General

  • Target

    loligang.x86.elf

  • Size

    72KB

  • Sample

    250101-vctf6atjf1

  • MD5

    3421bc39e53ed5a6d117d95ae47f18a4

  • SHA1

    782c8e660ecffd312bfce16a945898b9c0878ddd

  • SHA256

    2a579810e77e2c8577231c5503b6e890b47d551b84161cde8adebf901098608b

  • SHA512

    52204581fcae100145071aa555dbe87090cca231eadd77ff9707d411a681f0ebddd6190805d62741904f9333455b677d42d9975b0e65496d8b82c15b1d9f6111

  • SSDEEP

    1536:6gFjEj7/+hCa5Zk8O2DRuYX619DM1zcJhxoVmSW4OB/BQJv4rmoBitQOVG:zE3/+hCa5ZzO2DRuYX61FMSxbSW3/GhW

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      loligang.x86.elf

    • Size

      72KB

    • MD5

      3421bc39e53ed5a6d117d95ae47f18a4

    • SHA1

      782c8e660ecffd312bfce16a945898b9c0878ddd

    • SHA256

      2a579810e77e2c8577231c5503b6e890b47d551b84161cde8adebf901098608b

    • SHA512

      52204581fcae100145071aa555dbe87090cca231eadd77ff9707d411a681f0ebddd6190805d62741904f9333455b677d42d9975b0e65496d8b82c15b1d9f6111

    • SSDEEP

      1536:6gFjEj7/+hCa5Zk8O2DRuYX619DM1zcJhxoVmSW4OB/BQJv4rmoBitQOVG:zE3/+hCa5ZzO2DRuYX61FMSxbSW3/GhW

    • Contacts a large (19326) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks