General

  • Target

    loligang.mpsl.elf

  • Size

    89KB

  • Sample

    241222-xym8dawqhq

  • MD5

    9a397c973a66d7380ca64d61070b88d3

  • SHA1

    f6828d001883357d22adf948b087ca400c5498dc

  • SHA256

    67b7d4c356522d870024d4f04289dc6bcc53537209478fe43347511abb7e63fc

  • SHA512

    18c4d902787043acdc63b3640f6e405dc8f96be38fbd40664595b1c6224adddcfc7895a20417a0de140c8280dc117f3dc7e9bcbb9336b8f0eabfb9f44d7adb77

  • SSDEEP

    1536:NYCYxrXP40ODyPwHRQ9PlzTRfyToNoZqCi:qCYxrKDy46Nr

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      loligang.mpsl.elf

    • Size

      89KB

    • MD5

      9a397c973a66d7380ca64d61070b88d3

    • SHA1

      f6828d001883357d22adf948b087ca400c5498dc

    • SHA256

      67b7d4c356522d870024d4f04289dc6bcc53537209478fe43347511abb7e63fc

    • SHA512

      18c4d902787043acdc63b3640f6e405dc8f96be38fbd40664595b1c6224adddcfc7895a20417a0de140c8280dc117f3dc7e9bcbb9336b8f0eabfb9f44d7adb77

    • SSDEEP

      1536:NYCYxrXP40ODyPwHRQ9PlzTRfyToNoZqCi:qCYxrKDy46Nr

    • Contacts a large (20263) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks