General

  • Target

    loligang.x86.elf

  • Size

    64KB

  • Sample

    241212-w5fw7svlgj

  • MD5

    03016c92a7920fa8c20578aeed9a6bc8

  • SHA1

    079f4e92cd40e6c6cbeb44e97aa2a5b038cf33e5

  • SHA256

    7ddcd50e0416e567d5ef8df927f7932324cddbb7991a46d30aadf0d224c422b1

  • SHA512

    c3db3dc67dedcda41e3d279cb73684cf464c638e2622f5970e9e90b47c0f8e48f2a416d7643713cb5637564bf362dd6e587e252beb8c7f2082ac4424f808ee65

  • SSDEEP

    1536:IoRC9170vwHbQXZ5+qXDEuXi90dSW7V/DjObeFt6PuQ4Zd:PC917iwHbQXZ5+qXA594SWZ/XObeb6G7

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      loligang.x86.elf

    • Size

      64KB

    • MD5

      03016c92a7920fa8c20578aeed9a6bc8

    • SHA1

      079f4e92cd40e6c6cbeb44e97aa2a5b038cf33e5

    • SHA256

      7ddcd50e0416e567d5ef8df927f7932324cddbb7991a46d30aadf0d224c422b1

    • SHA512

      c3db3dc67dedcda41e3d279cb73684cf464c638e2622f5970e9e90b47c0f8e48f2a416d7643713cb5637564bf362dd6e587e252beb8c7f2082ac4424f808ee65

    • SSDEEP

      1536:IoRC9170vwHbQXZ5+qXDEuXi90dSW7V/DjObeFt6PuQ4Zd:PC917iwHbQXZ5+qXA594SWZ/XObeb6G7

    • Contacts a large (20419) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks