General

  • Target

    ohshit.sh

  • Size

    2KB

  • Sample

    241214-erctystlgz

  • MD5

    49f7303a16d7e14d54856f32a64edf18

  • SHA1

    78bf70845cf273e963f91e0a373e581e03ecb965

  • SHA256

    54ef205416581348885f545c913d0325c89e72c40cfc1f423e319855f0c40b6a

  • SHA512

    b4ff38959a17b997d9e6789f697962cf8ec56c4623d8cd357b025a58f653fe1f4732bd40607e3c20e12b6c0513714e7322143c133b845ef757db8131eb7c7be1

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      ohshit.sh

    • Size

      2KB

    • MD5

      49f7303a16d7e14d54856f32a64edf18

    • SHA1

      78bf70845cf273e963f91e0a373e581e03ecb965

    • SHA256

      54ef205416581348885f545c913d0325c89e72c40cfc1f423e319855f0c40b6a

    • SHA512

      b4ff38959a17b997d9e6789f697962cf8ec56c4623d8cd357b025a58f653fe1f4732bd40607e3c20e12b6c0513714e7322143c133b845ef757db8131eb7c7be1

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks