General

  • Target

    huawei.sh

  • Size

    2KB

  • Sample

    250220-trg61aymfq

  • MD5

    ac306c41d87f3602aa9c98d67147f52a

  • SHA1

    ed5f329d01c5020564e348a9b020b2d1b62ce80a

  • SHA256

    d35d4010a32654d026d45c552acf8ef7bdc74ec484227b2ccc2ae08bd491fa2f

  • SHA512

    3cb56411917bd35c7a32e996b376d6a2e78992c8229b6b71936e694085701f9b5b4c40ab7968ed61e49988e0b324d2d3cf8233b7ecc9e13d622cf8559d355ad1

Malware Config

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Targets

    • Target

      huawei.sh

    • Size

      2KB

    • MD5

      ac306c41d87f3602aa9c98d67147f52a

    • SHA1

      ed5f329d01c5020564e348a9b020b2d1b62ce80a

    • SHA256

      d35d4010a32654d026d45c552acf8ef7bdc74ec484227b2ccc2ae08bd491fa2f

    • SHA512

      3cb56411917bd35c7a32e996b376d6a2e78992c8229b6b71936e694085701f9b5b4c40ab7968ed61e49988e0b324d2d3cf8233b7ecc9e13d622cf8559d355ad1

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks