Mirai Zombie Network Variant "Aquabot" Analysis [Friday, January 12, 2024]

Recently, Antiy CERT captured a new variant of the Mirai zombie network targeting various architectures such as MIPS, ARM, and X86. It infects targ...
Mirai Zombie Network Variant "Aquabot" Analysis [Friday, January 12, 2024]
Mirai Zombie Network Variant "Aquabot" Analysis
Report

Mirai Zombie Network Variant "Aquabot" Analysis

Description :
Recently, Antiy CERT captured a new variant of the Mirai zombie network targeting various architectures such as MIPS, ARM, and X86. It infects targets using weak passwords and waits for control commands to execute DDoS attacks. Due to the zombie network files being named with "Aqua*," we have named it Aquabot.

Published Created Modified
2024-01-12 23:18:15 2024-01-12 23:18:15 2024-01-12 23:24:26

Tags

Indicators

IPv4s :
  • 89.190.156.145
Domains :
  • boats.dogmuncher.xyz
Malwares :
  • Mirai
Hashes :
  • 14089ffd01f6b565f66bfe9e9a708e4376865c6c4407a1f4d16d50198a0bb8e3
  • 9423952bc91a33fdb8358e5999b337a6e4540c7f8d60fe31d1814e05ea87ade3
  • 4bfd26e84606606d6c95109b0cbb4ff3ce85fa18490f7098592c0fc80fb61f50
  • 18056b7692fdce7544fd0b6abc8710790e72af1d7aa9e15262bfe1586984728a
  • c8d2fc7fd2d8d76156617806d52887487547e5ba03a5ea2577a45a45eeeeb290
  • aec3902a4053400bda84c2ca4cf677b51d332304e2e895f6f77733e8d05a2e50
  • 63dc18c621333b2a2f81424702a03be4c1342a1618e16f9c0a1ef81e8cf0f02a
  • 6d6db580b0f7853421c7523f7a2f4696d98f9251d950466e9c070e51817f48f7
MITRE ATT&CK Techniques :

External References

You can download the txt file containing the indicators by clicking on the button below:

About the author
Julien B.

Securitricks

Up-to-Date Cybersecurity Insights & Malware Reports

Securitricks

Great! You’ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Securitricks.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.