General

  • Target

    384bbfa95757984492b3ce432bfd33fa.bin

  • Size

    28KB

  • Sample

    241205-bg49nswnbk

  • MD5

    8695bbe9a4b2909485bd74ace9fdef90

  • SHA1

    1a3cbf0a5106da78c996d72037bf94f3bdb1cf3d

  • SHA256

    1004448d2fd661f305ff3c7c94fb47017d7bcc2ffea49f2cb48cbaf04c8688a3

  • SHA512

    dcf8e139a9a38b1901c7ec7ff2b4ccd508adf02430371d00a662b4b0e98ef868cc29dd76f394e2de35d6fbeda180607c4085b0b8b78be35182c83fe8e423a346

  • SSDEEP

    384:q5Qg831RJwe6Ea3I2ky2n6T3IlOp4dvWHJEEWwM8TGPL4IBPjvIivJ+5kgpLWyD5:hJFckQ2r8yYHJWwMdPL1b3J+Z5PbZ

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      e22d4c6d15cc86071113e78b3950543cf20b8940f65f2cd68fa613246cdc269a.elf

    • Size

      30KB

    • MD5

      384bbfa95757984492b3ce432bfd33fa

    • SHA1

      a99a6bc231b9fe0c2af6cf313047ceca96d1f78e

    • SHA256

      e22d4c6d15cc86071113e78b3950543cf20b8940f65f2cd68fa613246cdc269a

    • SHA512

      0f42f3d20fdb0e2be33ea4634475f971cb888d926fc2838e2cb4a1700bb1d04bb83181b673b8eab5e3843e017f2f195f1379b90fdab4f658d917fef78926b250

    • SSDEEP

      768:vyvYLznDEB2iC+sDqC6NtxsfzxPnNsGbcXcj/XwJgGlzDpbuR1JY:WYnnDEBI+smATfcwYVJum

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • Contacts a large (20336) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks