General

  • Target

    zyxel.sh

  • Size

    2KB

  • Sample

    241211-1qjf1atqem

  • MD5

    a0199facb791d7850b52afacf2a2e128

  • SHA1

    6624d420ab48c43e97ef21c64fa8516be2828edc

  • SHA256

    328337d8d4b3c09739ed40ab2b3061d75f6d52d5157d6216964df7a6a6796e2e

  • SHA512

    7f9dfacee20432d0296ab8ff58531dcf86ce2f0959a91d03038ae444499279a03f6224cc90341fb8e6c2a0efce63b0d2ecf07c4141ff61ee7699ed8d806c5fc6

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Extracted

Family

mirai

Botnet

BOTNET

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      zyxel.sh

    • Size

      2KB

    • MD5

      a0199facb791d7850b52afacf2a2e128

    • SHA1

      6624d420ab48c43e97ef21c64fa8516be2828edc

    • SHA256

      328337d8d4b3c09739ed40ab2b3061d75f6d52d5157d6216964df7a6a6796e2e

    • SHA512

      7f9dfacee20432d0296ab8ff58531dcf86ce2f0959a91d03038ae444499279a03f6224cc90341fb8e6c2a0efce63b0d2ecf07c4141ff61ee7699ed8d806c5fc6

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • Contacts a large (98777) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks