General

  • Target

    656-1-0x00008000-0x000236c8-memory.dmp

  • Size

    96KB

  • Sample

    241226-14v2ysspd1

  • MD5

    6340cd05af7bf41cbf0f1fd3d7627c58

  • SHA1

    b62f63904f4b997916b205f80e9e11ac57b3e73a

  • SHA256

    2088524cf5afb154c941fd48cb53fc6e9c156bbafced180fdd7a0e198ebdf5a5

  • SHA512

    f714a34616e8ad20ce761e0b76cf557d1a94961a71982bc5b09254320e8af482c6a7d425c2b27e5ca73cb1f60c9aef8704656bc8448cc846272bbd4ace7863ed

  • SSDEEP

    3072:e0jlwv74BRae/xGPZ06v/mYp+C9T6Mju5:e0jlwyRae/xGPd/z+cT6Ou5

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      656-1-0x00008000-0x000236c8-memory.dmp

    • Size

      96KB

    • MD5

      6340cd05af7bf41cbf0f1fd3d7627c58

    • SHA1

      b62f63904f4b997916b205f80e9e11ac57b3e73a

    • SHA256

      2088524cf5afb154c941fd48cb53fc6e9c156bbafced180fdd7a0e198ebdf5a5

    • SHA512

      f714a34616e8ad20ce761e0b76cf557d1a94961a71982bc5b09254320e8af482c6a7d425c2b27e5ca73cb1f60c9aef8704656bc8448cc846272bbd4ace7863ed

    • SSDEEP

      3072:e0jlwv74BRae/xGPZ06v/mYp+C9T6Mju5:e0jlwyRae/xGPd/z+cT6Ou5

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks