General

  • Target

    huawei.sh

  • Size

    2KB

  • Sample

    250408-lb1peasnz8

  • MD5

    6d9ba951b2b2096817bad60b1b432843

  • SHA1

    debb2437b844c1fceadc712b2de4313a0aa675db

  • SHA256

    bb4754d9322bcadc46c17856c4f9ca512a45ffd14d96f81cd6b2100e7e994ef9

  • SHA512

    0b2732d48655b9d70ba6fd99355d2ff7eddc9cf94e023cc3493e1c84a571680549b0b6908a81fb45f46913f43a63b1e7e52488873977bf112a1f52562b5591ac

Malware Config

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Targets

    • Target

      huawei.sh

    • Size

      2KB

    • MD5

      6d9ba951b2b2096817bad60b1b432843

    • SHA1

      debb2437b844c1fceadc712b2de4313a0aa675db

    • SHA256

      bb4754d9322bcadc46c17856c4f9ca512a45ffd14d96f81cd6b2100e7e994ef9

    • SHA512

      0b2732d48655b9d70ba6fd99355d2ff7eddc9cf94e023cc3493e1c84a571680549b0b6908a81fb45f46913f43a63b1e7e52488873977bf112a1f52562b5591ac

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • Contacts a large (34848) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks