Resubmissions

20-04-2023 08:21

230420-j9hv5sae61 10

28-03-2023 01:07

230328-bgyf5agb77 10

General

  • Target

    12fecefe30f2ad8f49aae67b92920adc.bin

  • Size

    280KB

  • Sample

    230328-bgyf5agb77

  • MD5

    b23b94b01043b1a417a1758911c167d6

  • SHA1

    f2cac81f5a723ef198695c1c4ba8446ae486ed42

  • SHA256

    3ce1c192c8a840bef782f7b32c63adafb2571e94afab8cdc97224f9598bdc495

  • SHA512

    66b41de62d6808a8ec3891a1a6f204d85ce021c0bb9dc6d42ed03cc1bd76e7b4117e995059892686c222f3bfe631d3935dddb9cbab73363b7991f6bec36cdddb

  • SSDEEP

    6144:eNE97w04S3MrH7ytn+U0DLuLe2aCuTFbuncvIAFP0W29HGyJuq8RSH/AcrNKspnH:e697UWn+BC0FS8ZcW2ppuqa8YkNnblx3

Malware Config

Extracted

Family

xorddos

C2

7.com:53

ww.dnstells.com:53

ww.gzcfr5axf6.com:53

ww.gzcfr5axf7.com:53

Targets

    • Target

      c0b0225201fd3a4c08245e58bbb4b844e0d3426e89b9ac3fc34db37d994fb182.elf

    • Size

      611KB

    • MD5

      12fecefe30f2ad8f49aae67b92920adc

    • SHA1

      1bba1ff3c667a41ae26b12995323f7df7c239173

    • SHA256

      c0b0225201fd3a4c08245e58bbb4b844e0d3426e89b9ac3fc34db37d994fb182

    • SHA512

      71cd6c7490c62629774ffc31ac2cbe3074949b7b7d1445044d1be649b8893c59a45930c813939c2af95bc91612bfad7e4fe301ec6a96012ea5a6e8caa0d344c0

    • SSDEEP

      12288:5BXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrIT6yF8EEP4UlUuTh1Au:5BXmkN/+Fhu/Qo4h9L+zNNIBVEBl/91l

    Score
    9/10
    • Writes file to system bin folder

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Modifies rc script

      Adding/modifying system rc scripts is a common persistence mechanism.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Write file to user bin folder

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

    • Writes file to tmp directory

      Malware often drops required files in the /tmp directory.

MITRE ATT&CK Enterprise v6

Tasks