General

  • Target

    ohshit.sh

  • Size

    2KB

  • Sample

    241208-t63q9ayqgt

  • MD5

    475e2fda5ad2a6f7f976d7ecd6ff8e16

  • SHA1

    442159d5c54acc3cb0f7085e69afe44da5d13de2

  • SHA256

    bc89ca87a2a17284502b882043c34d61e8033a155dbe5c54b4755ade38deac86

  • SHA512

    10e2a1778987aa7f3e5ae4991583fb825390d383e50370062ba2d60f74a6c7d9668ef499d43d067a75d410a5305e636d40f89ea609bf52bd80a516dd03778f8e

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      ohshit.sh

    • Size

      2KB

    • MD5

      475e2fda5ad2a6f7f976d7ecd6ff8e16

    • SHA1

      442159d5c54acc3cb0f7085e69afe44da5d13de2

    • SHA256

      bc89ca87a2a17284502b882043c34d61e8033a155dbe5c54b4755ade38deac86

    • SHA512

      10e2a1778987aa7f3e5ae4991583fb825390d383e50370062ba2d60f74a6c7d9668ef499d43d067a75d410a5305e636d40f89ea609bf52bd80a516dd03778f8e

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks