General

  • Target

    hnap.sh

  • Size

    2KB

  • Sample

    250220-txq14aylgw

  • MD5

    76c625416800cf3073f832c6fdb90dfe

  • SHA1

    1d9e582097338454f484559f64b639795e0aa51e

  • SHA256

    73e4a86bb7a5969fc3ee995b34dec87af69f4083efac0828a9d4b89f25ffed6e

  • SHA512

    9a8edf9a9d1ca1b67dd72b3e304a30bf585b450ec1386b5bd84438f7c22adecfd1e095d3d9b7dfa800cbf783fe8589047e0d6a7ea19d1f65cbdd03e20824766d

Malware Config

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Targets

    • Target

      hnap.sh

    • Size

      2KB

    • MD5

      76c625416800cf3073f832c6fdb90dfe

    • SHA1

      1d9e582097338454f484559f64b639795e0aa51e

    • SHA256

      73e4a86bb7a5969fc3ee995b34dec87af69f4083efac0828a9d4b89f25ffed6e

    • SHA512

      9a8edf9a9d1ca1b67dd72b3e304a30bf585b450ec1386b5bd84438f7c22adecfd1e095d3d9b7dfa800cbf783fe8589047e0d6a7ea19d1f65cbdd03e20824766d

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • Contacts a large (33784) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks