General

  • Target

    loligang.mips.elf

  • Size

    99KB

  • Sample

    241130-q5jp7szldn

  • MD5

    53aef66b569cda2866e69aecd58b5a8f

  • SHA1

    07c607bcc93cbb44a43a774854a90356b0ebf11a

  • SHA256

    d3d338fd5ed4422da395f715f621405edd7c11f883adb32ab6b5b9144b515f0d

  • SHA512

    0fbf31b9668fb9a201611642314b774579db4d7a3eb71ccf9069a9b2c81bf90cb2f194346affe747f2a6ee7e9c9ca7fc0b50481887cddab5f995f9372fbaf531

  • SSDEEP

    1536:pegXznytTDLmgKQ29A0v+iRbNxcLPkXK7wYvmG6aa7GBRd9:jiDEA0WKbNx3XK7wYv1jaiBf9

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      loligang.mips.elf

    • Size

      99KB

    • MD5

      53aef66b569cda2866e69aecd58b5a8f

    • SHA1

      07c607bcc93cbb44a43a774854a90356b0ebf11a

    • SHA256

      d3d338fd5ed4422da395f715f621405edd7c11f883adb32ab6b5b9144b515f0d

    • SHA512

      0fbf31b9668fb9a201611642314b774579db4d7a3eb71ccf9069a9b2c81bf90cb2f194346affe747f2a6ee7e9c9ca7fc0b50481887cddab5f995f9372fbaf531

    • SSDEEP

      1536:pegXznytTDLmgKQ29A0v+iRbNxcLPkXK7wYvmG6aa7GBRd9:jiDEA0WKbNx3XK7wYv1jaiBf9

    • Contacts a large (19860) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks