General

  • Target

    842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf

  • Size

    99KB

  • Sample

    241230-cxcp2avlfw

  • MD5

    e96e55c5a8ffad62537f7478dc0c0108

  • SHA1

    fc36d6db78608f6b838cbbb03df294c3a6c4c43f

  • SHA256

    842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff

  • SHA512

    15df1b198a91a3628494e53ca4a031f4492d24793980d1828d12bf3f156013d6eb4d9c54584701341f8efcbb4c613f03b30d5d646c098ef377c6cb15aaacce1b

  • SSDEEP

    1536:pegXznytTDLmgKQ29A0v+iRbNxcLPkXK7wYvmG6aa7GBxd9:jiDEA0WKbNx3XK7wYv1jaiB/9

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf

    • Size

      99KB

    • MD5

      e96e55c5a8ffad62537f7478dc0c0108

    • SHA1

      fc36d6db78608f6b838cbbb03df294c3a6c4c43f

    • SHA256

      842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff

    • SHA512

      15df1b198a91a3628494e53ca4a031f4492d24793980d1828d12bf3f156013d6eb4d9c54584701341f8efcbb4c613f03b30d5d646c098ef377c6cb15aaacce1b

    • SSDEEP

      1536:pegXznytTDLmgKQ29A0v+iRbNxcLPkXK7wYvmG6aa7GBxd9:jiDEA0WKbNx3XK7wYv1jaiB/9

    • Contacts a large (20464) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks