General

  • Target

    270da3fe044cc57730d83ed12d3ef47a63666c1b85856013e80158edf468661b

  • Size

    611KB

  • Sample

    220616-gw7k8sefak

  • MD5

    48cb67571c96857abb32f05e656213d3

  • SHA1

    fa1be116a961be6f98075845732af64950f16eb6

  • SHA256

    270da3fe044cc57730d83ed12d3ef47a63666c1b85856013e80158edf468661b

  • SHA512

    3c20ca638cfdf150992f0fbbe48a42eb63160b4c32320f0224221614a44fd5953ddf6744d8c01c707fd8469a648248ef9f6993f5e007f40fe10a0aa0455b0fa1

Malware Config

Extracted

Family

xorddos

C2

ppp.gggatat456.com:53

ppp.xxxatat456.com:53

p5.dddgata789.com:53

p5.lpjulidny7.com:53

Targets

    • Target

      270da3fe044cc57730d83ed12d3ef47a63666c1b85856013e80158edf468661b

    • Size

      611KB

    • MD5

      48cb67571c96857abb32f05e656213d3

    • SHA1

      fa1be116a961be6f98075845732af64950f16eb6

    • SHA256

      270da3fe044cc57730d83ed12d3ef47a63666c1b85856013e80158edf468661b

    • SHA512

      3c20ca638cfdf150992f0fbbe48a42eb63160b4c32320f0224221614a44fd5953ddf6744d8c01c707fd8469a648248ef9f6993f5e007f40fe10a0aa0455b0fa1

    Score
    10/10
    • suricata: ET MALWARE DDoS.XOR Checkin

      suricata: ET MALWARE DDoS.XOR Checkin

    • suricata: ET MALWARE DDoS.XOR Checkin via HTTP

      suricata: ET MALWARE DDoS.XOR Checkin via HTTP

    • Writes file to system bin folder

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies rc script

      Adding/modifying system rc scripts is a common persistence mechanism.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Write file to user bin folder

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

    • Writes file to tmp directory

      Malware often drops required files in the /tmp directory.

MITRE ATT&CK Enterprise v6

Tasks