General

  • Target

    loligang.arm7.elf

  • Size

    141KB

  • Sample

    241218-p5ldcszldz

  • MD5

    39771fea20ce2ab602edd265e2e228f9

  • SHA1

    6e8c811eb8c3ac3402463d64113d5c30e528e30b

  • SHA256

    cb7fa9a8dcef85d5c088d80d6e49d3ee9df0feda1dde95fe2b8f9b245f3d3e96

  • SHA512

    feb4c91031c4e9a4b9c6d29b6adb9abae26865d0138310ba2001c543f779fde4fad3fb5253c9a2bf9fbe40871f6ca209a60a65b4e782f5e5141d0d6ad83a0852

  • SSDEEP

    3072:walgM69pe0QmlTvIUdt9mrsplDKZUQQBKXAVanXX+F8JyvSPhLZ85iBMR6yoC1Q2:walgM69pe0QmlTvI8t9mrsplDKZUQQB3

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      loligang.arm7.elf

    • Size

      141KB

    • MD5

      39771fea20ce2ab602edd265e2e228f9

    • SHA1

      6e8c811eb8c3ac3402463d64113d5c30e528e30b

    • SHA256

      cb7fa9a8dcef85d5c088d80d6e49d3ee9df0feda1dde95fe2b8f9b245f3d3e96

    • SHA512

      feb4c91031c4e9a4b9c6d29b6adb9abae26865d0138310ba2001c543f779fde4fad3fb5253c9a2bf9fbe40871f6ca209a60a65b4e782f5e5141d0d6ad83a0852

    • SSDEEP

      3072:walgM69pe0QmlTvIUdt9mrsplDKZUQQBKXAVanXX+F8JyvSPhLZ85iBMR6yoC1Q2:walgM69pe0QmlTvI8t9mrsplDKZUQQB3

    • Contacts a large (19309) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks