General

  • Target

    af4c5645b671e06d6c0b3991e52f1c30.bin

  • Size

    34KB

  • Sample

    250103-bx6sfaxjer

  • MD5

    d26042b22847c25a3246f95fd61aa9de

  • SHA1

    86475d29cbd47793d7d8da2a849a756f4919cf87

  • SHA256

    c8b0e149ba7a51c8e959e01e4a29adcefd629bf63b8073dfc4ab1cacc7714314

  • SHA512

    7e4d4715312f802e998b04e6716a9571c90d6150a8f693d7f1be8957a432e99e4da9cf23051aeaf7390b4ee1b5c86d99b9afb31c472dd756f084f3294e7f24ef

  • SSDEEP

    768:58CF+u6n5qvJmeVJoINOAmjQ5tvPzmsjmkydrA1cWbUNEkK78:vFq5qrVpJmmhmQmkysKEz8

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      992249b7c0c645c1c6fdaf2ce418afbe7e1f93d7372fc6769817126a24e09177.elf

    • Size

      103KB

    • MD5

      af4c5645b671e06d6c0b3991e52f1c30

    • SHA1

      9c015d6953adf0a4141b6dd465ec9097d7f4346f

    • SHA256

      992249b7c0c645c1c6fdaf2ce418afbe7e1f93d7372fc6769817126a24e09177

    • SHA512

      b18e37515ece867a0bd795f889bd472efaf8c3c70a6eced40dff7067439787bf41eadc274298ca97272942f16dcb2ae3130d61784fd4d848ea5a48545012cc70

    • SSDEEP

      1536:T32gjpr4NEQu3p0ZwIGH5PbpTBRRtBeiZebzELlViYp:TGgjpr53pndeisgY2

    • Contacts a large (20385) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks