General
-
Target
afaad91a7d7f83eafe9af21cdbb058d8811534313b1aa43646344dba6d63de58
-
Size
611KB
-
Sample
221204-km5basgf9w
-
MD5
ec47c0fa2983c76f610a84f4e968e2f9
-
SHA1
f046d29e8367b2733bcb803d6971b59d5f03c5b9
-
SHA256
afaad91a7d7f83eafe9af21cdbb058d8811534313b1aa43646344dba6d63de58
-
SHA512
7d431c80c90430b51cd19450df12e6f9847c9aa373fd1a91e4fb223d2f4f1bebd90cd08bbf92c7aef107b3fd7fcb520c580a7d3742d2db422a71fd5395cd147c
-
SSDEEP
12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrr4T6yF8EEP4UlUuTh1AH:FBXmkN/+Fhu/Qo4h9L+zNN4BVEBl/91K
Behavioral task
behavioral1
Sample
afaad91a7d7f83eafe9af21cdbb058d8811534313b1aa43646344dba6d63de58
Resource
ubuntu1804-amd64-en-20211208
Malware Config
Extracted
xorddos
ppp.gggatat456.com:53
ppp.xxxatat456.com:53
p5.dddgata789.com:53
p5.lpjulidny7.com:53
Targets
-
-
Target
afaad91a7d7f83eafe9af21cdbb058d8811534313b1aa43646344dba6d63de58
-
Size
611KB
-
MD5
ec47c0fa2983c76f610a84f4e968e2f9
-
SHA1
f046d29e8367b2733bcb803d6971b59d5f03c5b9
-
SHA256
afaad91a7d7f83eafe9af21cdbb058d8811534313b1aa43646344dba6d63de58
-
SHA512
7d431c80c90430b51cd19450df12e6f9847c9aa373fd1a91e4fb223d2f4f1bebd90cd08bbf92c7aef107b3fd7fcb520c580a7d3742d2db422a71fd5395cd147c
-
SSDEEP
12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrr4T6yF8EEP4UlUuTh1AH:FBXmkN/+Fhu/Qo4h9L+zNN4BVEBl/91K
Score9/10-
Writes file to system bin folder
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Write file to user bin folder
-
Reads runtime system information
Reads data from /proc virtual filesystem.
-
Writes file to tmp directory
Malware often drops required files in the /tmp directory.
-