General

  • Target

    a506c6cf25de202e6b2bf60fe0236911a6ff8aa33f12a78edad9165ab0851caf

  • Size

    16KB

  • Sample

    240701-g2bqra1fjp

  • MD5

    df386df8c8a376686f788ceff1216f11

  • SHA1

    b878d4c559855d65a4359341e11e7382f18aeb54

  • SHA256

    a506c6cf25de202e6b2bf60fe0236911a6ff8aa33f12a78edad9165ab0851caf

  • SHA512

    cef61ef0c2d7f925c49c8834c701d3c08b37367829df10e8f7839d360518d61a3ff0c957749081104ae80096aed76b2f2dc182ea61c14d1664f8c15dec30d21d

  • SSDEEP

    384:YfWm2aSROZcxHjUR46e3otA94kPotslUOZxZft5:YfWNEWFjURt4B9JJuU3P

Score
10/10

Malware Config

Targets

    • Target

      a506c6cf25de202e6b2bf60fe0236911a6ff8aa33f12a78edad9165ab0851caf

    • Size

      16KB

    • MD5

      df386df8c8a376686f788ceff1216f11

    • SHA1

      b878d4c559855d65a4359341e11e7382f18aeb54

    • SHA256

      a506c6cf25de202e6b2bf60fe0236911a6ff8aa33f12a78edad9165ab0851caf

    • SHA512

      cef61ef0c2d7f925c49c8834c701d3c08b37367829df10e8f7839d360518d61a3ff0c957749081104ae80096aed76b2f2dc182ea61c14d1664f8c15dec30d21d

    • SSDEEP

      384:YfWm2aSROZcxHjUR46e3otA94kPotslUOZxZft5:YfWNEWFjURt4B9JJuU3P

    Score
    10/10
    • Detects Kaiten/Tsunami Payload

    • Detects Kaiten/Tsunami payload

    • Kaiten/Tsunami

      Linux-based IoT botnet which is controlled through IRC and normally used to carry out DDoS attacks.

MITRE ATT&CK Matrix

Tasks