General
-
Target
d867cc111dee560ca8efed7e9cd33fe2aa3f33b650a4dbcfc2b643d8a94b84dd
-
Size
611KB
-
Sample
221204-1dr8dacb9z
-
MD5
ae2fbe54fa60307ea1294ed1b0b119a5
-
SHA1
f96a225de499049e558cf1483af6aa03459d5548
-
SHA256
d867cc111dee560ca8efed7e9cd33fe2aa3f33b650a4dbcfc2b643d8a94b84dd
-
SHA512
0c4039a288243d1fb156b0335a8cfb3fff75319cfca5a6a3537b90c50aa85325cca2955c6d3ee240b873e2723d835ccbc1eb452309b20e81df21ca559d837dab
-
SSDEEP
12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrr4T6yF8EEP4UlUuTh1AQ:FBXmkN/+Fhu/Qo4h9L+zNN4BVEBl/91d
Behavioral task
behavioral1
Sample
d867cc111dee560ca8efed7e9cd33fe2aa3f33b650a4dbcfc2b643d8a94b84dd
Resource
ubuntu1804-amd64-en-20211208
Malware Config
Extracted
xorddos
ppp.gggatat456.com:53
ppp.xxxatat456.com:53
p5.dddgata789.com:53
p5.lpjulidny7.com:53
Targets
-
-
Target
d867cc111dee560ca8efed7e9cd33fe2aa3f33b650a4dbcfc2b643d8a94b84dd
-
Size
611KB
-
MD5
ae2fbe54fa60307ea1294ed1b0b119a5
-
SHA1
f96a225de499049e558cf1483af6aa03459d5548
-
SHA256
d867cc111dee560ca8efed7e9cd33fe2aa3f33b650a4dbcfc2b643d8a94b84dd
-
SHA512
0c4039a288243d1fb156b0335a8cfb3fff75319cfca5a6a3537b90c50aa85325cca2955c6d3ee240b873e2723d835ccbc1eb452309b20e81df21ca559d837dab
-
SSDEEP
12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrr4T6yF8EEP4UlUuTh1AQ:FBXmkN/+Fhu/Qo4h9L+zNN4BVEBl/91d
Score9/10-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Writes file to system bin folder
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Write file to user bin folder
-
Reads runtime system information
Reads data from /proc virtual filesystem.
-
Writes file to tmp directory
Malware often drops required files in the /tmp directory.
-