General

  • Target

    bash.sh

  • Size

    2KB

  • Sample

    250410-tccmzawway

  • MD5

    41ec0e362e0f5e909f2327e42c4e85c0

  • SHA1

    bd3cdfe5722835544e267c22649a4cc3eaf7f5e0

  • SHA256

    e93b2242cf29b1ae19ef68c6037d31b4ff835edfa0ba7e690004cfe4ccdf2f1b

  • SHA512

    4c9c4e924bd2a8c18053584fbe42b327dd56c8cfacb2556d7d62912c5fd9a1bc35291789cc8140f1d1f8900ba98a64b1954e39ea077e3bbefd36bcf850798176

Malware Config

Extracted

Family

mirai

Botnet

OWARI

C2

newageofkifirempire.camdvr.org

Extracted

Family

mirai

Botnet

OWARI

Extracted

Family

mirai

Botnet

OWARI

Extracted

Family

mirai

Botnet

OWARI

C2

newageofkifirempire.camdvr.org

Extracted

Family

mirai

Botnet

OWARI

C2

newageofkifirempire.camdvr.org

Extracted

Family

mirai

Botnet

OWARI

C2

newageofkifirempire.camdvr.org

Targets

    • Target

      bash.sh

    • Size

      2KB

    • MD5

      41ec0e362e0f5e909f2327e42c4e85c0

    • SHA1

      bd3cdfe5722835544e267c22649a4cc3eaf7f5e0

    • SHA256

      e93b2242cf29b1ae19ef68c6037d31b4ff835edfa0ba7e690004cfe4ccdf2f1b

    • SHA512

      4c9c4e924bd2a8c18053584fbe42b327dd56c8cfacb2556d7d62912c5fd9a1bc35291789cc8140f1d1f8900ba98a64b1954e39ea077e3bbefd36bcf850798176

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v16

Tasks