General

  • Target

    wind.arm.elf

  • Size

    25KB

  • Sample

    250106-h1hcksslck

  • MD5

    bedac7cde2d68b897e39a7895632de85

  • SHA1

    6c8370008dbc42539c6552141951cf95c8e1d394

  • SHA256

    adca3bf3f36fd505510dbd9bd6d838c14c3cf95bfec0b110c4e0419d54ae498e

  • SHA512

    8cfd930808e668184ba6a432a866c15e298dd22bfcbc810af551958d84ec6306edfefdf359354994240211c0a0a21cbd75a71060bffcc04ffb1aa50b0340db8d

  • SSDEEP

    768:WbrQ9NZTs+lQFej5Xu4+rHJrBcSs3UozV0:WY9NZoxuuRBWze

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      wind.arm.elf

    • Size

      25KB

    • MD5

      bedac7cde2d68b897e39a7895632de85

    • SHA1

      6c8370008dbc42539c6552141951cf95c8e1d394

    • SHA256

      adca3bf3f36fd505510dbd9bd6d838c14c3cf95bfec0b110c4e0419d54ae498e

    • SHA512

      8cfd930808e668184ba6a432a866c15e298dd22bfcbc810af551958d84ec6306edfefdf359354994240211c0a0a21cbd75a71060bffcc04ffb1aa50b0340db8d

    • SSDEEP

      768:WbrQ9NZTs+lQFej5Xu4+rHJrBcSs3UozV0:WY9NZoxuuRBWze

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks