General

  • Target

    2354f2531c0bf296738fa7733c42785f.bin

  • Size

    30KB

  • Sample

    241224-bgfajsxld1

  • MD5

    f13930254668979e0122d89c120fcf87

  • SHA1

    489b1eef7c18670e815c357572d843d6bb4a370c

  • SHA256

    0dd712a06e7908f085002406fbbb8300222612d214461b6dde2dfda191572edc

  • SHA512

    d93ea22b8568391b5d9aa394d36b34c9eb71eeaf8d24e03cb03fc1aba1fd26524b26f7de951e7168e1ffe41365bdd5ba19c43333adb49ebf14bf34f7184c4c65

  • SSDEEP

    768:EN0mjDPN1h0ADZ7Vr3oV7TOVSXF1WH57X9Z3:EPjDPNk0ZS7K04H57tZ3

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      3d0b5252c0f8736759af8b122612395ea484794afbdeb5435769f3c164d04c93.elf

    • Size

      64KB

    • MD5

      2354f2531c0bf296738fa7733c42785f

    • SHA1

      86508e4ee74c70bf226f6666bf227a12be69dcad

    • SHA256

      3d0b5252c0f8736759af8b122612395ea484794afbdeb5435769f3c164d04c93

    • SHA512

      eda30463d2e8355af4d6626815aedb78b1b5d43c4df53e4a9a72405074a22e9fd09f54e882b0c5ad5136202907a7e6e599d29d325d6e0b3188e6f8ff77abe679

    • SSDEEP

      1536:IoRC9170vwHbQXZ5+qXDEuXi90dSW7V/DjObeFt6PuQ4Zc:PC917iwHbQXZ5+qXA594SWZ/XObeb6G7

    • Contacts a large (20172) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks