General

  • Target

    674-1-0x00008000-0x00020b48-memory.dmp

  • Size

    96KB

  • Sample

    241227-lsjr8atpbw

  • MD5

    2985f3a7a80ffde5dd76508be6a7c2b6

  • SHA1

    3e2d6062c3b6f231c8bf2e29b0816504132f7d99

  • SHA256

    56dfd06b55f435104bf4d077f11c8c906d2c9531d4374dbc24ded65a730b65b4

  • SHA512

    f724195b321e2a7d8c489273b743b3ece55e0631a4e654e9cd2ba1f97728e61ef0939ef9f8a07ebfaf6f1084eec6068e184b6cf179b729a14fe56d781d8867e1

  • SSDEEP

    1536:7XnpuoZnZ4N5Q029rn5bzi1ARLBKUY4mYhbyMOrlcDZlmcKqF36riFNYIGYVKWdO:4SaNNcJBB3Ir2ZlmcKMFN1DUEG

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      674-1-0x00008000-0x00020b48-memory.dmp

    • Size

      96KB

    • MD5

      2985f3a7a80ffde5dd76508be6a7c2b6

    • SHA1

      3e2d6062c3b6f231c8bf2e29b0816504132f7d99

    • SHA256

      56dfd06b55f435104bf4d077f11c8c906d2c9531d4374dbc24ded65a730b65b4

    • SHA512

      f724195b321e2a7d8c489273b743b3ece55e0631a4e654e9cd2ba1f97728e61ef0939ef9f8a07ebfaf6f1084eec6068e184b6cf179b729a14fe56d781d8867e1

    • SSDEEP

      1536:7XnpuoZnZ4N5Q029rn5bzi1ARLBKUY4mYhbyMOrlcDZlmcKqF36riFNYIGYVKWdO:4SaNNcJBB3Ir2ZlmcKMFN1DUEG

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks