General

  • Target

    4b9cc70454bbbb66672c4c322da04b47

  • Size

    37KB

  • Sample

    231219-25wwbaebb2

  • MD5

    4b9cc70454bbbb66672c4c322da04b47

  • SHA1

    7d9692a702ffe7f4b7d6b3f5aac5f39d8d6f560f

  • SHA256

    6db9132bf65b9923c3b14b79edac73d5cea64999af0b5224bd11865e23283885

  • SHA512

    7145b984783a69fa4fec01532d411f5b6007a4e3bc8fca8f3358cc8999fbeac024b8e67865b2ddcdcf5849d2e7fedf31d65fa58029987a8c73d7aabaed6a87c3

  • SSDEEP

    768:Ex81fgq9/GXnMkMUEm0J+opts2sDC0sdGz3A+D3dj9ygo3Uo6:ZdgWY0UEmZDFsdOwSo6

Malware Config

Targets

    • Target

      4b9cc70454bbbb66672c4c322da04b47

    • Size

      37KB

    • MD5

      4b9cc70454bbbb66672c4c322da04b47

    • SHA1

      7d9692a702ffe7f4b7d6b3f5aac5f39d8d6f560f

    • SHA256

      6db9132bf65b9923c3b14b79edac73d5cea64999af0b5224bd11865e23283885

    • SHA512

      7145b984783a69fa4fec01532d411f5b6007a4e3bc8fca8f3358cc8999fbeac024b8e67865b2ddcdcf5849d2e7fedf31d65fa58029987a8c73d7aabaed6a87c3

    • SSDEEP

      768:Ex81fgq9/GXnMkMUEm0J+opts2sDC0sdGz3A+D3dj9ygo3Uo6:ZdgWY0UEmZDFsdOwSo6

    • Detects Kaiten/Tsunami Payload

    • Kaiten/Tsunami

      Linux-based IoT botnet which is controlled through IRC and normally used to carry out DDoS attacks.

    • Writes DNS configuration

      Writes data to DNS resolver config file.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

System Information Discovery

1
T1082

Command and Control

Dynamic Resolution

1
T1568

Tasks