General
-
Target
480b64a59351eb113721dc98b4590b4190b7776956ebdda92217027b11cd3596
-
Size
611KB
-
Sample
220714-j5hpkshae7
-
MD5
46f2d80783e38a1d67cec241d986b054
-
SHA1
f4f36ab2bff7a50082103fa30053388ee6a8deb5
-
SHA256
480b64a59351eb113721dc98b4590b4190b7776956ebdda92217027b11cd3596
-
SHA512
0f740eb659c7cdc731f89dbaac400bc85da9e3c6586407d9ce0a86c8ffef4407c9f41c1c4f607a0fddfc4942ad27a8d14d07e284eaab66cd03b39a4daa45a135
Static task
static1
Behavioral task
behavioral1
Sample
480b64a59351eb113721dc98b4590b4190b7776956ebdda92217027b11cd3596
Resource
ubuntu1804-amd64-en-20211208
Malware Config
Extracted
xorddos
ppp.gggatat456.com:53
ppp.xxxatat456.com:53
p5.dddgata789.com:53
p5.lpjulidny7.com:53
Targets
-
-
Target
480b64a59351eb113721dc98b4590b4190b7776956ebdda92217027b11cd3596
-
Size
611KB
-
MD5
46f2d80783e38a1d67cec241d986b054
-
SHA1
f4f36ab2bff7a50082103fa30053388ee6a8deb5
-
SHA256
480b64a59351eb113721dc98b4590b4190b7776956ebdda92217027b11cd3596
-
SHA512
0f740eb659c7cdc731f89dbaac400bc85da9e3c6586407d9ce0a86c8ffef4407c9f41c1c4f607a0fddfc4942ad27a8d14d07e284eaab66cd03b39a4daa45a135
Score10/10-
suricata: ET MALWARE DDoS.XOR Checkin via HTTP
suricata: ET MALWARE DDoS.XOR Checkin via HTTP
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Writes file to system bin folder
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Write file to user bin folder
-
Reads runtime system information
Reads data from /proc virtual filesystem.
-
Writes file to tmp directory
Malware often drops required files in the /tmp directory.
-