Resubmissions

20-04-2023 08:24

230420-kaymzsge82 10

15-03-2023 09:30

230315-lgjyvaee3z 10

11-01-2023 05:39

230111-gcqhlsae84 10

19-12-2022 18:02

221219-wmhyvaag2t 10

General

  • Target

    c78b8f0a5aaf3bac7cbffc9234d715f638b2cf02

  • Size

    611KB

  • Sample

    230111-gcqhlsae84

  • MD5

    ba0d7400c3d3cb1305f17143fcfa6b56

  • SHA1

    c78b8f0a5aaf3bac7cbffc9234d715f638b2cf02

  • SHA256

    4616bc3ba5c245946819c55db573b552ba1c0cc5e0c54c433ffb1824452fc609

  • SHA512

    27e18100ef4320895704800798ad2aa6fc569ee296f4f02dd43a828667fe6333670fee31391ec27438a9c141aa9313a9e6a98423e627a39f73ec77ba12953529

  • SSDEEP

    12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrr4T6yF8EEP4UlUuTh1Aw:FBXmkN/+Fhu/Qo4h9L+zNN4BVEBl/91F

Malware Config

Extracted

Family

xorddos

C2

ppp.gggatat456.com:53

ppp.xxxatat456.com:53

p5.dddgata789.com:53

p5.lpjulidny7.com:53

Targets

    • Target

      c78b8f0a5aaf3bac7cbffc9234d715f638b2cf02

    • Size

      611KB

    • MD5

      ba0d7400c3d3cb1305f17143fcfa6b56

    • SHA1

      c78b8f0a5aaf3bac7cbffc9234d715f638b2cf02

    • SHA256

      4616bc3ba5c245946819c55db573b552ba1c0cc5e0c54c433ffb1824452fc609

    • SHA512

      27e18100ef4320895704800798ad2aa6fc569ee296f4f02dd43a828667fe6333670fee31391ec27438a9c141aa9313a9e6a98423e627a39f73ec77ba12953529

    • SSDEEP

      12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrr4T6yF8EEP4UlUuTh1Aw:FBXmkN/+Fhu/Qo4h9L+zNN4BVEBl/91F

    Score
    9/10
    • Writes file to system bin folder

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Modifies rc script

      Adding/modifying system rc scripts is a common persistence mechanism.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Write file to user bin folder

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

    • Writes file to tmp directory

      Malware often drops required files in the /tmp directory.

MITRE ATT&CK Enterprise v6

Tasks