Resubmissions

20-04-2023 08:22

230420-j9ll2age68 10

27-03-2023 07:44

230327-jk8ehacc99 10

General

  • Target

    task2.bin

  • Size

    611KB

  • Sample

    230327-jk8ehacc99

  • MD5

    12fecefe30f2ad8f49aae67b92920adc

  • SHA1

    1bba1ff3c667a41ae26b12995323f7df7c239173

  • SHA256

    c0b0225201fd3a4c08245e58bbb4b844e0d3426e89b9ac3fc34db37d994fb182

  • SHA512

    71cd6c7490c62629774ffc31ac2cbe3074949b7b7d1445044d1be649b8893c59a45930c813939c2af95bc91612bfad7e4fe301ec6a96012ea5a6e8caa0d344c0

  • SSDEEP

    12288:5BXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrIT6yF8EEP4UlUuTh1Au:5BXmkN/+Fhu/Qo4h9L+zNNIBVEBl/91l

Malware Config

Extracted

Family

xorddos

C2

7.com:53

ww.dnstells.com:53

ww.gzcfr5axf6.com:53

ww.gzcfr5axf7.com:53

Targets

    • Target

      task2.bin

    • Size

      611KB

    • MD5

      12fecefe30f2ad8f49aae67b92920adc

    • SHA1

      1bba1ff3c667a41ae26b12995323f7df7c239173

    • SHA256

      c0b0225201fd3a4c08245e58bbb4b844e0d3426e89b9ac3fc34db37d994fb182

    • SHA512

      71cd6c7490c62629774ffc31ac2cbe3074949b7b7d1445044d1be649b8893c59a45930c813939c2af95bc91612bfad7e4fe301ec6a96012ea5a6e8caa0d344c0

    • SSDEEP

      12288:5BXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrIT6yF8EEP4UlUuTh1Au:5BXmkN/+Fhu/Qo4h9L+zNNIBVEBl/91l

    Score
    9/10
    • Writes file to system bin folder

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies rc script

      Adding/modifying system rc scripts is a common persistence mechanism.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Write file to user bin folder

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

    • Writes file to tmp directory

      Malware often drops required files in the /tmp directory.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Hijack Execution Flow

2
T1574

Scheduled Task

1
T1053

Boot or Logon Autostart Execution

1
T1547

Privilege Escalation

Hijack Execution Flow

2
T1574

Scheduled Task

1
T1053

Boot or Logon Autostart Execution

1
T1547

Defense Evasion

Hijack Execution Flow

2
T1574

Tasks