Resubmissions

20-04-2023 08:22

230420-j9l8kage69 10

06-04-2023 11:30

230406-nmjw5sch23 10

06-04-2023 11:14

230406-ncbssaef5z 10

26-03-2023 14:49

230326-r6z91sag91 10

General

  • Target

    task2.bin.elf

  • Size

    611KB

  • Sample

    230406-ncbssaef5z

  • MD5

    12fecefe30f2ad8f49aae67b92920adc

  • SHA1

    1bba1ff3c667a41ae26b12995323f7df7c239173

  • SHA256

    c0b0225201fd3a4c08245e58bbb4b844e0d3426e89b9ac3fc34db37d994fb182

  • SHA512

    71cd6c7490c62629774ffc31ac2cbe3074949b7b7d1445044d1be649b8893c59a45930c813939c2af95bc91612bfad7e4fe301ec6a96012ea5a6e8caa0d344c0

  • SSDEEP

    12288:5BXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrIT6yF8EEP4UlUuTh1Au:5BXmkN/+Fhu/Qo4h9L+zNNIBVEBl/91l

Malware Config

Extracted

Family

xorddos

C2

http://aaa.dsaj2a.org/config.rar

ww.dnstells.com:53

ww.gzcfr5axf6.com:53

ww.gzcfr5axf7.com:53

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      task2.bin.elf

    • Size

      611KB

    • MD5

      12fecefe30f2ad8f49aae67b92920adc

    • SHA1

      1bba1ff3c667a41ae26b12995323f7df7c239173

    • SHA256

      c0b0225201fd3a4c08245e58bbb4b844e0d3426e89b9ac3fc34db37d994fb182

    • SHA512

      71cd6c7490c62629774ffc31ac2cbe3074949b7b7d1445044d1be649b8893c59a45930c813939c2af95bc91612bfad7e4fe301ec6a96012ea5a6e8caa0d344c0

    • SSDEEP

      12288:5BXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrIT6yF8EEP4UlUuTh1Au:5BXmkN/+Fhu/Qo4h9L+zNNIBVEBl/91l

    Score
    9/10
    • Writes file to system bin folder

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies rc script

      Adding/modifying system rc scripts is a common persistence mechanism.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Write file to user bin folder

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

    • Writes file to tmp directory

      Malware often drops required files in the /tmp directory.

MITRE ATT&CK Enterprise v6

Tasks