General

  • Target

    f6c738f8fde7372f91168a8239a02aa8.bin

  • Size

    62KB

  • Sample

    241202-cd967atlcy

  • MD5

    2780d2e860cf50f6db308c68556a2ef2

  • SHA1

    e2f99e98013f23299b52408cfd4be3e00a0cc2d4

  • SHA256

    18872dadfa7aa5919a03fc5646f84afdaae2a167f252b17589d2a32613ec1c41

  • SHA512

    cf7ec2155e0770fc08391719752785fff0b602cc6b354d32c57f8ea66537e7475abc23291ebdb758f64c8c732cd1b785e2df1da6435ae5adc03c26bc1aeb4084

  • SSDEEP

    1536:JiNYqOJ9/y2AMVlT8ERJtpgzgysduZ+1n1JqCQmkx9bihgC/P5GcW:MNYq4/lpDT8EPduZ+11vQmkDbiX8

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      3254c6ac87104fd34c68c9f12a0085cd772cb7eb909c3c08aad8336f32b98cdd.elf

    • Size

      147KB

    • MD5

      f6c738f8fde7372f91168a8239a02aa8

    • SHA1

      64f0677fc9f7fa499a2f8c78598b8dd7078af4ee

    • SHA256

      3254c6ac87104fd34c68c9f12a0085cd772cb7eb909c3c08aad8336f32b98cdd

    • SHA512

      c20f19ddd4fd5eced11d737de69eb140ad7924a6e5b94aa3a6f471cd1b7fd967b71f550f503ac4933cee6a3d80a4cd150a9663aedc991c3b4b813834ea43deff

    • SSDEEP

      3072:OiKKvnBnGyClrUn4UloLmpMguHcUgVUHalw7W6uH0JsfCJvhL2TjvEpkBjqBymwX:OiKKvnBnGyirUn4UloLmpMguHcUgVUHq

    • Contacts a large (20151) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks