General
-
Target
270da3fe044cc57730d83ed12d3ef47a63666c1b85856013e80158edf468661b
-
Size
611KB
-
Sample
220616-gw7k8sefak
-
MD5
48cb67571c96857abb32f05e656213d3
-
SHA1
fa1be116a961be6f98075845732af64950f16eb6
-
SHA256
270da3fe044cc57730d83ed12d3ef47a63666c1b85856013e80158edf468661b
-
SHA512
3c20ca638cfdf150992f0fbbe48a42eb63160b4c32320f0224221614a44fd5953ddf6744d8c01c707fd8469a648248ef9f6993f5e007f40fe10a0aa0455b0fa1
Static task
static1
Behavioral task
behavioral1
Sample
270da3fe044cc57730d83ed12d3ef47a63666c1b85856013e80158edf468661b
Resource
ubuntu1804-amd64-en-20211208
Malware Config
Extracted
xorddos
ppp.gggatat456.com:53
ppp.xxxatat456.com:53
p5.dddgata789.com:53
p5.lpjulidny7.com:53
Targets
-
-
Target
270da3fe044cc57730d83ed12d3ef47a63666c1b85856013e80158edf468661b
-
Size
611KB
-
MD5
48cb67571c96857abb32f05e656213d3
-
SHA1
fa1be116a961be6f98075845732af64950f16eb6
-
SHA256
270da3fe044cc57730d83ed12d3ef47a63666c1b85856013e80158edf468661b
-
SHA512
3c20ca638cfdf150992f0fbbe48a42eb63160b4c32320f0224221614a44fd5953ddf6744d8c01c707fd8469a648248ef9f6993f5e007f40fe10a0aa0455b0fa1
Score10/10-
suricata: ET MALWARE DDoS.XOR Checkin via HTTP
suricata: ET MALWARE DDoS.XOR Checkin via HTTP
-
Writes file to system bin folder
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Write file to user bin folder
-
Reads runtime system information
Reads data from /proc virtual filesystem.
-
Writes file to tmp directory
Malware often drops required files in the /tmp directory.
-