General

  • Target

    657-1-0x00008000-0x000236c8-memory.dmp

  • Size

    96KB

  • Sample

    241209-s8fh3axngm

  • MD5

    02b47fd2698910577bee39886c141896

  • SHA1

    18aab48b530af1e87212d8beb0fda24135fd1bf1

  • SHA256

    397a06f856d6c07cd00594f2089b21d7f91cffd80bf6a5255c73a20f2add00e8

  • SHA512

    06e94133ac0aab68c0e7e7d7720e8742c1c42403b4450194121b4cd814541811d4df3f87b642e72c5acee1c8720cdd5c76540af3ebb476bb652525f38fc51903

  • SSDEEP

    3072:e0jlwv74BRae/xGPZ06v/mYp+C9T6Mjf5:e0jlwyRae/xGPd/z+cT6Of5

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      657-1-0x00008000-0x000236c8-memory.dmp

    • Size

      96KB

    • MD5

      02b47fd2698910577bee39886c141896

    • SHA1

      18aab48b530af1e87212d8beb0fda24135fd1bf1

    • SHA256

      397a06f856d6c07cd00594f2089b21d7f91cffd80bf6a5255c73a20f2add00e8

    • SHA512

      06e94133ac0aab68c0e7e7d7720e8742c1c42403b4450194121b4cd814541811d4df3f87b642e72c5acee1c8720cdd5c76540af3ebb476bb652525f38fc51903

    • SSDEEP

      3072:e0jlwv74BRae/xGPZ06v/mYp+C9T6Mjf5:e0jlwyRae/xGPd/z+cT6Of5

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks