General
-
Target
l.sh
-
Size
240B
-
Sample
250101-tlrs9a1qbw
-
MD5
e2102b077fa0da3be5a5b07b22a34d20
-
SHA1
629a840f9cbd82d8126f2e6b26f4668af8757f10
-
SHA256
6f6de7f166f98d6391f52362327abeae69469b3dd8e09db11c11615a2c5cb31f
-
SHA512
3db852f800118e0a6343e3d121db6eeb851ae72856ec4e7b07edb665e151811b2b6435706795370550cdeaf8b9816b64d42e6c317a1b6c781660905876873fdf
Static task
static1
Behavioral task
behavioral1
Sample
l.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
l.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
l.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
l.sh
Resource
debian9-mipsel-20240729-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
l.sh
-
Size
240B
-
MD5
e2102b077fa0da3be5a5b07b22a34d20
-
SHA1
629a840f9cbd82d8126f2e6b26f4668af8757f10
-
SHA256
6f6de7f166f98d6391f52362327abeae69469b3dd8e09db11c11615a2c5cb31f
-
SHA512
3db852f800118e0a6343e3d121db6eeb851ae72856ec4e7b07edb665e151811b2b6435706795370550cdeaf8b9816b64d42e6c317a1b6c781660905876873fdf
-
Mirai family
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Enumerates running processes
Discovers information about currently running processes on the system
-