General

  • Target

    b227b21464f7bab9315851cd736fd7f0ef43d656644902c3ab8d35ed4b265da5.sh

  • Size

    2KB

  • Sample

    241212-c47hzsskgl

  • MD5

    a777508a562c257010665c3abb5146e8

  • SHA1

    092202490918dbbb91c0e470c3c26028f10fdc18

  • SHA256

    b227b21464f7bab9315851cd736fd7f0ef43d656644902c3ab8d35ed4b265da5

  • SHA512

    f389991a64e123b2e54f47a649be6b77a5ea7da71af6cc08b310abb74e2dfcd283bcc5e46b16f28e39df3ebbe3fb4d178fe2a5ea6076af0d3483ef2ca6d0b658

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Extracted

Family

mirai

Botnet

BOTNET

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      b227b21464f7bab9315851cd736fd7f0ef43d656644902c3ab8d35ed4b265da5.sh

    • Size

      2KB

    • MD5

      a777508a562c257010665c3abb5146e8

    • SHA1

      092202490918dbbb91c0e470c3c26028f10fdc18

    • SHA256

      b227b21464f7bab9315851cd736fd7f0ef43d656644902c3ab8d35ed4b265da5

    • SHA512

      f389991a64e123b2e54f47a649be6b77a5ea7da71af6cc08b310abb74e2dfcd283bcc5e46b16f28e39df3ebbe3fb4d178fe2a5ea6076af0d3483ef2ca6d0b658

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • Contacts a large (88794) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks