General

  • Target

    fde8892579660c39916c5c8ec1288355feef8f66cc84a44cc3c48f063e00923f

  • Size

    611KB

  • Sample

    220625-ypncfsaadl

  • MD5

    38771450912c4c325c16ad774792a0c2

  • SHA1

    300b84493909d8a6b2ca2044232704fad08a88f2

  • SHA256

    fde8892579660c39916c5c8ec1288355feef8f66cc84a44cc3c48f063e00923f

  • SHA512

    b3271c1cefcfb687963b96f292c89ca9d4388bf5c893f713b2dcbf6e7e71613d046c3e2af9499a9e90a518c7ee1be52aed09e3e089cb3b1bd38d8cae9c823ead

Malware Config

Extracted

Family

xorddos

C2

ppp.gggatat456.com:53

ppp.xxxatat456.com:53

p5.dddgata789.com:53

p5.lpjulidny7.com:53

Targets

    • Target

      fde8892579660c39916c5c8ec1288355feef8f66cc84a44cc3c48f063e00923f

    • Size

      611KB

    • MD5

      38771450912c4c325c16ad774792a0c2

    • SHA1

      300b84493909d8a6b2ca2044232704fad08a88f2

    • SHA256

      fde8892579660c39916c5c8ec1288355feef8f66cc84a44cc3c48f063e00923f

    • SHA512

      b3271c1cefcfb687963b96f292c89ca9d4388bf5c893f713b2dcbf6e7e71613d046c3e2af9499a9e90a518c7ee1be52aed09e3e089cb3b1bd38d8cae9c823ead

    Score
    10/10
    • suricata: ET MALWARE DDoS.XOR Checkin

      suricata: ET MALWARE DDoS.XOR Checkin

    • suricata: ET MALWARE DDoS.XOR Checkin via HTTP

      suricata: ET MALWARE DDoS.XOR Checkin via HTTP

    • Writes file to system bin folder

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies rc script

      Adding/modifying system rc scripts is a common persistence mechanism.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Write file to user bin folder

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

    • Writes file to tmp directory

      Malware often drops required files in the /tmp directory.

MITRE ATT&CK Enterprise v6

Tasks