General

  • Target

    .systemd x86

  • Size

    184KB

  • Sample

    241210-e1ls8aymep

  • MD5

    92dc30d449f563a5bdbba08d4a9d57fc

  • SHA1

    ff609eed2df786396203a8806400566df079cc7f

  • SHA256

    86db0330a233efe6e11f944833f9e9b7472d7f34595cf693f001d99df641513b

  • SHA512

    573fa375ddcb6a49690f5168d791af2529a89233d3bf0ff50c2b88686c27e4cef59432e0f6ae71745fecfa2657c23248ad33ea50ac8b9f1c96721f38e3325097

  • SSDEEP

    3072:JRuD2higiW5WdO4VgJYmntSxu23Ea8qxop/bW448wod7XSUdq7:JE6igifdlcYmtSb3d8qGjNHSQg

Malware Config

Targets

    • Target

      .systemd x86

    • Size

      184KB

    • MD5

      92dc30d449f563a5bdbba08d4a9d57fc

    • SHA1

      ff609eed2df786396203a8806400566df079cc7f

    • SHA256

      86db0330a233efe6e11f944833f9e9b7472d7f34595cf693f001d99df641513b

    • SHA512

      573fa375ddcb6a49690f5168d791af2529a89233d3bf0ff50c2b88686c27e4cef59432e0f6ae71745fecfa2657c23248ad33ea50ac8b9f1c96721f38e3325097

    • SSDEEP

      3072:JRuD2higiW5WdO4VgJYmntSxu23Ea8qxop/bW448wod7XSUdq7:JE6igifdlcYmtSb3d8qGjNHSQg

    Score
    10/10
    • Detects Kaiten/Tsunami Payload

    • Detects Kaiten/Tsunami payload

    • Kaiten family

    • Kaiten/Tsunami

      Linux-based IoT botnet which is controlled through IRC and normally used to carry out DDoS attacks.

MITRE ATT&CK Matrix

Tasks