General

  • Target

    712-1-0x00008000-0x00026460-memory.dmp

  • Size

    76KB

  • Sample

    241208-w12cca1pdv

  • MD5

    2d8c994f6d0bbd04e6dc224af939eb1e

  • SHA1

    2457033d5d34abbcf501c5a2bda86cb101338de7

  • SHA256

    a9c697f18311f3b952f4ddd10ef98a13ab2c03a40c7c4547de3b51ab99109779

  • SHA512

    3b8be6817018d89238013b8cd6e2380b39c01a25c721390d2ef54630918a7dab467279ddaf9eac87b4ddc28afff684230a4140503da2023bb64adb24dfa11438

  • SSDEEP

    1536:O0n09sBw8wu66UyKe8RK1IPL7vrQ/yRSxscBqlIull42piLGIvdWKE0:K8wxuQyBKaeWyRSxscBqPmGIvdWD0

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      712-1-0x00008000-0x00026460-memory.dmp

    • Size

      76KB

    • MD5

      2d8c994f6d0bbd04e6dc224af939eb1e

    • SHA1

      2457033d5d34abbcf501c5a2bda86cb101338de7

    • SHA256

      a9c697f18311f3b952f4ddd10ef98a13ab2c03a40c7c4547de3b51ab99109779

    • SHA512

      3b8be6817018d89238013b8cd6e2380b39c01a25c721390d2ef54630918a7dab467279ddaf9eac87b4ddc28afff684230a4140503da2023bb64adb24dfa11438

    • SSDEEP

      1536:O0n09sBw8wu66UyKe8RK1IPL7vrQ/yRSxscBqlIull42piLGIvdWKE0:K8wxuQyBKaeWyRSxscBqPmGIvdWD0

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks