General

  • Target

    1405-1-0x0000000000400000-0x0000000000614b00-memory.dmp

  • Size

    77KB

  • Sample

    241227-lq1mystpaw

  • MD5

    2a4ebc1f85d6adf33676697d6dd58d8f

  • SHA1

    a99b7e1c143f7d36ed9135c41c8296992b6cc527

  • SHA256

    5b58dba0069db877bc4f2cb783cdd38a1c1779e07dd6c6a9967202fb9d35fed4

  • SHA512

    f6c97177df73b45dd8b61591a435b7d5da7e6e8943c8a09c896f45dfc5171608b74d5f35e7568f3ee7300296a1d46d9aa77876a434bbf248c69faaf7f3e3cb6d

  • SSDEEP

    1536:UtQ59MwY2MhldlO+ttM98cKJdxZZxJ+BAQoEQ1It3R+yd5bUWarW8j0tZxH1c2Yu:UfwfsdlX/3AnmPc

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      1405-1-0x0000000000400000-0x0000000000614b00-memory.dmp

    • Size

      77KB

    • MD5

      2a4ebc1f85d6adf33676697d6dd58d8f

    • SHA1

      a99b7e1c143f7d36ed9135c41c8296992b6cc527

    • SHA256

      5b58dba0069db877bc4f2cb783cdd38a1c1779e07dd6c6a9967202fb9d35fed4

    • SHA512

      f6c97177df73b45dd8b61591a435b7d5da7e6e8943c8a09c896f45dfc5171608b74d5f35e7568f3ee7300296a1d46d9aa77876a434bbf248c69faaf7f3e3cb6d

    • SSDEEP

      1536:UtQ59MwY2MhldlO+ttM98cKJdxZZxJ+BAQoEQ1It3R+yd5bUWarW8j0tZxH1c2Yu:UfwfsdlX/3AnmPc

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks