General

  • Target

    704-1-0x00008000-0x00020b48-memory.dmp

  • Size

    96KB

  • Sample

    250111-lxv12svqhz

  • MD5

    c121460cc64f14c2c14713854015123a

  • SHA1

    1e78e1315f9fb47531bb0c665532b88ec323b3ba

  • SHA256

    e96895a6fab089f10d074087847f2890df2a4ffc730696aa9d29fa9c61f55b92

  • SHA512

    1534529ecaaa62d9e6fbfe575ee95ad703326a902ac476bff793ecd852f6e91260a73fa3910906aba87a16e63f68221ca4fba17474286d694260a911dc6e89d6

  • SSDEEP

    1536:7XngVzkN5QQNenlbzOPARLBKUY4mYhbyMOrlcDZlmcKqF36riFNYIGYVKWdCE0r:CQNJE/BB3Ir2ZlmcKMFN1DUEc

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      704-1-0x00008000-0x00020b48-memory.dmp

    • Size

      96KB

    • MD5

      c121460cc64f14c2c14713854015123a

    • SHA1

      1e78e1315f9fb47531bb0c665532b88ec323b3ba

    • SHA256

      e96895a6fab089f10d074087847f2890df2a4ffc730696aa9d29fa9c61f55b92

    • SHA512

      1534529ecaaa62d9e6fbfe575ee95ad703326a902ac476bff793ecd852f6e91260a73fa3910906aba87a16e63f68221ca4fba17474286d694260a911dc6e89d6

    • SSDEEP

      1536:7XngVzkN5QQNenlbzOPARLBKUY4mYhbyMOrlcDZlmcKqF36riFNYIGYVKWdCE0r:CQNJE/BB3Ir2ZlmcKMFN1DUEc

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks