General

  • Target

    1c247c4e9f82b2fac23de074011d724d.bin

  • Size

    34KB

  • Sample

    241226-bgnxpatkel

  • MD5

    01cbeb5724cdc3fac4b088b213e34946

  • SHA1

    28586e121f04bbf4dd8cd5d561d12e80826a3950

  • SHA256

    a1fc073e9cd447ef16a9a3164d38eb96df1b0d1a9b0e98903574bf737fc28654

  • SHA512

    182444b5d0f2a944cdbeaec8e94c0dc839f6838502620681c1057e4f5edf5e9797f3b76c0815cc9a49e55f858601b6455f8a272cd141d73223168eff38e8d687

  • SSDEEP

    768:MblZ1aFwPfuHmbk8eGM8oYxs/iHlexL7b8sGvwHGfHKJ:M3K8FI/Xgxsq4d74YoKJ

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      2e6870fb45436c54e458c56af1340d96ad8f61c3226b4de21e7cce3901577195.elf

    • Size

      103KB

    • MD5

      1c247c4e9f82b2fac23de074011d724d

    • SHA1

      33a5a38f60e72e4d666c582faae62b2342fac926

    • SHA256

      2e6870fb45436c54e458c56af1340d96ad8f61c3226b4de21e7cce3901577195

    • SHA512

      60f77a16f2b24133ec2d1ae7ee0b0b09061d0c45222591c0fd2c282a1b3f12c3c3f40aa5edee8124a755ca8a35951a989b165a6625797caccab1e3e9198b70db

    • SSDEEP

      1536:d7fjpr4NEQu3p0ZwIGH5PbpTBRRtBeiZebzELY+iYp:d7fjpr53pndeis9F2

    • Contacts a large (19744) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks