General

  • Target

    e1ab5574c2b7009c42619978671f4082.bin

  • Size

    34KB

  • Sample

    250103-b3abesxlbj

  • MD5

    056e0e645f47d078dc983cd47060601d

  • SHA1

    0271f6eda5a75eb10c9e4df06dd7d8a41fe90df7

  • SHA256

    6eece53ffdca61e9a6168cfe923621f3b7f0f46bd1e8b33649f6e56b3aed5577

  • SHA512

    0b73905a320bd6644a40fce773a00a619c8719d0d258c7e6ab8411bf99a5314bbe64b8c2da74cfc59cf0b1214d6f2df3531d12f17b48df56979afbe0b9e05401

  • SSDEEP

    768:Ms63/xt4U53Bq76vsKDlab5bcfruoFVOx3mCslaTbmCSJQ:0Pxv5qDGMNcfruobuW/la/h

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      0fd6b0a9e7f5bc2678ad53954a89f91a6cf22e4eb1b6ee39b3f9f9acca380305.elf

    • Size

      99KB

    • MD5

      e1ab5574c2b7009c42619978671f4082

    • SHA1

      fd58774cacd014a0e3c97776e2bdf4c14c3fa8b4

    • SHA256

      0fd6b0a9e7f5bc2678ad53954a89f91a6cf22e4eb1b6ee39b3f9f9acca380305

    • SHA512

      255a8ee27fc47d29cd96b6cead0c09ea8393eec4a4c899c9ade6b77332ca5e8018f4a9f6c4da443c0727c43610c6cfa5ba823520d9a85ad44771a998cea9a77e

    • SSDEEP

      1536:HegXUnytTDLmgKQ29A0v+iRbNxcLPkXK7wYvmG6aa7GcVdJ:pvDEA0WKbNx3XK7wYv1jaicTJ

    • Contacts a large (20208) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks