General

  • Target

    bin.sh

  • Size

    2KB

  • Sample

    250408-lb1peasnz5

  • MD5

    02643e046a24dbdd1b3d7df4d892ae06

  • SHA1

    9a006ba65ff4ae5eb6d1a9b4f4197b81126f9d2a

  • SHA256

    b5e07e535902ebb08e33a8f9e861651cef39490d877ed84e566372292631608e

  • SHA512

    a604b82a4270f842b8a400d0b6976943d9186cbc39fb79f64e33e646c20f8caf85690dc0722f4626ccf34b5d4a2d27f675d280c2325bd904da9211476fcef5f3

Malware Config

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Targets

    • Target

      bin.sh

    • Size

      2KB

    • MD5

      02643e046a24dbdd1b3d7df4d892ae06

    • SHA1

      9a006ba65ff4ae5eb6d1a9b4f4197b81126f9d2a

    • SHA256

      b5e07e535902ebb08e33a8f9e861651cef39490d877ed84e566372292631608e

    • SHA512

      a604b82a4270f842b8a400d0b6976943d9186cbc39fb79f64e33e646c20f8caf85690dc0722f4626ccf34b5d4a2d27f675d280c2325bd904da9211476fcef5f3

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • Contacts a large (37645) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks