General

  • Target

    afaad91a7d7f83eafe9af21cdbb058d8811534313b1aa43646344dba6d63de58

  • Size

    611KB

  • Sample

    221204-km5basgf9w

  • MD5

    ec47c0fa2983c76f610a84f4e968e2f9

  • SHA1

    f046d29e8367b2733bcb803d6971b59d5f03c5b9

  • SHA256

    afaad91a7d7f83eafe9af21cdbb058d8811534313b1aa43646344dba6d63de58

  • SHA512

    7d431c80c90430b51cd19450df12e6f9847c9aa373fd1a91e4fb223d2f4f1bebd90cd08bbf92c7aef107b3fd7fcb520c580a7d3742d2db422a71fd5395cd147c

  • SSDEEP

    12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrr4T6yF8EEP4UlUuTh1AH:FBXmkN/+Fhu/Qo4h9L+zNN4BVEBl/91K

Malware Config

Extracted

Family

xorddos

C2

ppp.gggatat456.com:53

ppp.xxxatat456.com:53

p5.dddgata789.com:53

p5.lpjulidny7.com:53

Targets

    • Target

      afaad91a7d7f83eafe9af21cdbb058d8811534313b1aa43646344dba6d63de58

    • Size

      611KB

    • MD5

      ec47c0fa2983c76f610a84f4e968e2f9

    • SHA1

      f046d29e8367b2733bcb803d6971b59d5f03c5b9

    • SHA256

      afaad91a7d7f83eafe9af21cdbb058d8811534313b1aa43646344dba6d63de58

    • SHA512

      7d431c80c90430b51cd19450df12e6f9847c9aa373fd1a91e4fb223d2f4f1bebd90cd08bbf92c7aef107b3fd7fcb520c580a7d3742d2db422a71fd5395cd147c

    • SSDEEP

      12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrr4T6yF8EEP4UlUuTh1AH:FBXmkN/+Fhu/Qo4h9L+zNN4BVEBl/91K

    Score
    9/10
    • Writes file to system bin folder

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies rc script

      Adding/modifying system rc scripts is a common persistence mechanism.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Write file to user bin folder

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

    • Writes file to tmp directory

      Malware often drops required files in the /tmp directory.

MITRE ATT&CK Enterprise v6

Tasks