General
-
Target
libudev.so
-
Size
611KB
-
Sample
220709-t7nnqafcaj
-
MD5
7dc92a289a05c45d4179a322344ad09c
-
SHA1
be912477f64a1ee9f2d8ddaebce6efdfd00e7ccd
-
SHA256
8642022960d919321ccfcfb0a0cd631db0e5dac3e75014fc0c4cc6ff413c72c5
-
SHA512
717f42d45fb07173bfc47b1fca26e85222ee676f2164a0f84d584eda963f67bbde8c68695e708b07ef6d5e2101510ee077eae1653ae66a7c7c90397e869f29bf
Static task
static1
Behavioral task
behavioral1
Sample
libudev.so
Resource
ubuntu1804-amd64-en-20211208
Malware Config
Extracted
xorddos
ppp.gggatat456.com:53
ppp.xxxatat456.com:53
p5.dddgata789.com:53
p5.lpjulidny7.com:53
Targets
-
-
Target
libudev.so
-
Size
611KB
-
MD5
7dc92a289a05c45d4179a322344ad09c
-
SHA1
be912477f64a1ee9f2d8ddaebce6efdfd00e7ccd
-
SHA256
8642022960d919321ccfcfb0a0cd631db0e5dac3e75014fc0c4cc6ff413c72c5
-
SHA512
717f42d45fb07173bfc47b1fca26e85222ee676f2164a0f84d584eda963f67bbde8c68695e708b07ef6d5e2101510ee077eae1653ae66a7c7c90397e869f29bf
Score10/10-
suricata: ET MALWARE DDoS.XOR Checkin via HTTP
suricata: ET MALWARE DDoS.XOR Checkin via HTTP
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Writes file to system bin folder
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Write file to user bin folder
-
Reads runtime system information
Reads data from /proc virtual filesystem.
-
Writes file to tmp directory
Malware often drops required files in the /tmp directory.
-