General

  • Target

    655-1-0x00008000-0x000236c8-memory.dmp

  • Size

    96KB

  • Sample

    241227-c6g14szpfl

  • MD5

    bc77543212475eb545d40e7d8f5a4aa7

  • SHA1

    6b254dc1c5230e4a0a6ca43927c2f1f3feb208e4

  • SHA256

    83347e2245d2b76d26324ad559b05cb1b6af2450cc7862e0b2b8ed64296f215e

  • SHA512

    86c29e74081d249f78d6111b92de24674b4193d18cb974686a48938b54b0ed6592e2451a122eae3e1e0d08626842c65f3882746205886dbf1c05e904716fc251

  • SSDEEP

    3072:s2bmltnY4BRae/xGPZ06v/mYp+C9T6Mjw5:XbmltXRae/xGPd/z+cT6Ow5

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      655-1-0x00008000-0x000236c8-memory.dmp

    • Size

      96KB

    • MD5

      bc77543212475eb545d40e7d8f5a4aa7

    • SHA1

      6b254dc1c5230e4a0a6ca43927c2f1f3feb208e4

    • SHA256

      83347e2245d2b76d26324ad559b05cb1b6af2450cc7862e0b2b8ed64296f215e

    • SHA512

      86c29e74081d249f78d6111b92de24674b4193d18cb974686a48938b54b0ed6592e2451a122eae3e1e0d08626842c65f3882746205886dbf1c05e904716fc251

    • SSDEEP

      3072:s2bmltnY4BRae/xGPZ06v/mYp+C9T6Mjw5:XbmltXRae/xGPd/z+cT6Ow5

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks