General

  • Target

    3b4575f148b3a8c31346f8eb2b38b3a0.bin

  • Size

    44KB

  • Sample

    241229-bld82sxqcl

  • MD5

    6663c2075f1d56f48734cf34e3cfa453

  • SHA1

    97693727c61de5361b92f4cb8706753aaa94553e

  • SHA256

    60e98ea9e12d43088e62a204f0b06ebb4931966d2ed4d1e52873fd5e750ae86d

  • SHA512

    3a679f27f3c49255c7c49139ca71bc0c28dc4d068343cbf70283f8cbe6e13fb4ec71bc30e44a9a36fc407ecec9a8e51b98f02df15cf7ef6fe47af493f48d98ca

  • SSDEEP

    768:AVweIuFDVAd6IJmBhWHe0KeHhk7pYU6Km5gsqjdbLxgXCBshzcbvH6ivi/QQ5:XUDVAdnJ5HapY3K5sQOXCS52pvi/QQ5

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      afa7eab80fa5332cb8e1c47751769c5903221c91f96de122a5ac9121d598f197.elf

    • Size

      106KB

    • MD5

      3b4575f148b3a8c31346f8eb2b38b3a0

    • SHA1

      2cd6ef1963ce1aca114a4c89c76595e0ae8dd234

    • SHA256

      afa7eab80fa5332cb8e1c47751769c5903221c91f96de122a5ac9121d598f197

    • SHA512

      c6ff07c8a9d3f440c8ef3c4e6e712f75f78e88c6bad0f9e1b984b9256fb777e2c61f1a24631a832e7a5457731a21c2d87e433ef27b79b2052a7caa62fca9140a

    • SSDEEP

      1536:jyuo5zfiQN843eR+QMBpx5AJltiwsGZMaKVHM7l61d6Um2flDH:2uQzfiQNF6tcGCQ4rm+1H

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks