General

  • Target

    704-1-0x00008000-0x00020b48-memory.dmp

  • Size

    96KB

  • Sample

    250103-wf1kbawjdt

  • MD5

    10f3e862b6f00cee9b510e2ab801602e

  • SHA1

    d37b129b3d7759aff6fc2795406f07fe8246a396

  • SHA256

    64556b9de65b1080f3452e69b40a70999d0e2afa2e7700b73ce4c04d56cd9588

  • SHA512

    6fa053640611677820391d32343cdac1204c12ea7fb28f0c03c6562fde87a8dca50c8bfb3ec5040a886b67c857067a9be4028b9866fcb88baa56f0cfcb022bc1

  • SSDEEP

    1536:7XnpuoZnZ4N5Q029rn5bzi1ARLBKUY4mYhbyMOrlcDZlmcKqF36riFNYIGYVKWd:4SaNNcJBB3Ir2ZlmcKMFN1DUE4

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      704-1-0x00008000-0x00020b48-memory.dmp

    • Size

      96KB

    • MD5

      10f3e862b6f00cee9b510e2ab801602e

    • SHA1

      d37b129b3d7759aff6fc2795406f07fe8246a396

    • SHA256

      64556b9de65b1080f3452e69b40a70999d0e2afa2e7700b73ce4c04d56cd9588

    • SHA512

      6fa053640611677820391d32343cdac1204c12ea7fb28f0c03c6562fde87a8dca50c8bfb3ec5040a886b67c857067a9be4028b9866fcb88baa56f0cfcb022bc1

    • SSDEEP

      1536:7XnpuoZnZ4N5Q029rn5bzi1ARLBKUY4mYhbyMOrlcDZlmcKqF36riFNYIGYVKWd:4SaNNcJBB3Ir2ZlmcKMFN1DUE4

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks