General
-
Target
12fecefe30f2ad8f49aae67b92920adc.bin
-
Size
280KB
-
Sample
230328-bgyf5agb77
-
MD5
b23b94b01043b1a417a1758911c167d6
-
SHA1
f2cac81f5a723ef198695c1c4ba8446ae486ed42
-
SHA256
3ce1c192c8a840bef782f7b32c63adafb2571e94afab8cdc97224f9598bdc495
-
SHA512
66b41de62d6808a8ec3891a1a6f204d85ce021c0bb9dc6d42ed03cc1bd76e7b4117e995059892686c222f3bfe631d3935dddb9cbab73363b7991f6bec36cdddb
-
SSDEEP
6144:eNE97w04S3MrH7ytn+U0DLuLe2aCuTFbuncvIAFP0W29HGyJuq8RSH/AcrNKspnH:e697UWn+BC0FS8ZcW2ppuqa8YkNnblx3
Behavioral task
behavioral1
Sample
c0b0225201fd3a4c08245e58bbb4b844e0d3426e89b9ac3fc34db37d994fb182.elf
Resource
ubuntu1804-amd64-20221111-en
Malware Config
Extracted
xorddos
7.com:53
ww.dnstells.com:53
ww.gzcfr5axf6.com:53
ww.gzcfr5axf7.com:53
Targets
-
-
Target
c0b0225201fd3a4c08245e58bbb4b844e0d3426e89b9ac3fc34db37d994fb182.elf
-
Size
611KB
-
MD5
12fecefe30f2ad8f49aae67b92920adc
-
SHA1
1bba1ff3c667a41ae26b12995323f7df7c239173
-
SHA256
c0b0225201fd3a4c08245e58bbb4b844e0d3426e89b9ac3fc34db37d994fb182
-
SHA512
71cd6c7490c62629774ffc31ac2cbe3074949b7b7d1445044d1be649b8893c59a45930c813939c2af95bc91612bfad7e4fe301ec6a96012ea5a6e8caa0d344c0
-
SSDEEP
12288:5BXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrIT6yF8EEP4UlUuTh1Au:5BXmkN/+Fhu/Qo4h9L+zNNIBVEBl/91l
Score9/10-
Writes file to system bin folder
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Write file to user bin folder
-
Reads runtime system information
Reads data from /proc virtual filesystem.
-
Writes file to tmp directory
Malware often drops required files in the /tmp directory.
-