General

  • Target

    2e6870fb45436c54e458c56af1340d96ad8f61c3226b4de21e7cce3901577195.elf

  • Size

    103KB

  • Sample

    241225-cll5bstqfs

  • MD5

    1c247c4e9f82b2fac23de074011d724d

  • SHA1

    33a5a38f60e72e4d666c582faae62b2342fac926

  • SHA256

    2e6870fb45436c54e458c56af1340d96ad8f61c3226b4de21e7cce3901577195

  • SHA512

    60f77a16f2b24133ec2d1ae7ee0b0b09061d0c45222591c0fd2c282a1b3f12c3c3f40aa5edee8124a755ca8a35951a989b165a6625797caccab1e3e9198b70db

  • SSDEEP

    1536:d7fjpr4NEQu3p0ZwIGH5PbpTBRRtBeiZebzELY+iYp:d7fjpr53pndeis9F2

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      2e6870fb45436c54e458c56af1340d96ad8f61c3226b4de21e7cce3901577195.elf

    • Size

      103KB

    • MD5

      1c247c4e9f82b2fac23de074011d724d

    • SHA1

      33a5a38f60e72e4d666c582faae62b2342fac926

    • SHA256

      2e6870fb45436c54e458c56af1340d96ad8f61c3226b4de21e7cce3901577195

    • SHA512

      60f77a16f2b24133ec2d1ae7ee0b0b09061d0c45222591c0fd2c282a1b3f12c3c3f40aa5edee8124a755ca8a35951a989b165a6625797caccab1e3e9198b70db

    • SSDEEP

      1536:d7fjpr4NEQu3p0ZwIGH5PbpTBRRtBeiZebzELY+iYp:d7fjpr53pndeis9F2

    • Contacts a large (20531) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks