General

  • Target

    3421bc39e53ed5a6d117d95ae47f18a4.bin

  • Size

    33KB

  • Sample

    250103-bdgzzawlck

  • MD5

    64d21ce0e1b8d41090701de50c6873a5

  • SHA1

    6af40d474e2900f937a8c88d1153c17d9d3b6967

  • SHA256

    94e8dfe33e2e9de5d7b2b3e6f2fdc2beeae911147a758402b8da46cd2ef33013

  • SHA512

    e610bca3997748d69b3c8ee6832cdbaace51bea34dfc28aa312a89d4d67068c53016d5ba4a8512e705592a5f40eb1ec33b712b36e90d3957c0fc7768e0f1d6eb

  • SSDEEP

    768:zp/BRJsjqFG09AnWczTR1p3T5qScTJRK/JoP:9psjAN+WY/p3uTJ0Ju

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      2a579810e77e2c8577231c5503b6e890b47d551b84161cde8adebf901098608b.elf

    • Size

      72KB

    • MD5

      3421bc39e53ed5a6d117d95ae47f18a4

    • SHA1

      782c8e660ecffd312bfce16a945898b9c0878ddd

    • SHA256

      2a579810e77e2c8577231c5503b6e890b47d551b84161cde8adebf901098608b

    • SHA512

      52204581fcae100145071aa555dbe87090cca231eadd77ff9707d411a681f0ebddd6190805d62741904f9333455b677d42d9975b0e65496d8b82c15b1d9f6111

    • SSDEEP

      1536:6gFjEj7/+hCa5Zk8O2DRuYX619DM1zcJhxoVmSW4OB/BQJv4rmoBitQOVG:zE3/+hCa5ZzO2DRuYX61FMSxbSW3/GhW

    Score
    9/10
    • Contacts a large (20701) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

MITRE ATT&CK Enterprise v15

Tasks