General
-
Target
0Xorddos.o
-
Size
611KB
-
Sample
220314-ynptwsbgb2
-
MD5
da818861f56900f552eb04c5e7d8c59d
-
SHA1
4a414ccf923001621457e4beaf2ec0e7b165f2ac
-
SHA256
d920dec25946a86aeaffd5a53ce8c3f05c9a7bac44d5c71481f497de430cb67e
-
SHA512
cff03f07b80dfc30f48dc3d2b4ca1ba572d4ca6d784c4855bc2044058c5deb5c89397c6cf3eaf9fde8660605bc8c821a7eea8a73c3f48d7994328c9ec92ae915
Static task
static1
Behavioral task
behavioral1
Sample
0Xorddos.o
Resource
ubuntu1804-amd64-en-20211208
Malware Config
Targets
-
-
Target
0Xorddos.o
-
Size
611KB
-
MD5
da818861f56900f552eb04c5e7d8c59d
-
SHA1
4a414ccf923001621457e4beaf2ec0e7b165f2ac
-
SHA256
d920dec25946a86aeaffd5a53ce8c3f05c9a7bac44d5c71481f497de430cb67e
-
SHA512
cff03f07b80dfc30f48dc3d2b4ca1ba572d4ca6d784c4855bc2044058c5deb5c89397c6cf3eaf9fde8660605bc8c821a7eea8a73c3f48d7994328c9ec92ae915
Score10/10-
suricata: ET MALWARE DDoS.XOR Checkin via HTTP
suricata: ET MALWARE DDoS.XOR Checkin via HTTP
-
Writes file to system bin folder
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Write file to user bin folder
-
Reads runtime system information
Reads data from /proc virtual filesystem.
-
Writes file to tmp directory
Malware often drops required files in the /tmp directory.
-