General

  • Target

    f9191bab1e834d4aef3380700639cee9.bin

  • Size

    257KB

  • Sample

    230117-kcw7yach99

  • MD5

    949e796852f17daaefbcf79415ce2bed

  • SHA1

    2414ac64d232cd0b392e9e21583b32c2272323a7

  • SHA256

    1b5d61b593b499bcefd79601a1b0631ab42a5f517255f0a29ff08a9c20705a3e

  • SHA512

    463cb2f27d17f1420268021efdd8105629802b18f87c8274f90b5372d1956d25c2751ad13ead554e9e0bd63814ec1bbdbed6b5b7b82c7e8cbb8aab2f778d03d7

  • SSDEEP

    6144:rQGz1U+37ZacLyIVNuUgxmg3qZo3K/q1RkyF57u4GqXbX:rQGz1/2ONuUPg3qqayYyS4Gqb

Malware Config

Extracted

Family

xorddos

C2

api.markerbio.com:112

api.enoan2107.com:112

pi.enoan2107.com:112

Targets

    • Target

      ea40ecec0b30982fbb1662e67f97f0e9d6f43d2d587f2f588525fae683abea73.elf

    • Size

      549KB

    • MD5

      f9191bab1e834d4aef3380700639cee9

    • SHA1

      9c20269df6694260a24ac783de2e30d627a6928a

    • SHA256

      ea40ecec0b30982fbb1662e67f97f0e9d6f43d2d587f2f588525fae683abea73

    • SHA512

      3d2758fe2d06183e627b5cc24919c08c84108f2efd7ab0a162029d55537476410d9535d50f3eb059f7153f7482c134284862eea121201f82838aace4b12283b5

    • SSDEEP

      12288:VeRvuKqiVZ4En5drNK0pPEfJKlHZ8mG97Qxee6yzmx:VIv/qiVNHNDEfJKHZ8mG9QeeO

    Score
    9/10
    • Writes file to system bin folder

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Modifies rc script

      Adding/modifying system rc scripts is a common persistence mechanism.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Writes file to shm directory

      Malware can drop malicious files in the shm directory which will run directly from RAM.

    • Writes file to tmp directory

      Malware often drops required files in the /tmp directory.

MITRE ATT&CK Enterprise v6

Tasks