General

  • Target

    fcb0ebdc1f6fe1706eaaad021da20c90.bin

  • Size

    32KB

  • Sample

    241202-cecbjsymfj

  • MD5

    beb33f744f33b31e11be283c7ecd9721

  • SHA1

    320002abd5bf8e5f0b196bd420548a1bb8e95884

  • SHA256

    e2bc394f08344f450c4ea4d6667a2d61567a7a2a457b92262741a343b778156d

  • SHA512

    fcba6dd85a0c797146e3679b3ba1c0405fbf8c8e69715b54ae01a6da248bd35b7cf3d8beca2df9197c7a22decfcd32dca508c4d99921b8638b23d32c6d4ec186

  • SSDEEP

    768:piIe10B4H1ohu5ZFkTLN5HWbG+uQsGRct/vumDP:4Ieb1k+FknPJJGCvP

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e.elf

    • Size

      94KB

    • MD5

      fcb0ebdc1f6fe1706eaaad021da20c90

    • SHA1

      6872f6601e2efc1a3c648b14506f1e93bcb00b2f

    • SHA256

      c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e

    • SHA512

      15cd2cc133c0d48a95d52fa0011e2c04294941afe29630aa10c26bdcf1325453f321941661878f1517bb2474e5b898e42ee7c21e21e75fd90ed102779b4e5a7c

    • SSDEEP

      1536:MFAKh0ivvOiTH7BaOJO9rw0jCxPchgLIyIJcLqZO2v/7XlWmPS:aAKh0ivvOiTH7Baz9cvLqBXlWwS

    • Contacts a large (20145) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

MITRE ATT&CK Enterprise v15

Tasks