General

  • Target

    d867cc111dee560ca8efed7e9cd33fe2aa3f33b650a4dbcfc2b643d8a94b84dd

  • Size

    611KB

  • Sample

    221204-1dr8dacb9z

  • MD5

    ae2fbe54fa60307ea1294ed1b0b119a5

  • SHA1

    f96a225de499049e558cf1483af6aa03459d5548

  • SHA256

    d867cc111dee560ca8efed7e9cd33fe2aa3f33b650a4dbcfc2b643d8a94b84dd

  • SHA512

    0c4039a288243d1fb156b0335a8cfb3fff75319cfca5a6a3537b90c50aa85325cca2955c6d3ee240b873e2723d835ccbc1eb452309b20e81df21ca559d837dab

  • SSDEEP

    12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrr4T6yF8EEP4UlUuTh1AQ:FBXmkN/+Fhu/Qo4h9L+zNN4BVEBl/91d

Malware Config

Extracted

Family

xorddos

C2

ppp.gggatat456.com:53

ppp.xxxatat456.com:53

p5.dddgata789.com:53

p5.lpjulidny7.com:53

Targets

    • Target

      d867cc111dee560ca8efed7e9cd33fe2aa3f33b650a4dbcfc2b643d8a94b84dd

    • Size

      611KB

    • MD5

      ae2fbe54fa60307ea1294ed1b0b119a5

    • SHA1

      f96a225de499049e558cf1483af6aa03459d5548

    • SHA256

      d867cc111dee560ca8efed7e9cd33fe2aa3f33b650a4dbcfc2b643d8a94b84dd

    • SHA512

      0c4039a288243d1fb156b0335a8cfb3fff75319cfca5a6a3537b90c50aa85325cca2955c6d3ee240b873e2723d835ccbc1eb452309b20e81df21ca559d837dab

    • SSDEEP

      12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrr4T6yF8EEP4UlUuTh1AQ:FBXmkN/+Fhu/Qo4h9L+zNN4BVEBl/91d

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Writes file to system bin folder

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies rc script

      Adding/modifying system rc scripts is a common persistence mechanism.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Write file to user bin folder

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

    • Writes file to tmp directory

      Malware often drops required files in the /tmp directory.

MITRE ATT&CK Enterprise v6

Tasks