General
-
Target
2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5.sh
-
Size
2KB
-
Sample
241218-crfjqsylay
-
MD5
d7aac5b39f096043750096172ee9a84f
-
SHA1
fde809f81c26db59c148255c0b60176c8971bc0c
-
SHA256
2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5
-
SHA512
77c79dcb7c89e16cfe5d3712adf37173249b6066673ff20c2a2b6c90ebe2eb5ac5c295a250b6b9fc0596ff0872ecc15d4dec8852a515c0826436426dd5f1efff
Static task
static1
Behavioral task
behavioral1
Sample
2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5.sh
Resource
debian9-mipsbe-20240611-en
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Targets
-
-
Target
2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5.sh
-
Size
2KB
-
MD5
d7aac5b39f096043750096172ee9a84f
-
SHA1
fde809f81c26db59c148255c0b60176c8971bc0c
-
SHA256
2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5
-
SHA512
77c79dcb7c89e16cfe5d3712adf37173249b6066673ff20c2a2b6c90ebe2eb5ac5c295a250b6b9fc0596ff0872ecc15d4dec8852a515c0826436426dd5f1efff
-
Mirai family
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1