General

  • Target

    acdf0bcb271f651b0e81587431f87eb5a93d9ae28916d7c519ae999bcba20906

  • Size

    611KB

  • Sample

    221128-jj97psff44

  • MD5

    c1b3870018da1256d195a7e8c6e6e46c

  • SHA1

    727a294512b4547d0162d3cb167f68825762b71e

  • SHA256

    acdf0bcb271f651b0e81587431f87eb5a93d9ae28916d7c519ae999bcba20906

  • SHA512

    2eade7519b90429988ed870e7405cc721144dc849d3bf4d4b9fac4cfa5b12bf34015c51b8ec4535589890ac868bd08c0fe6a54a0e7d09e325e4acc3ecade9c6c

  • SSDEEP

    12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrr4T6yF8EEP4UlUuTh1Ax:FBXmkN/+Fhu/Qo4h9L+zNN4BVEBl/91g

Malware Config

Extracted

Family

xorddos

C2

ppp.gggatat456.com:53

ppp.xxxatat456.com:53

p5.dddgata789.com:53

p5.lpjulidny7.com:53

Targets

    • Target

      acdf0bcb271f651b0e81587431f87eb5a93d9ae28916d7c519ae999bcba20906

    • Size

      611KB

    • MD5

      c1b3870018da1256d195a7e8c6e6e46c

    • SHA1

      727a294512b4547d0162d3cb167f68825762b71e

    • SHA256

      acdf0bcb271f651b0e81587431f87eb5a93d9ae28916d7c519ae999bcba20906

    • SHA512

      2eade7519b90429988ed870e7405cc721144dc849d3bf4d4b9fac4cfa5b12bf34015c51b8ec4535589890ac868bd08c0fe6a54a0e7d09e325e4acc3ecade9c6c

    • SSDEEP

      12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrr4T6yF8EEP4UlUuTh1Ax:FBXmkN/+Fhu/Qo4h9L+zNN4BVEBl/91g

    Score
    9/10
    • Writes file to system bin folder

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies rc script

      Adding/modifying system rc scripts is a common persistence mechanism.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Write file to user bin folder

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

    • Writes file to tmp directory

      Malware often drops required files in the /tmp directory.

MITRE ATT&CK Enterprise v6

Tasks