Skip to content

Hide Navigation Hide TOC

HinataBot (040f2e89-b8be-4150-9426-c30f75e858a2)

Akamai researchers on the Security Intelligence Response Team (SIRT) have discovered a new Go-based, DDoS-focused botnet. The malware appears to have been named “Hinata” by the malware author after a character from the popular anime series, Naruto. We are calling it “HinataBot.” Looks like an attempt to rewrite Mirai in Go. The threat actors behind HinataBot originally distributed Mirai binaries.

Cluster A Galaxy A Cluster B Galaxy B Level
Mirai (fcdfd4af-da35-49a8-9610-19be8a487185) Botnet HinataBot (040f2e89-b8be-4150-9426-c30f75e858a2) Botnet 1
Mirai (dcbf1aaa-1fdd-4bfc-a35e-145ffdfb5ac5) Tool Mirai (fcdfd4af-da35-49a8-9610-19be8a487185) Botnet 2
Mirai (fcdfd4af-da35-49a8-9610-19be8a487185) Botnet Owari (f24ad5ca-04c5-4cd0-bd72-209ebce4fdbc) Botnet 2
Mirai (fcdfd4af-da35-49a8-9610-19be8a487185) Botnet Sora (025ab0ce-bffc-11e8-be19-d70ec22c5d56) Botnet 2
Mirai (fcdfd4af-da35-49a8-9610-19be8a487185) Botnet Mirai (ELF) (17e12216-a303-4a00-8283-d3fe92d0934c) Malpedia 2
Mirai (dcbf1aaa-1fdd-4bfc-a35e-145ffdfb5ac5) Tool Sora (025ab0ce-bffc-11e8-be19-d70ec22c5d56) Botnet 3
Mirai (dcbf1aaa-1fdd-4bfc-a35e-145ffdfb5ac5) Tool Owari (f24ad5ca-04c5-4cd0-bd72-209ebce4fdbc) Botnet 3
Mirai (dcbf1aaa-1fdd-4bfc-a35e-145ffdfb5ac5) Tool Mirai (ELF) (17e12216-a303-4a00-8283-d3fe92d0934c) Malpedia 3
Owari (f24ad5ca-04c5-4cd0-bd72-209ebce4fdbc) Botnet Sora (025ab0ce-bffc-11e8-be19-d70ec22c5d56) Botnet 3
Owari (f24ad5ca-04c5-4cd0-bd72-209ebce4fdbc) Botnet Owari (ec67f206-6464-48cf-a012-3cdfc1278488) Malpedia 3