General

  • Target

    9a397c973a66d7380ca64d61070b88d3.bin

  • Size

    29KB

  • Sample

    241224-b2hamsykcn

  • MD5

    5c4feda9f22fc592b60ebc3702fc4dd3

  • SHA1

    531758190d2002737cac72a79718306daf3b889f

  • SHA256

    0209d4351223ba1063c5afdc5b587869eed82a483ac5d8bb47eedba8fb341db4

  • SHA512

    3f3f4258bb14fbe0985497a50239829d2fdfff1f901dbc366a10d9e06877edc21ae71e91a505322d5b05e9393b7de42e8daed6d94aaa046898ef5bce5e75774b

  • SSDEEP

    768:3fmBu8nMhpaGjwFo6iIEflgYqonQLkUbeZ4rwlU0:JtAGjCoKUlzqoQLNaOIU0

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      67b7d4c356522d870024d4f04289dc6bcc53537209478fe43347511abb7e63fc.elf

    • Size

      89KB

    • MD5

      9a397c973a66d7380ca64d61070b88d3

    • SHA1

      f6828d001883357d22adf948b087ca400c5498dc

    • SHA256

      67b7d4c356522d870024d4f04289dc6bcc53537209478fe43347511abb7e63fc

    • SHA512

      18c4d902787043acdc63b3640f6e405dc8f96be38fbd40664595b1c6224adddcfc7895a20417a0de140c8280dc117f3dc7e9bcbb9336b8f0eabfb9f44d7adb77

    • SSDEEP

      1536:NYCYxrXP40ODyPwHRQ9PlzTRfyToNoZqCi:qCYxrKDy46Nr

    • Contacts a large (12720) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks