General

  • Target

    752db954de22cc47d695a367d8e4c405

  • Size

    19KB

  • Sample

    231222-g3cdnscfb8

  • MD5

    752db954de22cc47d695a367d8e4c405

  • SHA1

    b9ef1847fc519c8645a92baf9f45384c2a229b00

  • SHA256

    e73ac8875a036941fa9b767739eb8456f3ca5c04a4441c453f0d920b821a6527

  • SHA512

    9a1da432c9bc0a06e61e9e094ce971bf687bd50fe792540df71e20ad44f34089bbc29a3233a2446db10a32c014eaa9d0f06652592902a3b28d388874cba6540a

  • SSDEEP

    384:P4ndook4jOeP/cnqwueMYTBJJpgOzmn06AlF2qShssWzZIiWvg0oe1SvL9Mc:P4ndoWjOw/JwueZlJJbzh6OormIi8oG+

Score
10/10

Malware Config

Targets

    • Target

      752db954de22cc47d695a367d8e4c405

    • Size

      19KB

    • MD5

      752db954de22cc47d695a367d8e4c405

    • SHA1

      b9ef1847fc519c8645a92baf9f45384c2a229b00

    • SHA256

      e73ac8875a036941fa9b767739eb8456f3ca5c04a4441c453f0d920b821a6527

    • SHA512

      9a1da432c9bc0a06e61e9e094ce971bf687bd50fe792540df71e20ad44f34089bbc29a3233a2446db10a32c014eaa9d0f06652592902a3b28d388874cba6540a

    • SSDEEP

      384:P4ndook4jOeP/cnqwueMYTBJJpgOzmn06AlF2qShssWzZIiWvg0oe1SvL9Mc:P4ndoWjOw/JwueZlJJbzh6OormIi8oG+

    Score
    10/10
    • Detects Kaiten/Tsunami Payload

    • Detects Kaiten/Tsunami payload

    • Kaiten/Tsunami

      Linux-based IoT botnet which is controlled through IRC and normally used to carry out DDoS attacks.

MITRE ATT&CK Matrix

Tasks