General

  • Target

    b330ddc13d3ebc89bc778a183ab85014dc57d8351b2cfa8d6ac7c8ad340bbec8.elf

  • Size

    126KB

  • Sample

    250103-e57lgssmbj

  • MD5

    c64277ed1fafc22a4ff6561693f81bc0

  • SHA1

    ffe8c30fd3b5f924e30e3cad9faa46004a8e951a

  • SHA256

    b330ddc13d3ebc89bc778a183ab85014dc57d8351b2cfa8d6ac7c8ad340bbec8

  • SHA512

    cd9d03ed3574cf038478128dc346a096b517b9305bd0728033548d8c6d8f429b341622d5a4d3c796c6ef87945dc64ed9bcdd369aec2fd5e0087a46116c3b1ba6

  • SSDEEP

    1536:Jtv+s43G5bUWk8RA9Sh71QAFMxK4VIGUT2y1C1O/T0A46nrtplUuwyw1FrR7bVnN:Dv+XQ/Rqg71QNE43Uqy1C1O146rOgbT

Malware Config

Extracted

Family

mirai

C2

botnetdolly.zapto.org

Extracted

Family

latentbot

C2

botnetdolly.zapto.org

Targets

    • Target

      b330ddc13d3ebc89bc778a183ab85014dc57d8351b2cfa8d6ac7c8ad340bbec8.elf

    • Size

      126KB

    • MD5

      c64277ed1fafc22a4ff6561693f81bc0

    • SHA1

      ffe8c30fd3b5f924e30e3cad9faa46004a8e951a

    • SHA256

      b330ddc13d3ebc89bc778a183ab85014dc57d8351b2cfa8d6ac7c8ad340bbec8

    • SHA512

      cd9d03ed3574cf038478128dc346a096b517b9305bd0728033548d8c6d8f429b341622d5a4d3c796c6ef87945dc64ed9bcdd369aec2fd5e0087a46116c3b1ba6

    • SSDEEP

      1536:Jtv+s43G5bUWk8RA9Sh71QAFMxK4VIGUT2y1C1O/T0A46nrtplUuwyw1FrR7bVnN:Dv+XQ/Rqg71QNE43Uqy1C1O146rOgbT

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix

Tasks