General

  • Target

    wind.arm.elf

  • Size

    25KB

  • Sample

    250102-197ypsxqev

  • MD5

    d72a530e0c39154ca967c0a5eefcc436

  • SHA1

    7850a1a4ee4235393dfd4b60b85e247291cdffe4

  • SHA256

    329c3a5d8bfb865d1317176419627044cfced32be9704f1f878fc805fe0d15b0

  • SHA512

    c02f074c421ffd26b7537726d7f5426076c333da7e98510c7ba87660079994e7bef16a5629b51232799bb26c371b505f0c607ac099eb3b8c5cb08f4c90b1a798

  • SSDEEP

    768:WbrQ9NZTs+lQFej5Xu4+rHJrBprs3UozVG:WY9NZoxuuRBwzw

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      wind.arm.elf

    • Size

      25KB

    • MD5

      d72a530e0c39154ca967c0a5eefcc436

    • SHA1

      7850a1a4ee4235393dfd4b60b85e247291cdffe4

    • SHA256

      329c3a5d8bfb865d1317176419627044cfced32be9704f1f878fc805fe0d15b0

    • SHA512

      c02f074c421ffd26b7537726d7f5426076c333da7e98510c7ba87660079994e7bef16a5629b51232799bb26c371b505f0c607ac099eb3b8c5cb08f4c90b1a798

    • SSDEEP

      768:WbrQ9NZTs+lQFej5Xu4+rHJrBprs3UozVG:WY9NZoxuuRBwzw

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks