General

  • Target

    959850cdd738ca33d4731d275e4237f2

  • Size

    33KB

  • Sample

    240206-16rsbahdh9

  • MD5

    959850cdd738ca33d4731d275e4237f2

  • SHA1

    4994e10487a0cb771bfd51fdd0387d2924ba5854

  • SHA256

    3b2045efa4d24677089ffe5c74bfd774d6e9e4c0d31fe1e96ddd978348213881

  • SHA512

    24ad5e6d15314c4d10603d445b06619e112c7ca836d74e21f4211cf97b5175566ffbca6984efe043c173842a9659242c1fb245d50923c9fb4405d9cc981f80b0

  • SSDEEP

    768:/dQM727s0rdd9vM2aivyoFVWrifbpRhOrj2/KWn:/dQ227Nd7vMMlfbpfOrE

Malware Config

Targets

    • Target

      959850cdd738ca33d4731d275e4237f2

    • Size

      33KB

    • MD5

      959850cdd738ca33d4731d275e4237f2

    • SHA1

      4994e10487a0cb771bfd51fdd0387d2924ba5854

    • SHA256

      3b2045efa4d24677089ffe5c74bfd774d6e9e4c0d31fe1e96ddd978348213881

    • SHA512

      24ad5e6d15314c4d10603d445b06619e112c7ca836d74e21f4211cf97b5175566ffbca6984efe043c173842a9659242c1fb245d50923c9fb4405d9cc981f80b0

    • SSDEEP

      768:/dQM727s0rdd9vM2aivyoFVWrifbpRhOrj2/KWn:/dQ227Nd7vMMlfbpfOrE

    • Detects Kaiten/Tsunami Payload

    • Kaiten/Tsunami

      Linux-based IoT botnet which is controlled through IRC and normally used to carry out DDoS attacks.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

System Information Discovery

1
T1082

Tasks