General

  • Target

    loligang.mpsl.elf

  • Size

    89KB

  • Sample

    241218-p3kzta1kdm

  • MD5

    e11bac278d87af5c2eb3771a738b92de

  • SHA1

    e274cfb910e85ac8b05cb87dc325d92c28de381d

  • SHA256

    6f16eacb53d3ec46cac764a5c6ff30cb3b781dd7a21b1c0da0d2004e5f143492

  • SHA512

    537746dd70e59622dbd68d2a4b80ff84722d980a06373b6ec71987e0715db682f9376b69a644de4e3046ab6f81318373c36ce6c837c7e84063abadafe61a61f3

  • SSDEEP

    1536:NYCYxrXP40ODyPwHRQ9PlzTRfyToNoZqci:qCYxrKDy46NZ

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      loligang.mpsl.elf

    • Size

      89KB

    • MD5

      e11bac278d87af5c2eb3771a738b92de

    • SHA1

      e274cfb910e85ac8b05cb87dc325d92c28de381d

    • SHA256

      6f16eacb53d3ec46cac764a5c6ff30cb3b781dd7a21b1c0da0d2004e5f143492

    • SHA512

      537746dd70e59622dbd68d2a4b80ff84722d980a06373b6ec71987e0715db682f9376b69a644de4e3046ab6f81318373c36ce6c837c7e84063abadafe61a61f3

    • SSDEEP

      1536:NYCYxrXP40ODyPwHRQ9PlzTRfyToNoZqci:qCYxrKDy46NZ

    • Contacts a large (20703) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks