General

  • Target

    ohshit.sh

  • Size

    3KB

  • Sample

    241202-albmgsyrb1

  • MD5

    88738a95929e9c44969bcffde3c50f4b

  • SHA1

    5b9581fadd1ea4b8621d5b0adb559a631b1226ee

  • SHA256

    1b6a6ceb23e46cf0a36bb0f1fc89472f3ec42ea1b23ca15ffe49c39f8d9ea0f4

  • SHA512

    df40b12ad937df1d3a36673761fe27b5c2072f1f871f37610e76987411c292f75b70035258ebf6f912d4f856ad014c0d67d461e87e71b939e127179c5bd985f9

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      ohshit.sh

    • Size

      3KB

    • MD5

      88738a95929e9c44969bcffde3c50f4b

    • SHA1

      5b9581fadd1ea4b8621d5b0adb559a631b1226ee

    • SHA256

      1b6a6ceb23e46cf0a36bb0f1fc89472f3ec42ea1b23ca15ffe49c39f8d9ea0f4

    • SHA512

      df40b12ad937df1d3a36673761fe27b5c2072f1f871f37610e76987411c292f75b70035258ebf6f912d4f856ad014c0d67d461e87e71b939e127179c5bd985f9

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks