General

  • Target

    657-1-0x00008000-0x00020b48-memory.dmp

  • Size

    96KB

  • Sample

    241227-rlsz7swmhm

  • MD5

    4157a80e60ca1ae63f8967c8edf4c955

  • SHA1

    c747cc45a59fdd86241a7b9a0fd1570eac3a72f8

  • SHA256

    61bdc763d3b0a3547a99ab2bca652735ba7e47d78a6b57d6bd2df75c867c9ca4

  • SHA512

    a197d752d20a44b195f544d26862dabc85f5d3f84c871b223ed942b2323401006e747d07a2c8d4a93034d8421344de6212a51e9aacf450b7f625474cb43ed158

  • SSDEEP

    1536:7XngVzkN5QQNenlbzOPARLBKUY4mYhbyMOrlcDZlmcKqF36riFNYIGYVKWdCEXr:CQNJE/BB3Ir2ZlmcKMFN1DUEb

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      657-1-0x00008000-0x00020b48-memory.dmp

    • Size

      96KB

    • MD5

      4157a80e60ca1ae63f8967c8edf4c955

    • SHA1

      c747cc45a59fdd86241a7b9a0fd1570eac3a72f8

    • SHA256

      61bdc763d3b0a3547a99ab2bca652735ba7e47d78a6b57d6bd2df75c867c9ca4

    • SHA512

      a197d752d20a44b195f544d26862dabc85f5d3f84c871b223ed942b2323401006e747d07a2c8d4a93034d8421344de6212a51e9aacf450b7f625474cb43ed158

    • SSDEEP

      1536:7XngVzkN5QQNenlbzOPARLBKUY4mYhbyMOrlcDZlmcKqF36riFNYIGYVKWdCEXr:CQNJE/BB3Ir2ZlmcKMFN1DUEb

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks