General

  • Target

    22236b19790e4e0f36d79cf0f90afdbdd20de713c329ec106e93f29229d012cc.sh

  • Size

    2KB

  • Sample

    241218-crmytaylbz

  • MD5

    9bfdac5c8b82517847d1590979a41c35

  • SHA1

    1df3546c5413cd12038dd8634caf866ecb49e916

  • SHA256

    22236b19790e4e0f36d79cf0f90afdbdd20de713c329ec106e93f29229d012cc

  • SHA512

    dffba9334cdb174bc3df07047482a6143ea8a981e25a9d32f52cd63a6ae6627495559721de94e7796ea9acca94ff83350fb91a9e7170493b11c3cb289c4b6408

Malware Config

Extracted

Family

mirai

Botnet

UNSTABLE

C2

servers.vlrt-gap.com

Extracted

Family

mirai

Botnet

UNSTABLE

Extracted

Family

mirai

Botnet

UNSTABLE

C2

servers.vlrt-gap.com

Targets

    • Target

      22236b19790e4e0f36d79cf0f90afdbdd20de713c329ec106e93f29229d012cc.sh

    • Size

      2KB

    • MD5

      9bfdac5c8b82517847d1590979a41c35

    • SHA1

      1df3546c5413cd12038dd8634caf866ecb49e916

    • SHA256

      22236b19790e4e0f36d79cf0f90afdbdd20de713c329ec106e93f29229d012cc

    • SHA512

      dffba9334cdb174bc3df07047482a6143ea8a981e25a9d32f52cd63a6ae6627495559721de94e7796ea9acca94ff83350fb91a9e7170493b11c3cb289c4b6408

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Deletes itself

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks