Catching hackers with a honeypot - Case study
Getting the sample
For this first case study, we'll base our analysis on a sample obtained by Cowrie. This sample can be found in the tpot installation folder, then in /data/cowrie/downloads/
.
The samples are malicious files. Handle them with caution. Always in a vm without internet connection
This first case study concerns a .sh file executed by a malicious actor to establish a botnet.
- Hash: b6ba24ff7f1b3a851fe896136086f39c7d11db7f60223cf87a4fe029469ce776
- Virustotal link: https://www.virustotal.com/gui/file/b6ba24ff7f1b3a851fe896136086f39c7d11db7f60223cf87a4fe029469ce776 (38/59)