General

  • Target

    lg.sh

  • Size

    2KB

  • Sample

    250408-lb42tsswfv

  • MD5

    f8872ee3b57a58ccfa43119fd614fbd1

  • SHA1

    b0912a7688fdd33c8b3e15f1c298df7685385dd3

  • SHA256

    5407adfb8b731bd05cdde6d94a985842a343b60fbc5a8658b317ad852aea775d

  • SHA512

    6f66d006a56b79fcfbaa1b01eb1babf08527760b93dae3787f43790b5a8932284940e260a58f2c2b733b0bfadfbc370833911864876cb54ab87d415c3faac80d

Malware Config

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

SORA

Targets

    • Target

      lg.sh

    • Size

      2KB

    • MD5

      f8872ee3b57a58ccfa43119fd614fbd1

    • SHA1

      b0912a7688fdd33c8b3e15f1c298df7685385dd3

    • SHA256

      5407adfb8b731bd05cdde6d94a985842a343b60fbc5a8658b317ad852aea775d

    • SHA512

      6f66d006a56b79fcfbaa1b01eb1babf08527760b93dae3787f43790b5a8932284940e260a58f2c2b733b0bfadfbc370833911864876cb54ab87d415c3faac80d

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • Contacts a large (42497) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks