PULSE NAME
Lazarus Group: Crime_WannaCry | Crime Mirai_Botnet_Malware
WHITE scoreblue 2024-08-12 Modified: 2024-10-12
5763
IOCs
HIGH VOLUME
networkorgdnsrefnethandlenet174net1740000mcicsswippswipperjody alaskajody huffinesverizoneva120block idwirelessdatanetworkswipp9-arinunitedet exploitsmbds ipcshowsearchdefaultasnonenidsgenericqueryservicewannacryransommalwarecopydockwriteeternalbluereconsuspiciousrealtek sdkminiigd upnpsoap commandexploitmsiewindows nthighbinbusyboxgafgytexecutionmirainewremotehostmitmportdestinationnewexternalportnewprotocolnewinternalportrf cumnewenabledaddpoaddportmappingwhois lookupscityorgdnshandlestateprovloudoun countypostalcodetextjavascriptb filefilesfile typejsongrapht1064 executesmodify systemprocess t1543systemd servicepostsmitre attta0002 commandt1059createta0004 createip traffichashesfile systemlibmultipathdevftwdt101devsda1 devsda2files deletede procselffd9h devsda2created binshshell commandsbinsh binshbinsh ci lop m0755varrunsshdprocesses treereferrerpe resourcecry killformbookransomwormwannacry killswitch dnspassword bypassaccount stealerhiddentearinstallerskynetget httpmemory patternhttp requestsrequesthostcachecontrolresponsecontentlengthhttponlysamesitelaxmofresourcenamesettingswpadregistry keyshdaudiomofnameacpimofresourcemofresourceregistrykernel contextruntime modulesmodulesurlscloudflaredomainsip detectionscountrywin32 exemb pemb graphsummarype32 executablems windowsintelms visualwin16 newin32 dynamiclink libraryvs98info compilerproducts idsp6 buildheader intelname md5typelanguagecontainedr englishyara ruleet trojandomain httpcapeyara detectionsalertslogicstatuspassive dnscreation datescan endpointsall scorebluehostnamepulse submiturl analysisdatenextas6167 verizonas22394 verizonshowingentriesaaaacnameasnone unitedwhitelistedas20446as8075ipv4unknownemailsexpiration datename serversaaaa nxdomainireland unknownnxdomainsoa nxdomainns nxdomaina nxdomainas8068united kingdomdomaincve201717215huawei remotehuawei hg532malware wormexploit nonerceate hashspywareadversary in the middlesmugglers gambithitmenhallrendersreredrumpegasus relatedbrute forcetarget tsara brashearsbrian sabey
MITRE ATT&CK & Malware Families
ATT&CK TECHNIQUES
MALWARE FAMILIES
DDoS:Linux/Gafgyt.YA!MTB Unix.Trojan.Mirai-7100807-0 ELF:Mirai-AHC\ [Trj] Sf:WNCryLdr-A\ [Trj] Ransom:Win32/WannaCrypt.H Win.Ransomware.WannaCry-6313787-0 Mirai
Indicators of Compromise (2 / 5763 total)
All FileHash-SHA256 CIDR URL email hostname FileHash-MD5 FileHash-SHA1 BitcoinAddress domain CVE
TYPEINDICATORDESCRIPTIONCREATED
CIDR 174.192.0.0/11 2024-08-12
CIDR 174.192.0.0/10 2024-08-12
References (28)
↗ Researched: 174.215.26.0/255 AS 6167 (CELLCO-PART) US | Swipper | Loudon County, Va | Ongoing attacks ↗ Highlighted Text: The following text was observed as standard output, "[THEA-MALWARE]: Gimme Cum Pwease XD" ↗ Trojan.Linux.Mirai.1 | Crime_Mirai | DDoS:Linux/Gafgyt.YA!MTB: FILEHASH - SHA256 a1eff1e00a7d532a6e6d71b3c5328e ↗ Antivirus Detections: ELF:Mirai-AHC\ [Trj] , Unix.Trojan.Mirai-7100807-0 , DDoS:Linux/Gafgyt.YA!MTB ↗ IDS Detections: Huawei Remote Command Execution - Outbound (CVE-2017-17215) ↗ IDS Detections: Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound ↗ Yara Detections: Mirai_Botnet_Malware ↗ High Priority Alerts: dead_host network_icmp osquery_detection network_irc nolookup_communication p2p_cnc ↗ Interesting Strings: http://schemas.xmlsoap.org/soap/encoding/ http://0.0.0.0/nope ↗ Interesting Strings: http://schemas.xmlsoap.org/soap/envelope/ 185.244.25.117 127.0.0.1 ↗ ELF Info Header ELF32 2's complement, little endian 1 (current) UNIX - System V EXEC (Executable file) Intel 80386 0x1 ↗ Matches rule Mirai_Botnet_Malware from ruleset crime_mirai by Florian Roth ↗ Matches rule Linux_Trojan_Mirai_b14f4c5d from ruleset Linux_Trojan_Mirai by Elastic Security ↗ Matches rule SUSP_XORed_Mozilla from ruleset gen_xor_hunting by Florian Roth ↗ Matches rule Linux_Trojan_Mirai_fa3ad9d0 from ruleset Linux_Trojan_Mirai by Elastic Security ↗ https://github.com/Neo23x0/signature-base/search?q=Mirai_Botnet_Malware Desc: Detects Mirai Botnet Malware RULE_AUTHOR: Florian Roth ↗ Crime_WannaCry | Ransom:Win32/WannaCrypt.H | FILEHASH - SHA256 86f7e04aed8403e6b9f0d4ae880a55f7574c1b177cf6c24234ffa992eadb2c52 ↗ Yara Detections: WannaCry_Ransomware , Win32_Ransomware_WannaCry , Wanna_Cry_Ransomware_Generic , ↗ Yara Detections: MS17_010_WanaCry_worm , NHS_Strain_Wanna , stack_string , MS_Visual_Cpp_6_0 ↗ Alerts: nids_exploit_alert nids_malware_alert network_icmp nolookup_communication persistence_autorun network_cnc_http ↗ IDS Detections: W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 ↗ IDS Detections: Domain Sinkholed by Kryptos Logic (HTML Response) ↗ IDS Detections: Possible ETERNALBLUE Probe MS17-010 (MSF style) ↗ IDS Detections: Possible ETERNALBLUE Probe MS17-010 (Generic Flags) ↗ IDS Detections: ETERNALBLUE Probe Vulnerable System Response MS17-010 ↗ IDS Detections: Observed DNS Query to Suspicious Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com) ↗ IDS Detections: Behavioral Unusual Port 445 traffic Potential Scan or Infection ↗ Antivirus Detections Sf:WNCryLdr-A\ [Trj] , Win.Ransomware.WannaCry-6313787-0 , Ransom:Win32/WannaCrypt.H