General

  • Target

    zte.sh

  • Size

    2KB

  • Sample

    250220-trj1layjc1

  • MD5

    47b2fc727e5986be4576917cb431dd2e

  • SHA1

    6d81cf92deb669c36c8846035cfaa55b04771bb4

  • SHA256

    4c725c97605a31ee082fd60b3e6f81c4b2bb3785dd175752c1a77a9347af11b8

  • SHA512

    3c4ee285964f1b8c87745d4b345ac2264ba00285e61caae421b9863a60f0d16f89c51b4bf841d7bbbd0967f82065126441bfcdf2af649dfe785a69a505a0f124

Malware Config

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Targets

    • Target

      zte.sh

    • Size

      2KB

    • MD5

      47b2fc727e5986be4576917cb431dd2e

    • SHA1

      6d81cf92deb669c36c8846035cfaa55b04771bb4

    • SHA256

      4c725c97605a31ee082fd60b3e6f81c4b2bb3785dd175752c1a77a9347af11b8

    • SHA512

      3c4ee285964f1b8c87745d4b345ac2264ba00285e61caae421b9863a60f0d16f89c51b4bf841d7bbbd0967f82065126441bfcdf2af649dfe785a69a505a0f124

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • Contacts a large (41694) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks