General

  • Target

    zyxel.sh

  • Size

    2KB

  • Sample

    250408-lb1z6ssn12

  • MD5

    132f64520b366d89a9470236e544acb7

  • SHA1

    b0a44b16308ae768d701741ccecde012a50e8a97

  • SHA256

    33f76974f554c29d6e5c8859da11e96a8843a1499e3dca6e5ebaa77a2c673b6c

  • SHA512

    1e7d0553c20109c1ddcd48cbf150e6bc9d4c1a5eda9cec0d6973560070e0b19254cfd94f9ed78b7e7cea53981aebfea7c1a1f17971837bf00d563b2d00cf6eb2

Malware Config

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Targets

    • Target

      zyxel.sh

    • Size

      2KB

    • MD5

      132f64520b366d89a9470236e544acb7

    • SHA1

      b0a44b16308ae768d701741ccecde012a50e8a97

    • SHA256

      33f76974f554c29d6e5c8859da11e96a8843a1499e3dca6e5ebaa77a2c673b6c

    • SHA512

      1e7d0553c20109c1ddcd48cbf150e6bc9d4c1a5eda9cec0d6973560070e0b19254cfd94f9ed78b7e7cea53981aebfea7c1a1f17971837bf00d563b2d00cf6eb2

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • Contacts a large (46270) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks