General

  • Target

    78e61c3de58f884934783dcccbef8b6738ea940d502410cddf70cc4f66f39cf4.elf

  • Size

    164KB

  • Sample

    250114-c86ggsvjev

  • MD5

    3db319ee9c401bc1f3c8127b1a83d629

  • SHA1

    0ab19f281369916d2a9b633c8d3db66baff89c55

  • SHA256

    78e61c3de58f884934783dcccbef8b6738ea940d502410cddf70cc4f66f39cf4

  • SHA512

    5c98b97a3b8fa3b7f0df737ca05afab1e96729676f1207c725733103f3bcd4dff20a85a92cbb02489a3103fb77ad7ce441d5725f911f70497a1db51145f7db30

  • SSDEEP

    3072:3UvDiabnHYGC3AalhgyCT6097HjvNMI41Mb+ewAM/9VYGbCo:3UvmabHsAalhgyCOo3N6Mb+eTM/9VYFo

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      78e61c3de58f884934783dcccbef8b6738ea940d502410cddf70cc4f66f39cf4.elf

    • Size

      164KB

    • MD5

      3db319ee9c401bc1f3c8127b1a83d629

    • SHA1

      0ab19f281369916d2a9b633c8d3db66baff89c55

    • SHA256

      78e61c3de58f884934783dcccbef8b6738ea940d502410cddf70cc4f66f39cf4

    • SHA512

      5c98b97a3b8fa3b7f0df737ca05afab1e96729676f1207c725733103f3bcd4dff20a85a92cbb02489a3103fb77ad7ce441d5725f911f70497a1db51145f7db30

    • SSDEEP

      3072:3UvDiabnHYGC3AalhgyCT6097HjvNMI41Mb+ewAM/9VYGbCo:3UvmabHsAalhgyCOo3N6Mb+eTM/9VYFo

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks