General
-
Target
a05cb977bacafd226b494bdbc9bbb0b5300967b77ed561d97aaa5bd9ebdb78e5
-
Size
611KB
-
Sample
220718-swar2sgbb5
-
MD5
516c824d399036c8b94580492c8c81a5
-
SHA1
1102a9b06c8070235892cff0e70af838f6f776a2
-
SHA256
a05cb977bacafd226b494bdbc9bbb0b5300967b77ed561d97aaa5bd9ebdb78e5
-
SHA512
16bf87f01161225c0769c3e6d972978cb9580ae62a45b893bab2bcc5c607114ba5ad4255f92648fae705f27f86cbf4de0c4e1785de0700ab27ab8112096dd944
Behavioral task
behavioral1
Sample
a05cb977bacafd226b494bdbc9bbb0b5300967b77ed561d97aaa5bd9ebdb78e5
Resource
ubuntu1804-amd64-en-20211208
Malware Config
Extracted
xorddos
ppp.gggatat456.com:53
ppp.xxxatat456.com:53
p5.dddgata789.com:53
p5.lpjulidny7.com:53
Targets
-
-
Target
a05cb977bacafd226b494bdbc9bbb0b5300967b77ed561d97aaa5bd9ebdb78e5
-
Size
611KB
-
MD5
516c824d399036c8b94580492c8c81a5
-
SHA1
1102a9b06c8070235892cff0e70af838f6f776a2
-
SHA256
a05cb977bacafd226b494bdbc9bbb0b5300967b77ed561d97aaa5bd9ebdb78e5
-
SHA512
16bf87f01161225c0769c3e6d972978cb9580ae62a45b893bab2bcc5c607114ba5ad4255f92648fae705f27f86cbf4de0c4e1785de0700ab27ab8112096dd944
Score10/10-
suricata: ET MALWARE DDoS.XOR Checkin via HTTP
suricata: ET MALWARE DDoS.XOR Checkin via HTTP
-
Writes file to system bin folder
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Write file to user bin folder
-
Reads runtime system information
Reads data from /proc virtual filesystem.
-
Writes file to tmp directory
Malware often drops required files in the /tmp directory.
-