General

  • Target

    b15391a5bc89b016807a7eb36ba74c8f7c68299afc3a0538e89b120597217e75.elf

  • Size

    175KB

  • Sample

    250102-cwpyza1kaj

  • MD5

    b879e8281f57d1bb2ed6924e36abdfd2

  • SHA1

    26b0b1f5a98b657f822177ec029a64ff0a758fc6

  • SHA256

    b15391a5bc89b016807a7eb36ba74c8f7c68299afc3a0538e89b120597217e75

  • SHA512

    53bad62e6f72f20e96514274c50f65898dc983fafe07668df5b017eee71540c98003f62f7c46b1a17c4708f4d6881db720b4be89a8b7e1b8e46f7f991b79d63d

  • SSDEEP

    3072:HK/lcDBbBLHcBCkAabwdyqkkUbH/6EBp9O/hJjogM/RHyfqs:HK/UBLHElAabwdybkQ1BTO/XMgM/RHyz

Malware Config

Extracted

Family

mirai

C2

botnetdolly.zapto.org

Extracted

Family

latentbot

C2

botnetdolly.zapto.org

Targets

    • Target

      b15391a5bc89b016807a7eb36ba74c8f7c68299afc3a0538e89b120597217e75.elf

    • Size

      175KB

    • MD5

      b879e8281f57d1bb2ed6924e36abdfd2

    • SHA1

      26b0b1f5a98b657f822177ec029a64ff0a758fc6

    • SHA256

      b15391a5bc89b016807a7eb36ba74c8f7c68299afc3a0538e89b120597217e75

    • SHA512

      53bad62e6f72f20e96514274c50f65898dc983fafe07668df5b017eee71540c98003f62f7c46b1a17c4708f4d6881db720b4be89a8b7e1b8e46f7f991b79d63d

    • SSDEEP

      3072:HK/lcDBbBLHcBCkAabwdyqkkUbH/6EBp9O/hJjogM/RHyfqs:HK/UBLHElAabwdybkQ1BTO/XMgM/RHyz

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix

Tasks