General

  • Target

    lg.sh

  • Size

    2KB

  • Sample

    241217-sszl1atkcr

  • MD5

    da180d83e0ae8aababafbeb821b3c9eb

  • SHA1

    1b8b4500bf2cf1ce57a37c30794ab2f76d16f5d9

  • SHA256

    6e8483856dc89de2b991fc4243d7df5bc9b13ed5d9c3fc042a097c2bc4d2cf35

  • SHA512

    01a7ebf410865c442d7a55f4731b9153ebe724274e518b565485eb045a7630b3e62f5c02eb4248ceb48c5359de9be451ff0cf46764846b457e97ec53c6ea451a

Malware Config

Extracted

Family

mirai

Botnet

UNSTABLE

C2

servers.vlrt-gap.com

Extracted

Family

mirai

Botnet

UNSTABLE

Extracted

Family

mirai

Botnet

UNSTABLE

C2

servers.vlrt-gap.com

Targets

    • Target

      lg.sh

    • Size

      2KB

    • MD5

      da180d83e0ae8aababafbeb821b3c9eb

    • SHA1

      1b8b4500bf2cf1ce57a37c30794ab2f76d16f5d9

    • SHA256

      6e8483856dc89de2b991fc4243d7df5bc9b13ed5d9c3fc042a097c2bc4d2cf35

    • SHA512

      01a7ebf410865c442d7a55f4731b9153ebe724274e518b565485eb045a7630b3e62f5c02eb4248ceb48c5359de9be451ff0cf46764846b457e97ec53c6ea451a

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Deletes itself

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks