General

  • Target

    3d0b5252c0f8736759af8b122612395ea484794afbdeb5435769f3c164d04c93.elf

  • Size

    64KB

  • Sample

    241223-cjmcbatram

  • MD5

    2354f2531c0bf296738fa7733c42785f

  • SHA1

    86508e4ee74c70bf226f6666bf227a12be69dcad

  • SHA256

    3d0b5252c0f8736759af8b122612395ea484794afbdeb5435769f3c164d04c93

  • SHA512

    eda30463d2e8355af4d6626815aedb78b1b5d43c4df53e4a9a72405074a22e9fd09f54e882b0c5ad5136202907a7e6e599d29d325d6e0b3188e6f8ff77abe679

  • SSDEEP

    1536:IoRC9170vwHbQXZ5+qXDEuXi90dSW7V/DjObeFt6PuQ4Zc:PC917iwHbQXZ5+qXA594SWZ/XObeb6G7

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      3d0b5252c0f8736759af8b122612395ea484794afbdeb5435769f3c164d04c93.elf

    • Size

      64KB

    • MD5

      2354f2531c0bf296738fa7733c42785f

    • SHA1

      86508e4ee74c70bf226f6666bf227a12be69dcad

    • SHA256

      3d0b5252c0f8736759af8b122612395ea484794afbdeb5435769f3c164d04c93

    • SHA512

      eda30463d2e8355af4d6626815aedb78b1b5d43c4df53e4a9a72405074a22e9fd09f54e882b0c5ad5136202907a7e6e599d29d325d6e0b3188e6f8ff77abe679

    • SSDEEP

      1536:IoRC9170vwHbQXZ5+qXDEuXi90dSW7V/DjObeFt6PuQ4Zc:PC917iwHbQXZ5+qXA594SWZ/XObeb6G7

    • Contacts a large (20392) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks