General

  • Target

    c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e.elf

  • Size

    94KB

  • Sample

    241201-dgx7gavlat

  • MD5

    fcb0ebdc1f6fe1706eaaad021da20c90

  • SHA1

    6872f6601e2efc1a3c648b14506f1e93bcb00b2f

  • SHA256

    c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e

  • SHA512

    15cd2cc133c0d48a95d52fa0011e2c04294941afe29630aa10c26bdcf1325453f321941661878f1517bb2474e5b898e42ee7c21e21e75fd90ed102779b4e5a7c

  • SSDEEP

    1536:MFAKh0ivvOiTH7BaOJO9rw0jCxPchgLIyIJcLqZO2v/7XlWmPS:aAKh0ivvOiTH7Baz9cvLqBXlWwS

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e.elf

    • Size

      94KB

    • MD5

      fcb0ebdc1f6fe1706eaaad021da20c90

    • SHA1

      6872f6601e2efc1a3c648b14506f1e93bcb00b2f

    • SHA256

      c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e

    • SHA512

      15cd2cc133c0d48a95d52fa0011e2c04294941afe29630aa10c26bdcf1325453f321941661878f1517bb2474e5b898e42ee7c21e21e75fd90ed102779b4e5a7c

    • SSDEEP

      1536:MFAKh0ivvOiTH7BaOJO9rw0jCxPchgLIyIJcLqZO2v/7XlWmPS:aAKh0ivvOiTH7Baz9cvLqBXlWwS

    • Contacts a large (20271) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

MITRE ATT&CK Enterprise v15

Tasks