You Had Me at Hi — Mirai-Based NoaBot Makes an Appearance [Thursday, January 11, 2024]

NoaBot is yet another Mirai-based botnet. The Mirai botnet is a wormable botnet that targets Linux-based Internet of Things (IoT) devices. It is us...
You Had Me at Hi — Mirai-Based NoaBot Makes an Appearance [Thursday, January 11, 2024]
You Had Me at Hi — Mirai-Based NoaBot Makes an Appearance
Report

You Had Me at Hi — Mirai-Based NoaBot Makes an Appearance

Description :
NoaBot is yet another Mirai-based botnet. The Mirai botnet is a wormable botnet that targets Linux-based Internet of Things (IoT) devices. It is used for distributed denial-of-service (DDoS) attacks. The original Mirai botnet was identified in 2016, but its source code has been made public, and many variants can be seen nowadays.

Published Created Modified
2024-01-11 20:45:57 2024-01-11 20:45:57 2024-01-11 20:54:11

Tags

Indicators

IPv4s :
  • 101.37.117.39
Domains :
  • mimicmaster.online
  • mimicer.online
  • melovingsangria.online
Malwares :
  • Trojan:Linux/CoinMiner.K
  • Trojan:Linux/Mirai
Hashes :
  • 77ef57fe12cc50c0138b39c4ad4452d4bf95f6a81cb73251413d0b1bdacd7658
  • a4b3578d51f0b52d38c4fa1947f73bff2f236b8aa4ff0c27923a25e75139a517
  • c9894a27386756665fb75c3d1a500f3718b60f95ef8614d861b9d5172387a9ff
  • 21fc13547e6bd85b5ba16054537cfda88de78cda5b18a5072c7ea7d8aad9057a
  • b74ee9301647bbb064e744fc36e2015b225f1b02fa3590319979805dc745b859
  • 21fad53a5c051f5885bd66adfebcd74e45404b81a781214144109567874e0822
  • 3da8c62d8c268763c7c8c783c35760002a532cc7afd47b11a5e75c61d562f1a3
  • 15959226a827d7c5a287aac0efbaea271a3bf9531a920c5f020ec408bbe10db1
  • b6b61fce3ce7c8a76d36637d57070da3c63d785b85fc19a5a7a994681b00c79f
  • bb6e4e9695c7f131bef89299da04a6456c88baf26283d2c49e84e48c7ae9acdb
  • 985fc34b2732abe8af9cc112fcb394df7a4ff0dab68c6bf30490586906080df6
  • bfd90aae83615b9a81f2e8c252935ec1b9ba1cd81fe04589e24a34f855b869c6
  • 74bb0f2049b3c9c1fe92a4f7c57feb9e4c35653b652cf64ae4cdfab2d408d96d
  • 38e8e575344d9c429d0ac96c7bae8500758a442c6347579e83d04d084abb3877
  • 1a86ad57d2250eaf8437f64251f64b14a4d71f5f0ef3c7e9435866b340928980
  • b5e4c78705d602c8423b05d8cd758147fa5bcd2ac9a4fe7eb16a07ab46c82f07
  • 53c544a290ec5b75d08d438a5b8a77df0201cd141ccadb7e259488ab1c5f0bd4
  • 3ca0ce8bba2b5b4cc2377afb96b32f4fda93ec897f1662a3f3ba7f39b7e9dd02
  • deb9eaf830614ce968874a47c489ace65520d5202810b106c81bc3c37490063b
  • 62d167c1af8c9c228f9b6dcfeda6439b640f99c1ebd8e1284126ee31710c4b6c
  • 616ef9b5383c3ae7361a56f00b51dc79f2c5e273c32e3cdc9573125d91ebbd6a
  • 7fe9315da4be9aad57a19b5e43666d4e38827026607e376f6d01840dea35e719
  • 43b7aceba5ac969c3af510cf7c11ed0adae440346ae80a4ac19c1855881390fa
  • 2a8a473f3fefb0182c785711a471413df82371350a9c735e217b8c6ee6aaa7e9
  • edb587c2f326e100ca0bd057d5fc9693cead026fb2de739404488c817bf7bb3f
  • 76fc6161bbf865a8b46c38a0264e984306b353dec86c29a077372095f3d6ece2
  • 688a37a9a4a1795735fc08e6ff16f415e6d4ad8581b7d2f1972d862a3982276f
  • adde0f0d97bdbe606e793a3a082d9e3db6d6f9a098dbe9d835d445362b06a4ef
  • 16a28951acfe78b81046bfedb0b489efb4c9d3d1d3b8475c39b93cd5105dc866
  • 306ee0eff111da5a4163c58afda9a3174db7814d347f0f161d91f266caa395b6
  • a4d5930528d9b8f700dc301556de9c437b92bbdf2c16cf5be991a8bdeb67c36e
  • 9611786e9c99dc764368efdbc0fbe5fb8a24885c62061c51ecc6ccc9d1a9f44f
  • 7135951d4cc86ff0d8b2c739a7f713a11659becbc10138867a117e47b9efdc34
MITRE ATT&CK Techniques :

External References

You can download the txt file containing the indicators by clicking on the button below:

About the author
Julien B.

Securitricks

Up-to-Date Cybersecurity Insights & Malware Reports

Securitricks

Great! You’ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Securitricks.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.