Resubmissions

20-04-2023 08:22

230420-j9nrdsae71 10

15-03-2023 16:53

230315-vd9vjaec89 10

27-11-2022 17:44

221127-wbfpcaah7t 10

General

  • Target

    2154547c69bf8bee7f296bd8ce56ffa4115da65c2308e9fc6d5079b2eb9dec93

  • Size

    301KB

  • Sample

    230315-vd9vjaec89

  • MD5

    c49fa2869bac593226206beed59cf195

  • SHA1

    6bca760e29263c5aa1228059a9a2880da8764ac8

  • SHA256

    2154547c69bf8bee7f296bd8ce56ffa4115da65c2308e9fc6d5079b2eb9dec93

  • SHA512

    f645fe1f2700ce4b51119900a2b173490da594fc26da3269a519e992f93b92a0bb9d0f4fd04bbcadee7a0e828c981c32fb32be8c5ffbd1526d815da1e4e2e628

  • SSDEEP

    6144:2RNh8Nm0vWTFeeqy+UlH6wpmT1gVipVyhrV9FL3eyPrCimjQZJkey:6h8Nm0uTFe32awpmT1gEp+ay+pAI

Malware Config

Extracted

Family

xorddos

C2

103.25.9.245:8002

103.240.141.50:8002

66.102.253.30:8002

ndns.dsaj2a1.org:8002

ndns.dsaj2a.org:8002

ndns.hcxiaoao.com:8002

ndns.dsaj2a.com:8002

Targets

    • Target

      atrdadsrcc

    • Size

      659KB

    • MD5

      1d79488a09ef56ae2e60e1985b18e7a2

    • SHA1

      0b25e8f36a9738bb4d2dd2cd711f1aa7213db517

    • SHA256

      4aaa0b0d1ccb91b090df97a47b15536157f6f141cdce67867d339d0f01b3981d

    • SHA512

      b77fda07473e8f3e7ff2a1e25bb556164e3fddb40fe791a0b96538dfcc766f96c6e15082dccc77e79fff73f34497d0c43643134a633ff8740bbc4a287ec0c91b

    • SSDEEP

      12288:aBo9ETRNT9Wn1J0OhS18tDm8PCExfLZ9JCCpyvOH36ybCQ7YLVN1/lFkThVArw:aBo9ANo70OE8A8PCExfLZ/CTvQrKLd/Q

    Score
    7/10
    • Modifies rc script

      Adding/modifying system rc scripts is a common persistence mechanism.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Write file to user bin folder

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

    • Writes file to tmp directory

      Malware often drops required files in the /tmp directory.

MITRE ATT&CK Enterprise v6

Tasks