General

  • Target

    bash.sh

  • Size

    3KB

  • Sample

    250331-rvx1hstry3

  • MD5

    a41cde87771e23498a767fb996e69ff5

  • SHA1

    494b85e0b009488223573697aeceb2292de9cf3f

  • SHA256

    160156a3724a9aa6374110e056db16b9323d76ca22bdeb6f028786346a48396c

  • SHA512

    674163511e0b99a46a79bce880b367f6ba0495575e5e5d95b2ba1062395f46614b6e35b8473e8b55c244ac2a57943085b76070fa9377d920614d55cb47a856f9

Malware Config

Extracted

Family

mirai

Botnet

OWARI

C2

newageofkifirempire.camdvr.org

Extracted

Family

mirai

Botnet

OWARI

Extracted

Family

mirai

Botnet

OWARI

Extracted

Family

mirai

Botnet

OWARI

C2

newageofkifirempire.camdvr.org

Extracted

Family

mirai

Botnet

OWARI

C2

newageofkifirempire.camdvr.org

Extracted

Family

mirai

Botnet

OWARI

C2

newageofkifirempire.camdvr.org

Targets

    • Target

      bash.sh

    • Size

      3KB

    • MD5

      a41cde87771e23498a767fb996e69ff5

    • SHA1

      494b85e0b009488223573697aeceb2292de9cf3f

    • SHA256

      160156a3724a9aa6374110e056db16b9323d76ca22bdeb6f028786346a48396c

    • SHA512

      674163511e0b99a46a79bce880b367f6ba0495575e5e5d95b2ba1062395f46614b6e35b8473e8b55c244ac2a57943085b76070fa9377d920614d55cb47a856f9

    • Detects Kaiten/Tsunami Payload

    • Detects Kaiten/Tsunami payload

    • Kaiten family

    • Kaiten/Tsunami

      Linux-based IoT botnet which is controlled through IRC and normally used to carry out DDoS attacks.

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks