General

  • Target

    de9d9fd7681fc41b0d746e329ddeae164410684f58105696ae0f1515684c02f8.elf

  • Size

    72KB

  • Sample

    241225-das9yavqcs

  • MD5

    a88fc39cfa6320101a162918ae49a8fb

  • SHA1

    dfe331f3253c355ae266ef9b7981046951d91682

  • SHA256

    de9d9fd7681fc41b0d746e329ddeae164410684f58105696ae0f1515684c02f8

  • SHA512

    9211289bdd9aace94398d3cc6ce24215bfd0c4628cdc997d4892e6b65b4b48437a5173e1ebb3a327e42024d68c6635649fa619edd79590bf32e01c3968b71a3d

  • SSDEEP

    1536:NP8HQs/nh9adZkrOsDYuY061vDOH3RJTWxVSSW4aB/yUFj4rmopitQOZVB:No/nh9adZsOsDYuY061rgXWSSWz/BxeG

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      de9d9fd7681fc41b0d746e329ddeae164410684f58105696ae0f1515684c02f8.elf

    • Size

      72KB

    • MD5

      a88fc39cfa6320101a162918ae49a8fb

    • SHA1

      dfe331f3253c355ae266ef9b7981046951d91682

    • SHA256

      de9d9fd7681fc41b0d746e329ddeae164410684f58105696ae0f1515684c02f8

    • SHA512

      9211289bdd9aace94398d3cc6ce24215bfd0c4628cdc997d4892e6b65b4b48437a5173e1ebb3a327e42024d68c6635649fa619edd79590bf32e01c3968b71a3d

    • SSDEEP

      1536:NP8HQs/nh9adZkrOsDYuY061vDOH3RJTWxVSSW4aB/yUFj4rmopitQOZVB:No/nh9adZsOsDYuY061rgXWSSWz/BxeG

    • Contacts a large (20363) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks