General

  • Target

    ohshit.sh

  • Size

    3KB

  • Sample

    241202-xprt7stkgl

  • MD5

    044a846325b0a1a2a62139e419e0c460

  • SHA1

    b7ba7d24f534c02b73c5e292364f0ba51ce10d79

  • SHA256

    ea0bdc1803529bcfa0f6188c15a373ae977699e7f6362d3cc34797c3f857a5d4

  • SHA512

    8a450e41d886ba67a5044da06f82bac2a3a78874199eb3af57576316b645dfd414bddedc942cde7a047351b88a68b616584182e3fa1242a1237287770401ff1c

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      ohshit.sh

    • Size

      3KB

    • MD5

      044a846325b0a1a2a62139e419e0c460

    • SHA1

      b7ba7d24f534c02b73c5e292364f0ba51ce10d79

    • SHA256

      ea0bdc1803529bcfa0f6188c15a373ae977699e7f6362d3cc34797c3f857a5d4

    • SHA512

      8a450e41d886ba67a5044da06f82bac2a3a78874199eb3af57576316b645dfd414bddedc942cde7a047351b88a68b616584182e3fa1242a1237287770401ff1c

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks