General

  • Target

    0f35c78b4ae8dc35443ca05709319f3a7c89df264fab50dd1c06492208a6e676.sh

  • Size

    2KB

  • Sample

    241218-ckswgsxrby

  • MD5

    4407c3e17726938777439c7b1e59127e

  • SHA1

    257407b39db53e6f93df24ffa31fee7df69cfff9

  • SHA256

    0f35c78b4ae8dc35443ca05709319f3a7c89df264fab50dd1c06492208a6e676

  • SHA512

    4c6af409b8b15c28d057e621dee08ac3a77bf56ac76bcea08f038ec56e4dd3101031502e07709362f5a7cd47bd952d4697d50d9e5809644aab2a7ae139e43003

Malware Config

Extracted

Family

mirai

Botnet

UNSTABLE

C2

servers.vlrt-gap.com

Extracted

Family

mirai

Botnet

UNSTABLE

Extracted

Family

mirai

Botnet

UNSTABLE

C2

servers.vlrt-gap.com

Targets

    • Target

      0f35c78b4ae8dc35443ca05709319f3a7c89df264fab50dd1c06492208a6e676.sh

    • Size

      2KB

    • MD5

      4407c3e17726938777439c7b1e59127e

    • SHA1

      257407b39db53e6f93df24ffa31fee7df69cfff9

    • SHA256

      0f35c78b4ae8dc35443ca05709319f3a7c89df264fab50dd1c06492208a6e676

    • SHA512

      4c6af409b8b15c28d057e621dee08ac3a77bf56ac76bcea08f038ec56e4dd3101031502e07709362f5a7cd47bd952d4697d50d9e5809644aab2a7ae139e43003

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Deletes itself

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks