General

  • Target

    l.sh

  • Size

    240B

  • Sample

    250101-tlrs9a1qbw

  • MD5

    e2102b077fa0da3be5a5b07b22a34d20

  • SHA1

    629a840f9cbd82d8126f2e6b26f4668af8757f10

  • SHA256

    6f6de7f166f98d6391f52362327abeae69469b3dd8e09db11c11615a2c5cb31f

  • SHA512

    3db852f800118e0a6343e3d121db6eeb851ae72856ec4e7b07edb665e151811b2b6435706795370550cdeaf8b9816b64d42e6c317a1b6c781660905876873fdf

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      l.sh

    • Size

      240B

    • MD5

      e2102b077fa0da3be5a5b07b22a34d20

    • SHA1

      629a840f9cbd82d8126f2e6b26f4668af8757f10

    • SHA256

      6f6de7f166f98d6391f52362327abeae69469b3dd8e09db11c11615a2c5cb31f

    • SHA512

      3db852f800118e0a6343e3d121db6eeb851ae72856ec4e7b07edb665e151811b2b6435706795370550cdeaf8b9816b64d42e6c317a1b6c781660905876873fdf

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks