General

  • Target

    ohshit.sh

  • Size

    2KB

  • Sample

    250218-esh3csxkfs

  • MD5

    32774e26d02b3c1b8e5c9bf8b5992be0

  • SHA1

    ad7e3cdf5913a6397e51fc0570e99e3f2b5cd2c6

  • SHA256

    84169b3c5a219018f397eceb2023846b9f47f0931c447422fc09396a79f40535

  • SHA512

    e00b5a106b8c6529679e10323802c998316e4e6240659a239b7680344ee860e457d8d3274de7d88ee4afb14b6b465651d8944b8bb8ab9c805ad74111c007f0ba

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      ohshit.sh

    • Size

      2KB

    • MD5

      32774e26d02b3c1b8e5c9bf8b5992be0

    • SHA1

      ad7e3cdf5913a6397e51fc0570e99e3f2b5cd2c6

    • SHA256

      84169b3c5a219018f397eceb2023846b9f47f0931c447422fc09396a79f40535

    • SHA512

      e00b5a106b8c6529679e10323802c998316e4e6240659a239b7680344ee860e457d8d3274de7d88ee4afb14b6b465651d8944b8bb8ab9c805ad74111c007f0ba

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks