General

  • Target

    Space.arm.elf

  • Size

    38KB

  • Sample

    250110-11lzwasmbn

  • MD5

    288f03197282df74f3811ec0f5213dc0

  • SHA1

    c09732a84115ffb3a7791efe9b310f281c2102e8

  • SHA256

    1470f0e0b59ba0d757ceb8c58b7ec1d66f8abb839dac886a233343b8201e2a24

  • SHA512

    092e9396c1a635fe5f27d3444fcc2b01f3065947cc30f4ad3b5a9f4961d722880e367ffee98bdc0d45e82ca369ae55afbc1c156ce4953b3e784d50676ed42058

  • SSDEEP

    768:mu7RATME9ze1AfVe5E7xoGbjVDMZZOyrMUy6GPMOes3UozOX:LRA99C1Atfa9zxozOX

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      Space.arm.elf

    • Size

      38KB

    • MD5

      288f03197282df74f3811ec0f5213dc0

    • SHA1

      c09732a84115ffb3a7791efe9b310f281c2102e8

    • SHA256

      1470f0e0b59ba0d757ceb8c58b7ec1d66f8abb839dac886a233343b8201e2a24

    • SHA512

      092e9396c1a635fe5f27d3444fcc2b01f3065947cc30f4ad3b5a9f4961d722880e367ffee98bdc0d45e82ca369ae55afbc1c156ce4953b3e784d50676ed42058

    • SSDEEP

      768:mu7RATME9ze1AfVe5E7xoGbjVDMZZOyrMUy6GPMOes3UozOX:LRA99C1Atfa9zxozOX

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks