General

  • Target

    bins.sh

  • Size

    2KB

  • Sample

    241206-qjdxtsyqet

  • MD5

    bc08b99cc7c6bc0f035c108a16f77e9d

  • SHA1

    f8dd49443b086d72bbf8626c2366b9084851ecca

  • SHA256

    3f6b55f3d9803d4e865e0fdbcd26fdedf734723240be51ada16811ab58ec7639

  • SHA512

    1a3b3920ddf0b87bbbbc89c531440bb0f1838f4c8094068cd2ce2149c46848d522156f0f3e4a6c7f71a4ac94cd99f27c585b3cbb49bf482d196a761c92903ea8

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      bins.sh

    • Size

      2KB

    • MD5

      bc08b99cc7c6bc0f035c108a16f77e9d

    • SHA1

      f8dd49443b086d72bbf8626c2366b9084851ecca

    • SHA256

      3f6b55f3d9803d4e865e0fdbcd26fdedf734723240be51ada16811ab58ec7639

    • SHA512

      1a3b3920ddf0b87bbbbc89c531440bb0f1838f4c8094068cd2ce2149c46848d522156f0f3e4a6c7f71a4ac94cd99f27c585b3cbb49bf482d196a761c92903ea8

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks