Analysis

  • max time kernel
    152s
  • max time network
    154s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20231215-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20231215-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    21-12-2023 21:55

General

  • Target

    09dce16ca442c72834d91c4f5149568a

  • Size

    44KB

  • MD5

    09dce16ca442c72834d91c4f5149568a

  • SHA1

    35778b9e2907024b592645ab69072bfffb6c50b3

  • SHA256

    7fd54dcd4ac982f394b5205f3683e219fe9a99fc7c45190bbc2be8a2bf434d0b

  • SHA512

    c5448b80d212052443c77b53fe74ef7e59c1b96d45bfcd4c7ac1cecf1167beebd0d033a00940d5a334800ec1c7a19d542559b62903588b5479d20d2e419c96f5

  • SSDEEP

    768:yBYKpAeJW6/MH3vnxMvtYFGhR4/6jDYyKS1PQYqpDtpENGfRFMBOHHb:ZKBJh45MaFGhoKWEgfRKQ7

Score
10/10

Malware Config

Signatures

  • Detects Kaiten/Tsunami Payload 1 IoCs
  • Detects Kaiten/Tsunami payload 1 IoCs
  • Kaiten/Tsunami

    Linux-based IoT botnet which is controlled through IRC and normally used to carry out DDoS attacks.

Processes

  • /tmp/09dce16ca442c72834d91c4f5149568a
    /tmp/09dce16ca442c72834d91c4f5149568a
    1⤵
      PID:715

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/715-1-0x00400000-0x100008b0-memory.dmp