General

  • Target

    228b648ba3082c01436d3a993ab3f486815853704cb09518f3ffed92deaec9b3.elf

  • Size

    74KB

  • Sample

    241209-cl7q2asqbp

  • MD5

    6f385e34a529a813db4e20750b6c14af

  • SHA1

    651d7fc6b969f4e4a9e678f1168f87a287a208ac

  • SHA256

    228b648ba3082c01436d3a993ab3f486815853704cb09518f3ffed92deaec9b3

  • SHA512

    34e1475cb475e7e548489a4e430c9bc39c6db3c7264199d1bb9bba46be3e2023443fdd6efb94ab914b271ef596ee551a170f309b9848b6104b96d2431b8a2c9f

  • SSDEEP

    1536:usO1+BkQ8yi6dT9ncsnxLs9ewNJ4LtGKu/NsAqXLHeiNODui9VAU1vu:usO1akQLk/yz7+iNi/pu

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      228b648ba3082c01436d3a993ab3f486815853704cb09518f3ffed92deaec9b3.elf

    • Size

      74KB

    • MD5

      6f385e34a529a813db4e20750b6c14af

    • SHA1

      651d7fc6b969f4e4a9e678f1168f87a287a208ac

    • SHA256

      228b648ba3082c01436d3a993ab3f486815853704cb09518f3ffed92deaec9b3

    • SHA512

      34e1475cb475e7e548489a4e430c9bc39c6db3c7264199d1bb9bba46be3e2023443fdd6efb94ab914b271ef596ee551a170f309b9848b6104b96d2431b8a2c9f

    • SSDEEP

      1536:usO1+BkQ8yi6dT9ncsnxLs9ewNJ4LtGKu/NsAqXLHeiNODui9VAU1vu:usO1akQLk/yz7+iNi/pu

    • Contacts a large (22867) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks