General

  • Target

    327c9cb0c729c36cd319c1c289868f40cdfecd6cf41b9697cfdfdc48dd38c827.sh

  • Size

    2KB

  • Sample

    241212-cpb4jaxjbs

  • MD5

    d733ae5816517dae48097b7f847accb5

  • SHA1

    72997aecdd0ab479d3678cf57a57d4a2f10fcf11

  • SHA256

    327c9cb0c729c36cd319c1c289868f40cdfecd6cf41b9697cfdfdc48dd38c827

  • SHA512

    827cf08cc886e6404480bdbfadc55467bef16099b104734ed664fc608109ac09c248be8f83b4938c5f7a073a97a14c5f01ef33ec8acb16bd0f34b2debf32593e

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Extracted

Family

mirai

Botnet

BOTNET

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      327c9cb0c729c36cd319c1c289868f40cdfecd6cf41b9697cfdfdc48dd38c827.sh

    • Size

      2KB

    • MD5

      d733ae5816517dae48097b7f847accb5

    • SHA1

      72997aecdd0ab479d3678cf57a57d4a2f10fcf11

    • SHA256

      327c9cb0c729c36cd319c1c289868f40cdfecd6cf41b9697cfdfdc48dd38c827

    • SHA512

      827cf08cc886e6404480bdbfadc55467bef16099b104734ed664fc608109ac09c248be8f83b4938c5f7a073a97a14c5f01ef33ec8acb16bd0f34b2debf32593e

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • Contacts a large (93331) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks