General
-
Target
1.sh
-
Size
2KB
-
Sample
241222-pwrh1sykdt
-
MD5
8364b34731a2e12ce67c2cfcb2811e75
-
SHA1
5d718457dfa0ecc1a46528696d2769d11adf018f
-
SHA256
cbeb5e39ef97058edd87f838971c4bab379a1a76a3b07b60cd9734efd8154cea
-
SHA512
ca94f2b3643f6047efc405c15eab8fce850602cb28dbf36d760e7b6010df32c202066ab2ef66a79e0437792d8b5babc6f7a5742f7cb26df6e6354b55e1c837f9
Static task
static1
Behavioral task
behavioral1
Sample
1.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
1.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
1.sh
Resource
debian9-mipsbe-20240611-en
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Targets
-
-
Target
1.sh
-
Size
2KB
-
MD5
8364b34731a2e12ce67c2cfcb2811e75
-
SHA1
5d718457dfa0ecc1a46528696d2769d11adf018f
-
SHA256
cbeb5e39ef97058edd87f838971c4bab379a1a76a3b07b60cd9734efd8154cea
-
SHA512
ca94f2b3643f6047efc405c15eab8fce850602cb28dbf36d760e7b6010df32c202066ab2ef66a79e0437792d8b5babc6f7a5742f7cb26df6e6354b55e1c837f9
-
Mirai family
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1