General

  • Target

    ohshit.sh

  • Size

    3KB

  • Sample

    250104-qr3wxs1ncs

  • MD5

    0ce735d692827eb3c30a642449846d80

  • SHA1

    89fc4534b140f52ebef84420b843e3d0f4236ccc

  • SHA256

    6063eae6f91c29dbfa3fa8cd98fe0859bc82c5a2ac5da1d17e8067e75f7bc3c8

  • SHA512

    15b3aeb395598dc8b57133c4aec4bc7db9777be7699ebf55fc12138bd6806e1ca7daa7e234f19e1567026cbbeddc912cbaf8e46ee62e1c68858b0eb72ca53c38

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      ohshit.sh

    • Size

      3KB

    • MD5

      0ce735d692827eb3c30a642449846d80

    • SHA1

      89fc4534b140f52ebef84420b843e3d0f4236ccc

    • SHA256

      6063eae6f91c29dbfa3fa8cd98fe0859bc82c5a2ac5da1d17e8067e75f7bc3c8

    • SHA512

      15b3aeb395598dc8b57133c4aec4bc7db9777be7699ebf55fc12138bd6806e1ca7daa7e234f19e1567026cbbeddc912cbaf8e46ee62e1c68858b0eb72ca53c38

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks