General

  • Target

    7581867fa4cfd3edfd252fcd9df0ed0511453b04e832b48564137f175f36c93a

  • Size

    689KB

  • Sample

    250411-k5jgjsvp13

  • MD5

    de0e07c800130da85c5301c765f40230

  • SHA1

    06bde6e7b4a24ffb72c826296250b18f45bc0cc4

  • SHA256

    7581867fa4cfd3edfd252fcd9df0ed0511453b04e832b48564137f175f36c93a

  • SHA512

    2483903e5d8b8be8fd5e9c471dcadd062549d10273605d1a61d004ded4185bde933b2f0f8711c7f489afe56e89bce9e78727ef797e7fe43a7b15f4a92e21bad9

  • SSDEEP

    12288:yV8m2CAL7AcqOrQNneQ6XrKpquk0odNDrxd0X9MjgdO2ZeGX6zhN3JezltBxe:yynCAXaOktAXG0uxkNpd0X9MkO2Zel37

Malware Config

Extracted

Family

gafgyt

C2

159.65.227.17:54

185.244.25.87:82180

86.105.52.202:23

203.248.197.10:22

67.205.154.43:23

Extracted

Family

mirai

Botnet

SORA

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

JOSHO

Extracted

Family

mirai

Botnet

MIRAI

C2

rrr.shenron.pw

Extracted

Family

mirai

Botnet

MIRAI

Targets

    • Target

      病毒样本/00e06596da8d703779bb39d9e08fedee

    • Size

      67KB

    • MD5

      00e06596da8d703779bb39d9e08fedee

    • SHA1

      0e18fcc0f6292b972504b8709ec6e97f2f1d695a

    • SHA256

      cec81e6f78626a2158054e1ab4b42026d345929bd3c29945b4bdffd301a055bf

    • SHA512

      8cd2c9401052e83e779600f700e151b7b532f59cc1bbffc7801bc4b7f6bba5d1a1e1801debc139d6bdba09cabe3428a0d8845abbcbb1e869017937507e64d4a1

    • SSDEEP

      1536:yFbfic3iGb71kKMS0G+xZqPBsa8+MyXFosT:yVTSGFkjmeRC

    Score
    1/10
    • Target

      病毒样本/00f87a46e10716d679e96a30cff11a37

    • Size

      80KB

    • MD5

      00f87a46e10716d679e96a30cff11a37

    • SHA1

      cf99000ef3ab02c163ecd73096717cb6488ffc79

    • SHA256

      10ebb12732c271651a889b4329060261d2a887392056160d913c80be998f16f8

    • SHA512

      428bc5fd7d43d1fe00dfcd1d32274f482d050fcd516673174cb4a6298e25d75fe5d90164d60f7ab7b481db17d8df68ccc82ec743c071aa564240e378b5121dc2

    • SSDEEP

      1536:U78nEACcGS1l345pdSuGS36lDGvtY6ZNmA+JWOVjhHZ4xX:a8CcGS1ZqYuGO6l4txPm/JWOVtHZ4xX

    Score
    6/10
    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Target

      病毒样本/0a38d9eca296fa1935f82dabb41a31a5

    • Size

      29KB

    • MD5

      0a38d9eca296fa1935f82dabb41a31a5

    • SHA1

      b36339f4e2bccfbcf3fd7f178a01b8ab210726ea

    • SHA256

      0b647a280bb064e0fcd28b65900945d08b59c98343cadd2e56d53294c112ecf3

    • SHA512

      3957ce012ddacff2606f3bde5045724566721aeb8fd84dd812b979337601d3ed7ecf728cde53cda38e1936819730780d4ea78c3b90125881e8427b8370256f50

    • SSDEEP

      384:MajMzN8f05Rpjk5Yfo2xZUzKmQAHHOvgm0PtsgV9Jz8Uaux7+fqSB+figWbETRIm:VgN8fWlfowmQA3V9qFmSBtboMAQVze

    Score
    9/10
    • Contacts a large (20162) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

    • Target

      病毒样本/0a39ca7cf634801eec27eb2d223d4ec8

    • Size

      108KB

    • MD5

      0a39ca7cf634801eec27eb2d223d4ec8

    • SHA1

      7e0e23daf2128141d7bf4a80ce99a179831904db

    • SHA256

      7bd983ca410d67006f6c9bed2fdcdba9d29ecb3d2297bb354fb95d4012d2ddd8

    • SHA512

      c7209aa24dbe6296d98f4c1a85e225973c52afc81af93e9c3b22e823d88374344bc6531beca458419fba74d040e4902cd9050d05e244757deb0d18478c885240

    • SSDEEP

      3072:TnmnhGqygPPeqJSatrYe9r2yrZX2YB0XKmDg0YZYbExM6:TmhGqyyPlJSatr8yraXKmDg0YZYbExM6

    Score
    1/10
    • Target

      病毒样本/0a7b0aabb6a61c26f0509b676dabfedb

    • Size

      49KB

    • MD5

      0a7b0aabb6a61c26f0509b676dabfedb

    • SHA1

      913ac2a1d301f2c9344243ec1f4d0fbea3cd3978

    • SHA256

      9cdc08f14b6f81f521da5e8b6a98139f1176fa3360c2746f594c81ae3b2c9b82

    • SHA512

      99aeac1514b25a9f9995741b59d728f9531cb3aab929ade043e0fac38ca7128c57449157a87f0d888e95f14ca6b2c14f7106ca4cace4f949e1401a3c05300f0c

    • SSDEEP

      768:w7Mc+v+wcWDEKmxmmEBa4OmdiC8saEbwzRgBCEVeHmYMvYPfjA/hcl3D8NRRZPNa:lcBnWDFx8sHeHbMIfU5tGlu

    Score
    1/10
    • Target

      病毒样本/26a14f8a41b6e3b3f685d529e94b233f

    • Size

      89KB

    • MD5

      26a14f8a41b6e3b3f685d529e94b233f

    • SHA1

      d50b3d6251304227535bd2c31bb126d6e083c12b

    • SHA256

      b25b2b779b7c88af32bc7b312b390e5879e853deb948d66a6da12ff194a60d3a

    • SHA512

      daa1b36a560ba76db1d4b3ce99dc947d304875a383e4a86ac793965f1f3442fd186f63a879b7fdc608034aa3a8f5b04c8fa3375dac7bf227f4e7f7e9f483fa6b

    • SSDEEP

      1536:4YRS2cWY6f6utWSVSDYFMMwqZ9adsR0vf7y9vnk5zlf/A4mqvrrb9NK2M:1I2cWRyutWCSDU9aE0Hm9Azlf/A4mOrI

    • Contacts a large (20423) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Target

      病毒样本/26dfd5812c878dab3dea8c7666026956

    • Size

      91KB

    • MD5

      26dfd5812c878dab3dea8c7666026956

    • SHA1

      992a6cde7aa5abd7ed55e6bc95fadc1aef53c699

    • SHA256

      a7e507ffdad79bbb3a342e0aafd4b7245ca19b7b7e8676f9f5f02b83eaf0fbef

    • SHA512

      de6d426ee7fe58fe8116d9d75923a693ac6fd28e1387e5ce222b99b6fe5c6ef7562666934e75d9b101fbfcfe28916a36bf54c3538300f9b643aa34cb21aa94b5

    • SSDEEP

      1536:/3k89VQPA8zPbBvtVfoRioq1iC6CixHOVvVPWT4VqmREqQ4b/X7XW8e:LQV1v8U13i+VPWT8qmREqQ4bv7XW8e

    Score
    1/10
    • Target

      病毒样本/27e04e3e0427e779ee43db42783abbaf

    • Size

      45KB

    • MD5

      27e04e3e0427e779ee43db42783abbaf

    • SHA1

      86bd80a7ab0505c885cd037e1801f6fb1bd0e00c

    • SHA256

      ba3cc49922fa9a19f986d958ffb7441cc904752932531b2a9d1058aa674baf81

    • SHA512

      7175a3b3cd8d048e25d9f5889262013d8d99e9059950b59613d8dc982e15336991867eb0cad6dd72d7031618724188c810ca7d5bf8979035b6ad0c63b87d27e6

    • SSDEEP

      768:xM2maAhFSHUdhghXgwVNrbC5ejzGu9q3UELyPmyYKSJxJNbvF5VNXOxPvlvY:O2YQ0dhWXt/r+mcLYmyYhJZ3PO9NvY

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • Target

      病毒样本/28aaedd279bb9c1d92a7b9adb541093c

    • Size

      70KB

    • MD5

      28aaedd279bb9c1d92a7b9adb541093c

    • SHA1

      71d44c6ff634a8d19d222b77b2123c18c5375335

    • SHA256

      77223bfa822457998996c597807f97ff559e3dc1a888e7caa80c4292c181e0de

    • SHA512

      61e4c5c636db6be1cec550237ac82e7d8a4502e58a9ddc1fd600160456a7c8b60d5c6d4989d1f345a22526dcb9e7e6a89c7c12e10d2f083ad07a1eb3c9ba0aad

    • SSDEEP

      1536:ShHfnSJCdBqPGf19Yxtr6b9yizaDiJfMEcfZJkwi8:Sh/mKwmwiuDsfMhBh

    Score
    1/10
    • Target

      病毒样本/28b40aeda006c7db6163322527c23ffa

    • Size

      97KB

    • MD5

      28b40aeda006c7db6163322527c23ffa

    • SHA1

      a5bf0922fa968b36c24b65b73789125f22f4400a

    • SHA256

      ceaaa5202447398b44d1c6cc49797c7282189cc259f60def60e901a64d25f718

    • SHA512

      5cb52e404b95489d089267e7045c1c053c5be0f05d8919343028d0acdfdc1b9d9837253ff1e03be8c2a7e961199fdfc36f048f4e39b41e2eebf480bc4922c097

    • SSDEEP

      3072:Ii8yJhl24T5wbIhHsFRvW5hdcPbE37K8N2Ur3e:7nfVRqRvW5hdcPbE37K8N2Ur3e

    Score
    1/10
    • Target

      病毒样本/29f7bb5c960036be3c3d945d23ef7fc4

    • Size

      31KB

    • MD5

      29f7bb5c960036be3c3d945d23ef7fc4

    • SHA1

      d0c1c0a0b1d2d08a18da988629ddfaa41d3daafc

    • SHA256

      7746642a255d4fb337c0deab9790bf5910efe01223c8f9b531f79be2ba59b7dd

    • SHA512

      99f6f4f9c0def6f4f97b97a9b904bc450f287289271cc17fe5f4812d64b2a596205eb0c14cfcb4a1e6776ef85876ddeb92df560628d42e8527993616573cae5a

    • SSDEEP

      768:MFXOsxs3AU6s1PUeMdl1S5WmZ49qfmpO9q3UEL5s:MVA3AQkPKWmig+pzLq

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • Target

      病毒样本/32a72a1cc99feb90e77c5f7616f0acd0

    • Size

      53KB

    • MD5

      32a72a1cc99feb90e77c5f7616f0acd0

    • SHA1

      68e55fec28636702e2ed1b14455d54706dcc936c

    • SHA256

      9b055709b6da867e4f31ed184e6c0a689e8ee3b8f3de8547b292b7922a6bcb10

    • SHA512

      c0928dc388b4b145b3319bcdb7e25a366923f3b334e58ec97bad3db599bf2e5f95c8b644b84cebd4facdcb70bd560208b0f4fbfa14cccc1f007025754e851ab6

    • SSDEEP

      768:aSk5MwmGay2xSRnIWRvFBS1uM1znjvVDoCerCjIqeXePm+ujuQM87LwCVy/rCxHG:abPmu6SRnKVjvBIqeutacHhW15OENUj

    Score
    1/10
    • Target

      病毒样本/32cba3f918e9c992b93177a2d204540a

    • Size

      53KB

    • MD5

      32cba3f918e9c992b93177a2d204540a

    • SHA1

      14607581938a6e35a85b2f7c147fbb21e4f9bd4c

    • SHA256

      5644faeaa3e7162e6423dd92780571af37299fcd2d04bf073bd6666acc3624a6

    • SHA512

      86d0c95f196adc3ebf11cd9ba54d14f841e9fe99442877ffe2681c0107a94ad0fb3e85a0c317797e21d9fbb9e5f4ab47712418b631f6adc452667a68a7f18026

    • SSDEEP

      768:X8hkgYUWhdJra76hXOBJNb/uMx2M3DuWHQaogHNi7tWebjH/eqYHM1o:Xw0Jra76hXC3/uM4MTDt8WyjH/e9HM

    Score
    9/10
    • Contacts a large (46064) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

    • Target

      病毒样本/34c537210dbdbf28f4694142490b86b3

    • Size

      60KB

    • MD5

      34c537210dbdbf28f4694142490b86b3

    • SHA1

      6218fa30427c5f9ddcef4ae1b69a69dc786071c4

    • SHA256

      528e661e0fbbb7717a37de8232d6dff246bd4fd4bc310593040b7999708d4312

    • SHA512

      dde401244ed91da99c5363b0930642ff2953ec57caec88f2183ffe4c62207696490083ca7ca1113e726ac644cfbc9f63f77bd7480b41b8eb6d0c26708b3a0450

    • SSDEEP

      1536:/wPnZ9RD1ACbOghIB0YyEjepoV9SItxOZ1NVTjV:ovZeYOguB0YyEiISItgZ1bP

    • Contacts a large (8160) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Deletes itself

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Target

      病毒样本/34e64e853d2bdb8908214048b12262e8

    • Size

      69KB

    • MD5

      34e64e853d2bdb8908214048b12262e8

    • SHA1

      130a7c1e6549d1c5a20c535e7500afd2410e9dee

    • SHA256

      1b00cdbf1529add6e771b586e7a3cf4b93a3d47bcd87ad922aa33bf48b8a3afc

    • SHA512

      c26710823ab8f108a2cd838ede0fc36ab693080f391c6bc0c817bdc6a20f4ec75572805e17ba9909e85af5fb0ee80f3b7be75bc662447a4b24ff192a709470b4

    • SSDEEP

      1536:iwnHqVoWYzDzUwz5NZlOLq5OH1fPkOeqczIKiZAwZsTsTqynG:EuWOPUK7ZlOekHBP3AwZsYTg

    Score
    1/10
    • Target

      病毒样本/35bf9d160efafe2af0d99b054df9af71

    • Size

      84KB

    • MD5

      35bf9d160efafe2af0d99b054df9af71

    • SHA1

      585b0f4e918118caa43f512fdfb44b5011dad7d7

    • SHA256

      d1184a578ad3084c5780efbd40011a12fc08a1c7e0d5a4f4b942e39b7a81af94

    • SHA512

      dcc50c5f393d316b2141735a80eb6dd5454a514d8a737b0450b07347bf4b468e78329507f7f0aa29971040d4b304f2c370fcf4b3d1e1668e0788336c4c6d6c6b

    • SSDEEP

      1536:91VC1yc2pdU+OU+8BzoNZBJz7i7eEDUD5FEla40VBPjYm+7ZVcaPXpEXZW:91Jc2TU+fiNZ/7iCEg8aLbYmEZVca/pP

    Score
    6/10
    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Target

      病毒样本/35c568784f18bb908bfc37d35ccfa44d

    • Size

      113KB

    • MD5

      35c568784f18bb908bfc37d35ccfa44d

    • SHA1

      024c6e771a284ab3450e506a1077c2d08c01b707

    • SHA256

      b12a863712d956f6e7821d43505ee19c9b3a0e0678f3c42e1e92af307b6472b3

    • SHA512

      e632c1f7306bebcd58960d797d861382fd741cf777694a581c0c2723fe703b57ab8b25cf796ad5c0e45507d3e52f1bef416cbb5b1f1204b9348de70813416f78

    • SSDEEP

      3072:diry859a2ADJf9wHYqbgFFo8+HeAFiVm7FnVqfJXoebNb:u9a2aLqkrMam7FnVqfJXoebNb

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Target

      病毒样本/36b6e50ce03c032e59af7b6caa276606

    • Size

      24KB

    • MD5

      36b6e50ce03c032e59af7b6caa276606

    • SHA1

      a08e50f18c1246236477a3e5c61ed8206f148779

    • SHA256

      a8f8a1cc43848dcf251fad25bcd9fd62be1a0d7ba61525af5d9bd09df2bd8318

    • SHA512

      fdb7910a2f7dc0488b6b2f3a9114a8acc4ef18487b08473840839121385a84792a0ca554cbd3773f2140d8195b1cce74f311960b6e61f57e397bdb7a61d78cd3

    • SSDEEP

      384:ScYCfo2qJtHfBEqWzSZr301AfQG89xEXqbsQsPUd+xKI4z38uIIvAg6hymdGUopf:OCfoJwSg9TxbsQwUwxa8uPvAg6s3UozZ

    Score
    1/10
    • Target

      病毒样本/36c1760bf0b828ea66a78cae9f5d74b3

    • Size

      86KB

    • MD5

      36c1760bf0b828ea66a78cae9f5d74b3

    • SHA1

      c143dbfc072b2652a772f69f6fc0378564311add

    • SHA256

      a4bd29bab396f358e68dfd07bcfb781c8198e0dd1cb2f93f1a7bb30f7221688e

    • SHA512

      c75fd18bbecfb5098e6b1bf69c01a9161ee8b9d4fbd018ae60f2381d8d9eb758516938c0393e87a7b46562ba5b9f7ba8bf2b8bb43d596aa6168824cb701f1cf9

    • SSDEEP

      1536:zhkpXXB3ff5/Z/Ke9LlTEQX7KqpFsYvMIsV5wtwHUIe:NyHB3friolTEQXOG/MPwtl

    Score
    1/10
    • Target

      病毒样本/37ea67b2c8927cedd2c59549aa6c88db

    • Size

      113KB

    • MD5

      37ea67b2c8927cedd2c59549aa6c88db

    • SHA1

      871d1483c76deac5ccf00c07f4cb49d2634b9c0b

    • SHA256

      3c386aafe47eb6eeab31192cd8eb3c76ce45162d5e93e11f2a11020b0725e93a

    • SHA512

      2d7f14dbb82a51eaf7bfd1128a09c41bbfad3c7f9cd61702029cdf588436ea01c541ccff875c5c3c51f81b35e641195cf302100414f59132f7a8dc750b18f7f5

    • SSDEEP

      3072:tqDUOulvQ+nozmLC9povt8XW95h8ObyRdfroeBBp7YHQQ/hVOmAD3m:wpoEW95h8ObyJ7YHQQ/hVOmAD3m

    Score
    1/10

MITRE ATT&CK Enterprise v16

Tasks

static1

upxsoralzrdjoshomiraimiraigafgyt
Score
10/10

behavioral1

Score
1/10

behavioral2

Score
1/10

behavioral3

Score
1/10

behavioral4

Score
1/10

behavioral5

discovery
Score
6/10

behavioral6

discoveryrootkit
Score
9/10

behavioral7

Score
1/10

behavioral8

Score
1/10

behavioral9

Score
1/10

behavioral10

Score
1/10

behavioral11

Score
1/10

behavioral12

defense_evasiondiscovery
Score
9/10

behavioral13

Score
1/10

behavioral14

miraisorabotnetdiscovery
Score
10/10

behavioral15

Score
1/10

behavioral16

Score
1/10

behavioral17

Score
1/10

behavioral18

Score
1/10

behavioral19

Score
1/10

behavioral20

miraimiraibotnetdiscovery
Score
10/10

behavioral21

Score
1/10

behavioral22

discoveryrootkit
Score
9/10

behavioral23

defense_evasiondiscovery
Score
9/10

behavioral24

Score
1/10

behavioral25

discovery
Score
6/10

behavioral26

defense_evasiondiscovery
Score
7/10

behavioral27

Score
1/10

behavioral28

Score
1/10

behavioral29

Score
1/10

behavioral30

Score
1/10

behavioral31

Score
1/10

behavioral32

Score
1/10