General

  • Target

    1.sh

  • Size

    2KB

  • Sample

    241216-jqdr3s1mdv

  • MD5

    27997dbf677f04b714e6bbc6c8731b3a

  • SHA1

    cdc488f161e0fdbd400b7fddfa7d3243105ee9a6

  • SHA256

    8ee9185ac547822d6029ed8cfe19578b9771125077080985e4bc37938daaf030

  • SHA512

    690ddc258ace9cdcb42fc1cd9e2f72fbb0613361a4f5e2fca9fc3a91fc1e61e9d799d52657ec6372093f32493a6f2b58a8a336346d81bc998aaca8cfe3e491b1

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      1.sh

    • Size

      2KB

    • MD5

      27997dbf677f04b714e6bbc6c8731b3a

    • SHA1

      cdc488f161e0fdbd400b7fddfa7d3243105ee9a6

    • SHA256

      8ee9185ac547822d6029ed8cfe19578b9771125077080985e4bc37938daaf030

    • SHA512

      690ddc258ace9cdcb42fc1cd9e2f72fbb0613361a4f5e2fca9fc3a91fc1e61e9d799d52657ec6372093f32493a6f2b58a8a336346d81bc998aaca8cfe3e491b1

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.