General

  • Target

    loligang.mpsl.elf

  • Size

    103KB

  • Sample

    241229-2zfbdazlaq

  • MD5

    5623e3d922a8b4a86e37f832d8dc1723

  • SHA1

    9fb8588bf01b759e8e14d6d47f744c14c7f93a40

  • SHA256

    e9443c9839e44b26721c53e21c46a4962d48a17ff157a7613dbd37f057f3ca2c

  • SHA512

    065333ca4558455e22e1db18eb0d2f4e38968c45a357deb72f5e73240ff55d802ab3092a84a5ac11b39940387f641e1b6c6fde8a3dfaa1fe18fb455ad9a17057

  • SSDEEP

    1536:d7fjpr4NEQu3p0ZwIGH5PbpTBRRtBeiZebzELYxiYp:d7fjpr53pndeis9c2

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      loligang.mpsl.elf

    • Size

      103KB

    • MD5

      5623e3d922a8b4a86e37f832d8dc1723

    • SHA1

      9fb8588bf01b759e8e14d6d47f744c14c7f93a40

    • SHA256

      e9443c9839e44b26721c53e21c46a4962d48a17ff157a7613dbd37f057f3ca2c

    • SHA512

      065333ca4558455e22e1db18eb0d2f4e38968c45a357deb72f5e73240ff55d802ab3092a84a5ac11b39940387f641e1b6c6fde8a3dfaa1fe18fb455ad9a17057

    • SSDEEP

      1536:d7fjpr4NEQu3p0ZwIGH5PbpTBRRtBeiZebzELYxiYp:d7fjpr53pndeis9c2

    • Contacts a large (20144) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks