General

  • Target

    10795dd5d92ebda288692b36bb0197f1b3a21351984046c94d84cba7c1c88273.sh

  • Size

    1KB

  • Sample

    240822-bfvc3szgkd

  • MD5

    b9befa17ec3fd1f1e6578a484a24d5f2

  • SHA1

    bacbd92599131e2633a7780540677b859d3f62e0

  • SHA256

    10795dd5d92ebda288692b36bb0197f1b3a21351984046c94d84cba7c1c88273

  • SHA512

    6bd3e394a9d364d3316f01b19b2b23439ca1b048850502d8778f9de76db75739f108d67de271bb119a69181cbdfe998d7afcb6a3dda7ff1ae1ffdad3d4c0a6a9

Score
10/10

Malware Config

Targets

    • Target

      10795dd5d92ebda288692b36bb0197f1b3a21351984046c94d84cba7c1c88273.sh

    • Size

      1KB

    • MD5

      b9befa17ec3fd1f1e6578a484a24d5f2

    • SHA1

      bacbd92599131e2633a7780540677b859d3f62e0

    • SHA256

      10795dd5d92ebda288692b36bb0197f1b3a21351984046c94d84cba7c1c88273

    • SHA512

      6bd3e394a9d364d3316f01b19b2b23439ca1b048850502d8778f9de76db75739f108d67de271bb119a69181cbdfe998d7afcb6a3dda7ff1ae1ffdad3d4c0a6a9

    Score
    10/10
    • Detects Kaiten/Tsunami Payload

    • Kaiten/Tsunami

      Linux-based IoT botnet which is controlled through IRC and normally used to carry out DDoS attacks.

    • Executes dropped EXE

MITRE ATT&CK Matrix

Tasks