General

  • Target

    ohshit.sh

  • Size

    3KB

  • Sample

    250401-dj36hasvcz

  • MD5

    49ccb38dd7e10864370e97b7037c2880

  • SHA1

    e0db7b2cf8aecb8664fd87164f638103418eb9ab

  • SHA256

    f58a06a7be85427f150ab29567daa86227c274acef7657fcb12a74ef64d6b2cb

  • SHA512

    cde0c823211fb1a86e88644c9daad843ecb11c49d91256c943d2baef250a2243cd9bcc4c7b68bde3139b441b124503b235bf12583c8c9d22e61a14fe0c59806e

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      ohshit.sh

    • Size

      3KB

    • MD5

      49ccb38dd7e10864370e97b7037c2880

    • SHA1

      e0db7b2cf8aecb8664fd87164f638103418eb9ab

    • SHA256

      f58a06a7be85427f150ab29567daa86227c274acef7657fcb12a74ef64d6b2cb

    • SHA512

      cde0c823211fb1a86e88644c9daad843ecb11c49d91256c943d2baef250a2243cd9bcc4c7b68bde3139b441b124503b235bf12583c8c9d22e61a14fe0c59806e

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.