General

  • Target

    boatnet.arm7.elf

  • Size

    54KB

  • Sample

    250112-m2tjfssjeq

  • MD5

    2ed2993bc6391b0f0637a13e36eaf54a

  • SHA1

    0c8288bc63885aa31a99ca03cebf26db686928d4

  • SHA256

    025adeffba90479e24082201ad61376ce1d6473267a94a6901fea405ae557196

  • SHA512

    0b320bd4dd81e8a1a9669bf6be1f34ec66794126a8ea34ab15904fe848a77549b60bc44650cdbd1e986108757c2ed8a31cc588207be392e78211fae44a2763a1

  • SSDEEP

    1536:LGrif8a2ndTAduwvajOrY4LoSp6nGufD2sEzKS:CC8a2DSlTLoSpxC05

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      boatnet.arm7.elf

    • Size

      54KB

    • MD5

      2ed2993bc6391b0f0637a13e36eaf54a

    • SHA1

      0c8288bc63885aa31a99ca03cebf26db686928d4

    • SHA256

      025adeffba90479e24082201ad61376ce1d6473267a94a6901fea405ae557196

    • SHA512

      0b320bd4dd81e8a1a9669bf6be1f34ec66794126a8ea34ab15904fe848a77549b60bc44650cdbd1e986108757c2ed8a31cc588207be392e78211fae44a2763a1

    • SSDEEP

      1536:LGrif8a2ndTAduwvajOrY4LoSp6nGufD2sEzKS:CC8a2DSlTLoSpxC05

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks