General

  • Target

    9c7a12678651d72127c3c6e4dac250439fa4a3be0a8728754cea327c86a529a2.elf

  • Size

    48KB

  • Sample

    240325-cq78csgd3z

  • MD5

    37a193112bd3af6c71f7e98837dbfb3f

  • SHA1

    253937627e0729ca2cb81b286c8f35d7421417b3

  • SHA256

    9c7a12678651d72127c3c6e4dac250439fa4a3be0a8728754cea327c86a529a2

  • SHA512

    faa64bd0b44c896c627872ac76ddd633283e04646e1c0bf8623fbffbe614c9acd3ed66fe71b3efe0f3a0d231308f5e28c5aa357740774e0e26c49bd30f83e026

  • SSDEEP

    768:tY/ko7wrEIjqbBs0eMyRi4Wb6tRihbR4+gE6y4CswG1yyo+7n5yTvnKqCAC:tK2AIWbW5E4YuQbR4U6yW750iqCAC

Score
10/10

Malware Config

Targets

    • Target

      9c7a12678651d72127c3c6e4dac250439fa4a3be0a8728754cea327c86a529a2.elf

    • Size

      48KB

    • MD5

      37a193112bd3af6c71f7e98837dbfb3f

    • SHA1

      253937627e0729ca2cb81b286c8f35d7421417b3

    • SHA256

      9c7a12678651d72127c3c6e4dac250439fa4a3be0a8728754cea327c86a529a2

    • SHA512

      faa64bd0b44c896c627872ac76ddd633283e04646e1c0bf8623fbffbe614c9acd3ed66fe71b3efe0f3a0d231308f5e28c5aa357740774e0e26c49bd30f83e026

    • SSDEEP

      768:tY/ko7wrEIjqbBs0eMyRi4Wb6tRihbR4+gE6y4CswG1yyo+7n5yTvnKqCAC:tK2AIWbW5E4YuQbR4U6yW750iqCAC

    Score
    10/10
    • Detects Kaiten/Tsunami Payload

    • Detects Kaiten/Tsunami payload

    • Kaiten/Tsunami

      Linux-based IoT botnet which is controlled through IRC and normally used to carry out DDoS attacks.

MITRE ATT&CK Matrix

Tasks