General

  • Target

    loligang.x86.elf

  • Size

    72KB

  • Sample

    241130-rht34azngq

  • MD5

    c844115970e3d87b03b956376e9dcdf1

  • SHA1

    eb2d2a03071b82039aea5940e162670c931910bc

  • SHA256

    5d25b81abb173cdc1ef14faa6ead78c2cfa6911ba49b7eb54314b12fa1148076

  • SHA512

    7040315e600d721b9f4f8de01f2582dfccffe2dbde76fe13d369e97f457c76e2b2eb735964829bc8ac90c8cef5f94f6cb5278988ac68fce39b3e92d25f3dde9f

  • SSDEEP

    1536:NW8dQs/nh9adZkrOsDYuY061vDOH3RJTWoV3SW4OB/BQJv4rmoBitQOZNG:Nt/nh9adZsOsDYuY061rgXWKSW3/Ghex

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      loligang.x86.elf

    • Size

      72KB

    • MD5

      c844115970e3d87b03b956376e9dcdf1

    • SHA1

      eb2d2a03071b82039aea5940e162670c931910bc

    • SHA256

      5d25b81abb173cdc1ef14faa6ead78c2cfa6911ba49b7eb54314b12fa1148076

    • SHA512

      7040315e600d721b9f4f8de01f2582dfccffe2dbde76fe13d369e97f457c76e2b2eb735964829bc8ac90c8cef5f94f6cb5278988ac68fce39b3e92d25f3dde9f

    • SSDEEP

      1536:NW8dQs/nh9adZkrOsDYuY061vDOH3RJTWoV3SW4OB/BQJv4rmoBitQOZNG:Nt/nh9adZsOsDYuY061rgXWKSW3/Ghex

    Score
    9/10
    • Contacts a large (20386) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

MITRE ATT&CK Enterprise v15

Tasks