General

  • Target

    abde533a1866fb17c76ff1edcf5facd1.bin

  • Size

    60KB

  • Sample

    241224-b55kcayjcy

  • MD5

    da850262bdf294fbe52e9dff5252793a

  • SHA1

    0cf7286efc0a4c9f54b4a81a516d26e8e1faa16d

  • SHA256

    5a0c0e20848877abf758100c013918aae74f0edc7cd0879d9972b4b401fa15e7

  • SHA512

    debdc7ba66a2458663a533b60a1a21fe5182b84d9455de15c3e4f5762b5c8e7d217b6c49b90dc9fc5a663f1e7057f4b65d429a11e57172e830dc1c83acfe26b6

  • SSDEEP

    768:xphSZsk1rOK4lzJY0TR+0tobF4lefrWsjnFNr+FNSaNMUA0EZM7uhM470Courq6v:xpUEzTBcqeTWirraNSahk30oTu9VCtX

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      ce83c30530762a5dc8832ea605a05d7c411c33d63465ce96cc37b7ef02d4223b.elf

    • Size

      141KB

    • MD5

      abde533a1866fb17c76ff1edcf5facd1

    • SHA1

      21bd062bb8d518f384ed18ca0f2cef91cffbb5f8

    • SHA256

      ce83c30530762a5dc8832ea605a05d7c411c33d63465ce96cc37b7ef02d4223b

    • SHA512

      d55f6adfa3dd8b543ed972d6562c8f20cbcb0772f3b7dbc125f2dab9183c92f00feee991f75d85d33add31429f077c64e0d87bda4ab4ef18f159e7e6b116dfec

    • SSDEEP

      3072:walgM69pe0QmlTvIUdt9mrsplDKZUQQBKXAVanXX+F8JyvSPhLZ85iBMR6yoC1Qo:walgM69pe0QmlTvI8t9mrsplDKZUQQBt

    • Contacts a large (20386) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks