General

  • Target

    arm.elf

  • Size

    76KB

  • Sample

    241130-zrj89avnew

  • MD5

    751d7355900a752e8e45714f4985430e

  • SHA1

    d4fcc48f9fd858c5dadf815172276d8d44183d3f

  • SHA256

    ac235af3909684e6ffd2e4d6271086b84d4a8b6e4f9009f4877beb0a9ecdcd2d

  • SHA512

    9271a954198ac408d6458830c9d87666e1781de96f49dc67be2eb65c25c56eac5ad2917e4a19585534ad4e83fc464425bdafbb1eabe1dfe4dd290134cd581253

  • SSDEEP

    1536:ThY2PMyjy2Xqz7O8WzV2mZjj75xl3w6+TM7W05SG4AJeZWfnb8s6eGM:ThY2PJw6+70kG4cwCnbyeP

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      arm.elf

    • Size

      76KB

    • MD5

      751d7355900a752e8e45714f4985430e

    • SHA1

      d4fcc48f9fd858c5dadf815172276d8d44183d3f

    • SHA256

      ac235af3909684e6ffd2e4d6271086b84d4a8b6e4f9009f4877beb0a9ecdcd2d

    • SHA512

      9271a954198ac408d6458830c9d87666e1781de96f49dc67be2eb65c25c56eac5ad2917e4a19585534ad4e83fc464425bdafbb1eabe1dfe4dd290134cd581253

    • SSDEEP

      1536:ThY2PMyjy2Xqz7O8WzV2mZjj75xl3w6+TM7W05SG4AJeZWfnb8s6eGM:ThY2PJw6+70kG4cwCnbyeP

    • Contacts a large (19852) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks