General
-
Target
45deebda9ff6b01eaeb6961b22066709f7df31c4e5f53acc76c3488483807f7e
-
Size
611KB
-
Sample
220707-mmj2gafcg2
-
MD5
63877c8af701e337108a87181e13a855
-
SHA1
2c778383d1e411a83415d6d43f6ca6699248f8ec
-
SHA256
45deebda9ff6b01eaeb6961b22066709f7df31c4e5f53acc76c3488483807f7e
-
SHA512
835d019e77b8200b738a788bb3e575854816293a5dd1a36006698f8b467feff55a9099da94a46a7176b470810b90aae26ba8cc0c3fdd933fe7c849b1d3348a2a
Static task
static1
Behavioral task
behavioral1
Sample
45deebda9ff6b01eaeb6961b22066709f7df31c4e5f53acc76c3488483807f7e
Resource
ubuntu1804-amd64-en-20211208
Malware Config
Extracted
xorddos
ppp.gggatat456.com:53
ppp.xxxatat456.com:53
p5.dddgata789.com:53
p5.lpjulidny7.com:53
Targets
-
-
Target
45deebda9ff6b01eaeb6961b22066709f7df31c4e5f53acc76c3488483807f7e
-
Size
611KB
-
MD5
63877c8af701e337108a87181e13a855
-
SHA1
2c778383d1e411a83415d6d43f6ca6699248f8ec
-
SHA256
45deebda9ff6b01eaeb6961b22066709f7df31c4e5f53acc76c3488483807f7e
-
SHA512
835d019e77b8200b738a788bb3e575854816293a5dd1a36006698f8b467feff55a9099da94a46a7176b470810b90aae26ba8cc0c3fdd933fe7c849b1d3348a2a
Score10/10-
suricata: ET MALWARE DDoS.XOR Checkin via HTTP
suricata: ET MALWARE DDoS.XOR Checkin via HTTP
-
Writes file to system bin folder
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Write file to user bin folder
-
Reads runtime system information
Reads data from /proc virtual filesystem.
-
Writes file to tmp directory
Malware often drops required files in the /tmp directory.
-