General

  • Target

    3df4818172a2c3f368c46c31653003cdbc96735dfc0b13fca4599e00817d6396.elf

  • Size

    71KB

  • Sample

    241209-cn3vvsxqft

  • MD5

    2b787440f24138885107fd3752100ba6

  • SHA1

    966946768d7e0a8369596215ce915898e08d93f4

  • SHA256

    3df4818172a2c3f368c46c31653003cdbc96735dfc0b13fca4599e00817d6396

  • SHA512

    85244a4fe3a4e57a06ea083e3f7b77498059faf8d59bc87b1b2badce735052c9f7c48d596b8eb6be61dfebbca273cfb3dd72e917945ed233977b6b9303fbcb95

  • SSDEEP

    1536:WgAahukqyAyQgdR9Bc6taLWTeifJe6P0rWAsAoZLHOncFJVLpc/+bR6l:WgAtkf9aWZRJlJEGbC

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      3df4818172a2c3f368c46c31653003cdbc96735dfc0b13fca4599e00817d6396.elf

    • Size

      71KB

    • MD5

      2b787440f24138885107fd3752100ba6

    • SHA1

      966946768d7e0a8369596215ce915898e08d93f4

    • SHA256

      3df4818172a2c3f368c46c31653003cdbc96735dfc0b13fca4599e00817d6396

    • SHA512

      85244a4fe3a4e57a06ea083e3f7b77498059faf8d59bc87b1b2badce735052c9f7c48d596b8eb6be61dfebbca273cfb3dd72e917945ed233977b6b9303fbcb95

    • SSDEEP

      1536:WgAahukqyAyQgdR9Bc6taLWTeifJe6P0rWAsAoZLHOncFJVLpc/+bR6l:WgAtkf9aWZRJlJEGbC

    • Contacts a large (23831) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

MITRE ATT&CK Enterprise v15

Tasks