General

  • Target

    loligang.mips.elf

  • Size

    87KB

  • Sample

    241218-p3kzta1kdn

  • MD5

    ea424d48526e7ec8da35e167c5b3f4fb

  • SHA1

    bf8ab87ec3f78a2e5e4d1ca716373c5d0557b8ab

  • SHA256

    38a9660cc6cc2e81a8e22634deefd8e37e1f4fccb987c60a8d126317e922bdf9

  • SHA512

    a2adc125fbfe4d714f9d135f058e7a43f3b084b8df8de2e9e1f2cb0445718294c910bafae4d54cde153b240fbd085c189ce1f6192e1db845ef7f01ed6e95249a

  • SSDEEP

    1536:1YRdsnDd6C6gb/ZVyDYjMbwqZ9f0vfwW9ufY1C+KBtyRirfXDOiO+3J:CHsnD8/gb/zyDv9f0HD9FC+KBtyR6/Dn

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      loligang.mips.elf

    • Size

      87KB

    • MD5

      ea424d48526e7ec8da35e167c5b3f4fb

    • SHA1

      bf8ab87ec3f78a2e5e4d1ca716373c5d0557b8ab

    • SHA256

      38a9660cc6cc2e81a8e22634deefd8e37e1f4fccb987c60a8d126317e922bdf9

    • SHA512

      a2adc125fbfe4d714f9d135f058e7a43f3b084b8df8de2e9e1f2cb0445718294c910bafae4d54cde153b240fbd085c189ce1f6192e1db845ef7f01ed6e95249a

    • SSDEEP

      1536:1YRdsnDd6C6gb/ZVyDYjMbwqZ9f0vfwW9ufY1C+KBtyRirfXDOiO+3J:CHsnD8/gb/zyDv9f0HD9FC+KBtyR6/Dn

    • Contacts a large (20033) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks