General

  • Target

    pulse.sh

  • Size

    2KB

  • Sample

    250408-lb1peasnz6

  • MD5

    f86520075b6dab8cfb089f938dd3f2bd

  • SHA1

    040d9c982d4af06af5f1f4ce04462e3ce4b86af7

  • SHA256

    7baa56b0e073d4513b0c7929685c155c57266ee9d0b8b065ba57f0c4af828b1f

  • SHA512

    e177d230ce1d5d27bf08e94754724f33911b97cc5490d6bfc57eeac2dd5ff59f411d9b8f2609bcee1ea18f55962ee5015ea90ea1da77d72193449417a7af978a

Malware Config

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Targets

    • Target

      pulse.sh

    • Size

      2KB

    • MD5

      f86520075b6dab8cfb089f938dd3f2bd

    • SHA1

      040d9c982d4af06af5f1f4ce04462e3ce4b86af7

    • SHA256

      7baa56b0e073d4513b0c7929685c155c57266ee9d0b8b065ba57f0c4af828b1f

    • SHA512

      e177d230ce1d5d27bf08e94754724f33911b97cc5490d6bfc57eeac2dd5ff59f411d9b8f2609bcee1ea18f55962ee5015ea90ea1da77d72193449417a7af978a

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • Contacts a large (38126) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks