General

  • Target

    adba996c396000c7c23c0feca109c5fef6e09ba3fa0ea24b7efa0981e9b06d97.sh

  • Size

    2KB

  • Sample

    241212-c4kzzsskfj

  • MD5

    040794fa1b164cf6f00a08d2c1da58e3

  • SHA1

    5f214c18e66981f06982cf3f4b91386fe093e559

  • SHA256

    adba996c396000c7c23c0feca109c5fef6e09ba3fa0ea24b7efa0981e9b06d97

  • SHA512

    c0d0b351204e3a7921d89c4c33b2d3fc29eb827cb5d36a198e624dbcfcb535e1e99dac7b1f8f9f0771869b930a1fa14879624f4b26b4e47bf198fdde461c0a43

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Extracted

Family

mirai

Botnet

BOTNET

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      adba996c396000c7c23c0feca109c5fef6e09ba3fa0ea24b7efa0981e9b06d97.sh

    • Size

      2KB

    • MD5

      040794fa1b164cf6f00a08d2c1da58e3

    • SHA1

      5f214c18e66981f06982cf3f4b91386fe093e559

    • SHA256

      adba996c396000c7c23c0feca109c5fef6e09ba3fa0ea24b7efa0981e9b06d97

    • SHA512

      c0d0b351204e3a7921d89c4c33b2d3fc29eb827cb5d36a198e624dbcfcb535e1e99dac7b1f8f9f0771869b930a1fa14879624f4b26b4e47bf198fdde461c0a43

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • Contacts a large (98767) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks