eBooks & Reports

Continuing Evolution of The Shellbot Malware

Issue link: https://resources.threatstack.com/i/1111192

Contents of this Issue

Navigation

Page 1 of 40

2 Executive Summary 3 Identification and Escalation 4 Malware Components 5 Cryptominer 5 Command and Control 6 SSH Brute Forcer 10 Possible Initial Vector 12 Installation and Persistence 14 Cryptominer 19 Command and Control 22 SSH Brute Forcer 27 Conclusions 31 Appendix A: Observed IOCs & SHA-256 Hashes of Downloaded Files 32 IOCs 32 SHA-256 Hashes 35 Observed IP and Password Lists 38 Appendix B: Malware Campaign Flow Diagram 39 C O N T E N T S

Articles in this issue

view archives of eBooks & Reports - Continuing Evolution of The Shellbot Malware