9e4bd7298f00fec7dfea43cce2abbf2699c0c9

    • SSDEEP

      1536:d7fjpr4NEQu3p0ZwIGH5PbpTBRRtBeiZebzELYRiYp:d7fjpr53pndeis982

    • Contacts a large (20505) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks