General

  • Target

    e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh

  • Size

    2KB

  • Sample

    250308-r4mwxaynw8

  • MD5

    6aea9de4b1853e6a5cea8ad020f48398

  • SHA1

    20e44372765f05e6899aa9bd7e4d9ff64f59c2f7

  • SHA256

    e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f

  • SHA512

    4cb78d553f9ae66e591534a047163ba9db0e54261266c700be091b4ddfe773de2e194f3b80916d40830d1d26f6a76912191fd01858922599fa2b88ca0c70d5a2

Malware Config

Extracted

Family

mirai

Botnet

DEMONS

Extracted

Family

mirai

Botnet

DEMONS

Extracted

Family

mirai

Botnet

DEMONS

Targets

    • Target

      e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f.sh

    • Size

      2KB

    • MD5

      6aea9de4b1853e6a5cea8ad020f48398

    • SHA1

      20e44372765f05e6899aa9bd7e4d9ff64f59c2f7

    • SHA256

      e60ffba5989232a11be2a879fef11d0ad899d96a00d0173828c80c4f12e9688f

    • SHA512

      4cb78d553f9ae66e591534a047163ba9db0e54261266c700be091b4ddfe773de2e194f3b80916d40830d1d26f6a76912191fd01858922599fa2b88ca0c70d5a2

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks