General

  • Target

    byte.mips.elf

  • Size

    104KB

  • Sample

    241227-pmqv5avnb1

  • MD5

    98bcfd120f315d9a9fa3b0645db87092

  • SHA1

    d151e6784d1556efb7a932a9b84effd64043bfae

  • SHA256

    b3bfa58c4e2b12d2dfa7571a84ca63bd2103e2f022e0f7caa8f02607e9f96d51

  • SHA512

    c63aa8a5bf7e3e3a5805732b0430747639f5424827c517ada419e1c1adcbece8b34797cb588bbcf166ddfd9bb239e7295ca88d3f3de1f35b4f5ad99bcd977523

  • SSDEEP

    1536:rWSIow5K0LU/RO1L2HVjShCL8kzmEmfrhdogZeB9il61d60qH:xCfU/ROtujShCL8kzmEmfNdhGi4XqH

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      byte.mips.elf

    • Size

      104KB

    • MD5

      98bcfd120f315d9a9fa3b0645db87092

    • SHA1

      d151e6784d1556efb7a932a9b84effd64043bfae

    • SHA256

      b3bfa58c4e2b12d2dfa7571a84ca63bd2103e2f022e0f7caa8f02607e9f96d51

    • SHA512

      c63aa8a5bf7e3e3a5805732b0430747639f5424827c517ada419e1c1adcbece8b34797cb588bbcf166ddfd9bb239e7295ca88d3f3de1f35b4f5ad99bcd977523

    • SSDEEP

      1536:rWSIow5K0LU/RO1L2HVjShCL8kzmEmfrhdogZeB9il61d60qH:xCfU/ROtujShCL8kzmEmfNdhGi4XqH

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks