General

  • Target

    ohshit.sh

  • Size

    3KB

  • Sample

    241226-zx2eqazpcs

  • MD5

    7c5ed3803ed430d1f19ad74fda51642f

  • SHA1

    43d7c9d2e6065acbc7b1440a6e9a60bee8db353b

  • SHA256

    5bac9d684357a86485310dc0f98b63f0f9c0f08e7879c7812a0949ff882fe7c4

  • SHA512

    ff126662eb0097a5554f95a4b91c71481213e45f3f5a98a426ce49c7f15f32b422b2864cd97588d6360014e01e971003cfe1c63e58bc1bfadc38a4d150561565

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      ohshit.sh

    • Size

      3KB

    • MD5

      7c5ed3803ed430d1f19ad74fda51642f

    • SHA1

      43d7c9d2e6065acbc7b1440a6e9a60bee8db353b

    • SHA256

      5bac9d684357a86485310dc0f98b63f0f9c0f08e7879c7812a0949ff882fe7c4

    • SHA512

      ff126662eb0097a5554f95a4b91c71481213e45f3f5a98a426ce49c7f15f32b422b2864cd97588d6360014e01e971003cfe1c63e58bc1bfadc38a4d150561565

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks