General

  • Target

    bot.x86_64

  • Size

    136KB

  • Sample

    250114-ynx59szmgk

  • MD5

    dc037b5b523f19d41b86da6d46de42a6

  • SHA1

    b7e3aca7eb103e1c8d3439e14fc697f4f16e3ec1

  • SHA256

    5c48b41dee8c1758fb100990d5d9669ec284e0983b238518d669ede964e1f098

  • SHA512

    ca59f07b9628345e8e242ec687264075e112678429d67671cbf28584107fde46a5939d447cddc95e15e30c7b9a8d0773aa30d29c9b9bc4a9893183b5e2d77925

  • SSDEEP

    3072:tGtwnNiaOnUTLFKPT9OSQ7AOaogjV2iZlBWCgriAOQPdL:tGtwnNiaOnUTFuLyBOQPd

Malware Config

Extracted

Family

mirai

C2

160.191.175.187

Extracted

Family

latentbot

C2

botnetdolly.zapto.org

Targets

    • Target

      bot.x86_64

    • Size

      136KB

    • MD5

      dc037b5b523f19d41b86da6d46de42a6

    • SHA1

      b7e3aca7eb103e1c8d3439e14fc697f4f16e3ec1

    • SHA256

      5c48b41dee8c1758fb100990d5d9669ec284e0983b238518d669ede964e1f098

    • SHA512

      ca59f07b9628345e8e242ec687264075e112678429d67671cbf28584107fde46a5939d447cddc95e15e30c7b9a8d0773aa30d29c9b9bc4a9893183b5e2d77925

    • SSDEEP

      3072:tGtwnNiaOnUTLFKPT9OSQ7AOaogjV2iZlBWCgriAOQPdL:tGtwnNiaOnUTFuLyBOQPd

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix

Tasks