General

  • Target

    638-1-0x00008000-0x0002de68-memory.dmp

  • Size

    106KB

  • Sample

    241227-fy67taslep

  • MD5

    55c316ea34f338e59b855dd975780500

  • SHA1

    9aa52f5a0b920be157fb353b719ac2bf60154a99

  • SHA256

    532d5474e65ff58d6196eda907ffe22e378a2647ffe5bbdbf907d3b938317aac

  • SHA512

    d4574fcf5897795bbb5fbf3b7ecd09400b6e5ffbda3d5c0796c79f7aa70a1bf7024feb7875244b2e16c594da865ee4dd2bc7206e5a1eeb6d7d4718b6aa929f14

  • SSDEEP

    3072:bUvDiabnHsGC3AalhgyCT6097HjvNMI41Md:bUvmabH4AalhgyCOo3N6Md

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      638-1-0x00008000-0x0002de68-memory.dmp

    • Size

      106KB

    • MD5

      55c316ea34f338e59b855dd975780500

    • SHA1

      9aa52f5a0b920be157fb353b719ac2bf60154a99

    • SHA256

      532d5474e65ff58d6196eda907ffe22e378a2647ffe5bbdbf907d3b938317aac

    • SHA512

      d4574fcf5897795bbb5fbf3b7ecd09400b6e5ffbda3d5c0796c79f7aa70a1bf7024feb7875244b2e16c594da865ee4dd2bc7206e5a1eeb6d7d4718b6aa929f14

    • SSDEEP

      3072:bUvDiabnHsGC3AalhgyCT6097HjvNMI41Md:bUvmabH4AalhgyCOo3N6Md

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks