General
-
Target
zyxel.sh
-
Size
2KB
-
Sample
250408-lb1z6ssn12
-
MD5
132f64520b366d89a9470236e544acb7
-
SHA1
b0a44b16308ae768d701741ccecde012a50e8a97
-
SHA256
33f76974f554c29d6e5c8859da11e96a8843a1499e3dca6e5ebaa77a2c673b6c
-
SHA512
1e7d0553c20109c1ddcd48cbf150e6bc9d4c1a5eda9cec0d6973560070e0b19254cfd94f9ed78b7e7cea53981aebfea7c1a1f17971837bf00d563b2d00cf6eb2
Static task
static1
Behavioral task
behavioral1
Sample
zyxel.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
zyxel.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
zyxel.sh
Resource
debian9-mipsbe-20240611-en
Malware Config
Extracted
mirai
SORA
Extracted
mirai
SORA
Extracted
mirai
SORA
Extracted
mirai
SORA
Targets
-
-
Target
zyxel.sh
-
Size
2KB
-
MD5
132f64520b366d89a9470236e544acb7
-
SHA1
b0a44b16308ae768d701741ccecde012a50e8a97
-
SHA256
33f76974f554c29d6e5c8859da11e96a8843a1499e3dca6e5ebaa77a2c673b6c
-
SHA512
1e7d0553c20109c1ddcd48cbf150e6bc9d4c1a5eda9cec0d6973560070e0b19254cfd94f9ed78b7e7cea53981aebfea7c1a1f17971837bf00d563b2d00cf6eb2
-
Mirai family
-
Contacts a large (46270) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1