Skip to content

Hide Navigation Hide TOC

HinataBot (040f2e89-b8be-4150-9426-c30f75e858a2)

Akamai researchers on the Security Intelligence Response Team (SIRT) have discovered a new Go-based, DDoS-focused botnet. The malware appears to have been named “Hinata” by the malware author after a character from the popular anime series, Naruto. We are calling it “HinataBot.” Looks like an attempt to rewrite Mirai in Go. The threat actors behind HinataBot originally distributed Mirai binaries.

Cluster A Galaxy A Cluster B Galaxy B Level
Mirai (fcdfd4af-da35-49a8-9610-19be8a487185) Botnet HinataBot (040f2e89-b8be-4150-9426-c30f75e858a2) Botnet 1
Mirai (dcbf1aaa-1fdd-4bfc-a35e-145ffdfb5ac5) Tool Mirai (fcdfd4af-da35-49a8-9610-19be8a487185) Botnet 2
Owari (f24ad5ca-04c5-4cd0-bd72-209ebce4fdbc) Botnet Mirai (fcdfd4af-da35-49a8-9610-19be8a487185) Botnet 2
Mirai (fcdfd4af-da35-49a8-9610-19be8a487185) Botnet Sora (025ab0ce-bffc-11e8-be19-d70ec22c5d56) Botnet 2
Mirai (fcdfd4af-da35-49a8-9610-19be8a487185) Botnet Mirai (ELF) (17e12216-a303-4a00-8283-d3fe92d0934c) Malpedia 2
Mirai (dcbf1aaa-1fdd-4bfc-a35e-145ffdfb5ac5) Tool Owari (f24ad5ca-04c5-4cd0-bd72-209ebce4fdbc) Botnet 3
Mirai (dcbf1aaa-1fdd-4bfc-a35e-145ffdfb5ac5) Tool Sora (025ab0ce-bffc-11e8-be19-d70ec22c5d56) Botnet 3
Mirai (dcbf1aaa-1fdd-4bfc-a35e-145ffdfb5ac5) Tool Mirai (ELF) (17e12216-a303-4a00-8283-d3fe92d0934c) Malpedia 3
Owari (f24ad5ca-04c5-4cd0-bd72-209ebce4fdbc) Botnet Owari (ec67f206-6464-48cf-a012-3cdfc1278488) Malpedia 3
Owari (f24ad5ca-04c5-4cd0-bd72-209ebce4fdbc) Botnet Sora (025ab0ce-bffc-11e8-be19-d70ec22c5d56) Botnet 3