General

  • Target

    8de33221d6d2c4845384f131583dbae52cb5eb1571311e26ca03566fc6d0740f.unknown

  • Size

    610B

  • Sample

    241229-czs5sszla1

  • MD5

    92d13edccd8d4b5832ee62c441c24785

  • SHA1

    dbb27ddb5dca8aead2e72e887c24cfce68947a22

  • SHA256

    8de33221d6d2c4845384f131583dbae52cb5eb1571311e26ca03566fc6d0740f

  • SHA512

    d3f9223e692eff6ec1e5067555f05bf676489959fddddf3f890afa8006ae0c27500d61fabfcff3d14d1f03acd0f573b1cd61a1ee78ce16e9da4b075a03cd606a

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      8de33221d6d2c4845384f131583dbae52cb5eb1571311e26ca03566fc6d0740f.unknown

    • Size

      610B

    • MD5

      92d13edccd8d4b5832ee62c441c24785

    • SHA1

      dbb27ddb5dca8aead2e72e887c24cfce68947a22

    • SHA256

      8de33221d6d2c4845384f131583dbae52cb5eb1571311e26ca03566fc6d0740f

    • SHA512

      d3f9223e692eff6ec1e5067555f05bf676489959fddddf3f890afa8006ae0c27500d61fabfcff3d14d1f03acd0f573b1cd61a1ee78ce16e9da4b075a03cd606a

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks