General

  • Target

    (null).sh

  • Size

    2KB

  • Sample

    250113-hxm4na1qfz

  • MD5

    cdbe719571662353212a1d49312ba384

  • SHA1

    0fbbad3d4b091eb0e953e781a7e7ba2c03659f53

  • SHA256

    44442e1ac5df5c69852dc62e085146824a938b5c7e6032cecfbedf7ea0935e8f

  • SHA512

    c6591539f6aa45036ce16a7572f37f361d3853f835f8575f5d63cb3af0666b7de7b5ea20bb08ab8b7d89619eb8e60295cc857e2f07dd67bb173d916b6c4352a2

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      (null).sh

    • Size

      2KB

    • MD5

      cdbe719571662353212a1d49312ba384

    • SHA1

      0fbbad3d4b091eb0e953e781a7e7ba2c03659f53

    • SHA256

      44442e1ac5df5c69852dc62e085146824a938b5c7e6032cecfbedf7ea0935e8f

    • SHA512

      c6591539f6aa45036ce16a7572f37f361d3853f835f8575f5d63cb3af0666b7de7b5ea20bb08ab8b7d89619eb8e60295cc857e2f07dd67bb173d916b6c4352a2

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.