General
-
Target
bot.mips.elf
-
Size
169KB
-
Sample
250102-aftacaskgt
-
MD5
cac7a8f8c4b3cd1f2c1bd1f187c617eb
-
SHA1
3bbe81657aed5d688bda2b3456faab369abf1732
-
SHA256
d3c7ddef9cacafd02109d8a840fc2c54fbc04cbfb32253f6f08182ef6d06221f
-
SHA512
2df8eeab046c7d33adecc5a2edadc923985b577cd05dc8775623ebeff0621f8cc44ee7b1bef6ec32bde337f1d4355e1f4b335c35d30633b5d53b17a503dfd3ce
-
SSDEEP
1536:Cl2JvnXPvLrQuchMJdDNsCK9H1R8cA2iQembSM+xV7TfF+hPyO0Hb/zMt/Y:Cgv/fcwZsCK9VRhAX+bShFSP0HbbMlY
Malware Config
Extracted
latentbot
botnetdolly.zapto.org
Targets
-
-
Target
bot.mips.elf
-
Size
169KB
-
MD5
cac7a8f8c4b3cd1f2c1bd1f187c617eb
-
SHA1
3bbe81657aed5d688bda2b3456faab369abf1732
-
SHA256
d3c7ddef9cacafd02109d8a840fc2c54fbc04cbfb32253f6f08182ef6d06221f
-
SHA512
2df8eeab046c7d33adecc5a2edadc923985b577cd05dc8775623ebeff0621f8cc44ee7b1bef6ec32bde337f1d4355e1f4b335c35d30633b5d53b17a503dfd3ce
-
SSDEEP
1536:Cl2JvnXPvLrQuchMJdDNsCK9H1R8cA2iQembSM+xV7TfF+hPyO0Hb/zMt/Y:Cgv/fcwZsCK9VRhAX+bShFSP0HbbMlY
-
Latentbot family
-
Enumerates running processes
Discovers information about currently running processes on the system
-