Malware Analysis Report

2025-04-03 09:54

Sample ID 250226-v45nhaxps4
Target zbotmipsel.elf
SHA256 7a44cf5e4f75ce61edc23828f21a542357e19ba66c70bd26b50bbce051382505
Tags
kaiten discovery
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

7a44cf5e4f75ce61edc23828f21a542357e19ba66c70bd26b50bbce051382505

Threat Level: Known bad

The file zbotmipsel.elf was found to be: Known bad.

Malicious Activity Summary

kaiten discovery

Detects Kaiten/Tsunami Payload

Kaiten family

System Network Configuration Discovery

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-02-26 17:33

Signatures

Detects Kaiten/Tsunami Payload

Description Indicator Process Target
N/A N/A N/A N/A

Kaiten family

kaiten

Analysis: behavioral1

Detonation Overview

Submitted

2025-02-26 17:33

Reported

2025-02-26 17:36

Platform

debian12-mipsel-20240729-en

Max time kernel

103s

Max time network

108s

Command Line

[/tmp/zbotmipsel.elf]

Signatures

System Network Configuration Discovery

discovery
Description Indicator Process Target
N/A N/A /tmp/zbotmipsel.elf N/A

Processes

/tmp/zbotmipsel.elf

[/tmp/zbotmipsel.elf]

Network

Country Destination Domain Proto
RU 193.143.1.118:6667 tcp
AU 1.1.1.1:53 debian12-mipsel-20240729-en-4 udp
AU 1.1.1.1:53 debian12-mipsel-20240729-en-4 udp
AU 1.1.1.1:53 debian12-mipsel-20240729-en-4 udp
AU 1.1.1.1:53 debian12-mipsel-20240729-en-4 udp

Files

N/A