General

  • Target

    0ce735d692827eb3c30a642449846d80.bin

  • Size

    612B

  • Sample

    250106-bcztds1kc1

  • MD5

    403f936a64dbf9f52d1a56919412ac8e

  • SHA1

    3e63c4af29b15c95433c18bc1ade96a53bf721de

  • SHA256

    6f85d40f91459db60193d89191ba1826d64b984056aff61a9d51c23615903370

  • SHA512

    413e21c7be070f13b286f6cdbd9c27e5afed914f620c79707fef995cbb60859f1f3ee09778773198365c214ba2dda9f70f62569c661425630933d5a0d360c973

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      6063eae6f91c29dbfa3fa8cd98fe0859bc82c5a2ac5da1d17e8067e75f7bc3c8.sh

    • Size

      3KB

    • MD5

      0ce735d692827eb3c30a642449846d80

    • SHA1

      89fc4534b140f52ebef84420b843e3d0f4236ccc

    • SHA256

      6063eae6f91c29dbfa3fa8cd98fe0859bc82c5a2ac5da1d17e8067e75f7bc3c8

    • SHA512

      15b3aeb395598dc8b57133c4aec4bc7db9777be7699ebf55fc12138bd6806e1ca7daa7e234f19e1567026cbbeddc912cbaf8e46ee62e1c68858b0eb72ca53c38

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks