General
-
Target
1.sh
-
Size
2KB
-
Sample
241221-jh321awner
-
MD5
5900bec79ec2bba33659f8a9dfe92eb6
-
SHA1
73ec8e41322311f983e35396c66fab7ab580aa72
-
SHA256
984686cc7b69066b7963531fa7948f8134fa9fd2f5beabcea849b2e5d852cbcc
-
SHA512
671afe06a8c6d5108d48010d0ff4697c514e0febcbfd602d2953f9e13469ea05761386b9500b5a4d52b57b45f7cc037282b657110676f52f2d95f54cc2896a42
Static task
static1
Behavioral task
behavioral1
Sample
1.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
1.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
1.sh
Resource
debian9-mipsbe-20240611-en
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Targets
-
-
Target
1.sh
-
Size
2KB
-
MD5
5900bec79ec2bba33659f8a9dfe92eb6
-
SHA1
73ec8e41322311f983e35396c66fab7ab580aa72
-
SHA256
984686cc7b69066b7963531fa7948f8134fa9fd2f5beabcea849b2e5d852cbcc
-
SHA512
671afe06a8c6d5108d48010d0ff4697c514e0febcbfd602d2953f9e13469ea05761386b9500b5a4d52b57b45f7cc037282b657110676f52f2d95f54cc2896a42
-
Mirai family
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1