Skip to content

Hide Navigation Hide TOC

HinataBot (040f2e89-b8be-4150-9426-c30f75e858a2)

Akamai researchers on the Security Intelligence Response Team (SIRT) have discovered a new Go-based, DDoS-focused botnet. The malware appears to have been named “Hinata” by the malware author after a character from the popular anime series, Naruto. We are calling it “HinataBot.” Looks like an attempt to rewrite Mirai in Go. The threat actors behind HinataBot originally distributed Mirai binaries.

Cluster A Galaxy A Cluster B Galaxy B Level
HinataBot (040f2e89-b8be-4150-9426-c30f75e858a2) Botnet Mirai (fcdfd4af-da35-49a8-9610-19be8a487185) Botnet 1
Mirai (dcbf1aaa-1fdd-4bfc-a35e-145ffdfb5ac5) Tool Mirai (fcdfd4af-da35-49a8-9610-19be8a487185) Botnet 2
Mirai (ELF) (17e12216-a303-4a00-8283-d3fe92d0934c) Malpedia Mirai (fcdfd4af-da35-49a8-9610-19be8a487185) Botnet 2
Owari (f24ad5ca-04c5-4cd0-bd72-209ebce4fdbc) Botnet Mirai (fcdfd4af-da35-49a8-9610-19be8a487185) Botnet 2
Mirai (fcdfd4af-da35-49a8-9610-19be8a487185) Botnet Sora (025ab0ce-bffc-11e8-be19-d70ec22c5d56) Botnet 2
Mirai (dcbf1aaa-1fdd-4bfc-a35e-145ffdfb5ac5) Tool Owari (f24ad5ca-04c5-4cd0-bd72-209ebce4fdbc) Botnet 3
Mirai (dcbf1aaa-1fdd-4bfc-a35e-145ffdfb5ac5) Tool Mirai (ELF) (17e12216-a303-4a00-8283-d3fe92d0934c) Malpedia 3
Mirai (dcbf1aaa-1fdd-4bfc-a35e-145ffdfb5ac5) Tool Sora (025ab0ce-bffc-11e8-be19-d70ec22c5d56) Botnet 3
Owari (ec67f206-6464-48cf-a012-3cdfc1278488) Malpedia Owari (f24ad5ca-04c5-4cd0-bd72-209ebce4fdbc) Botnet 3
Owari (f24ad5ca-04c5-4cd0-bd72-209ebce4fdbc) Botnet Sora (025ab0ce-bffc-11e8-be19-d70ec22c5d56) Botnet 3