Malware Breakdown

Here you can find the result of my analysis. Malware names are the MD5 hashes of the files I catched with my honeypot:

065172e07a125623ea0a0fbcdaaa6dee
12fb7332920a7797c2d02df29b57c640
1db61ae18c85d6aca77a4a3800af07b4
4d4c2729b8aa56e70eaf9ef84e9d5d3d
533626e061c4cb83226f72282e1c74e3
539a1db8a5adcc1f9a6ccde90e4c5ebc
7867de13bf22a7f3e3559044053e33e7
786ab616239814616642ba4438df78a9
a18c5b3d0171750bd1a53050a46b8bc2
b43ad71209c5100b9ed71edb10041514
bf79e90feed96f50c0ba5d7f212757e9
d840d16176d2a34e8661e3340e263721
de85ae919d48325189bead995e8052e7

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s