Analysis
-
max time kernel
39s -
max time network
40s -
platform
linux_amd64 -
resource
ubuntu1804-amd64-en-20211208 -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-en-20211208kernel:4.15.0-161-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
28/08/2023, 19:28
Behavioral task
behavioral1
Sample
ea40ecec0b30982fbb1662e67f97f0e9d6f43d2d587f2f588525fae683abea73
Resource
ubuntu1804-amd64-en-20211208
General
-
Target
ea40ecec0b30982fbb1662e67f97f0e9d6f43d2d587f2f588525fae683abea73
-
Size
549KB
-
MD5
f9191bab1e834d4aef3380700639cee9
-
SHA1
9c20269df6694260a24ac783de2e30d627a6928a
-
SHA256
ea40ecec0b30982fbb1662e67f97f0e9d6f43d2d587f2f588525fae683abea73
-
SHA512
3d2758fe2d06183e627b5cc24919c08c84108f2efd7ab0a162029d55537476410d9535d50f3eb059f7153f7482c134284862eea121201f82838aace4b12283b5
-
SSDEEP
12288:VeRvuKqiVZ4En5drNK0pPEfJKlHZ8mG97Qxee6yzmx:VIv/qiVNHNDEfJKHZ8mG9QeeO
Malware Config
Extracted
xorddos
api.markerbio.com:112
api.enoan2107.com:112
http://qq.com/lib.asp
-
crc_polynomial
CDB88320
Signatures
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload 20 IoCs
resource yara_rule behavioral1/files/fstream-2.dat family_xorddos behavioral1/files/fstream-5.dat family_xorddos behavioral1/files/fstream-12.dat family_xorddos behavioral1/files/fstream-15.dat family_xorddos behavioral1/files/fstream-17.dat family_xorddos behavioral1/files/fstream-19.dat family_xorddos behavioral1/files/fstream-21.dat family_xorddos behavioral1/files/fstream-23.dat family_xorddos behavioral1/files/fstream-25.dat family_xorddos behavioral1/files/fstream-27.dat family_xorddos behavioral1/files/fstream-29.dat family_xorddos behavioral1/files/fstream-31.dat family_xorddos behavioral1/files/fstream-33.dat family_xorddos behavioral1/files/fstream-35.dat family_xorddos behavioral1/files/fstream-37.dat family_xorddos behavioral1/files/fstream-47.dat family_xorddos behavioral1/files/fstream-49.dat family_xorddos behavioral1/files/fstream-51.dat family_xorddos behavioral1/files/fstream-61.dat family_xorddos behavioral1/files/fstream-67.dat family_xorddos -
Deletes itself 22 IoCs
pid 586 596 603 606 609 611 616 619 622 625 627 631 634 646 649 651 655 657 667 670 672 678 -
Executes dropped EXE 22 IoCs
ioc pid Process /bin/qxmlwltjz 589 qxmlwltjz /bin/yyqkcpar 594 yyqkcpar /bin/zzftzttm 601 zzftzttm /bin/cqtgdraxh 604 cqtgdraxh /bin/wuwocdzwjwjlvq 607 wuwocdzwjwjlvq /bin/xkclgedakgrmd 610 xkclgedakgrmd /bin/wxjunl 614 wxjunl /bin/ohjksuijafve 617 ohjksuijafve /bin/bivdub 620 bivdub /bin/ggxvcwexlpuzzf 623 ggxvcwexlpuzzf /bin/rzsaczvgrz 626 rzsaczvgrz /bin/mclnzutzpxv 629 mclnzutzpxv /bin/whltikys 632 whltikys /bin/eskiirx 644 eskiirx /bin/agkigiodfclub 647 agkigiodfclub /bin/kreavluksbc 650 kreavluksbc /bin/jlxgzy 653 jlxgzy /bin/jiuuyxbdkves 656 jiuuyxbdkves /bin/jbpjcsvzx 665 jbpjcsvzx /bin/hulsnuz 668 hulsnuz /bin/xhbgaynbtvqa 671 xhbgaynbtvqa /bin/idfhvd 677 idfhvd -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc File opened for modification /etc/cron.hourly/zjtlwlmxq.sh -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc File opened for reading /proc/net/tcp -
Enumerates running processes
Discovers information about currently running processes on the system
-
description ioc File opened for modification /etc/init.d/zjtlwlmxq -
Writes file to system bin folder 1 TTPs 21 IoCs
description ioc File opened for modification /bin/ohjksuijafve File opened for modification /bin/whltikys File opened for modification /bin/kreavluksbc File opened for modification /bin/qxmlwltjz File opened for modification /bin/zjtlwlmxq File opened for modification /bin/zjtlwlmxq.sh File opened for modification /bin/wuwocdzwjwjlvq File opened for modification /bin/xkclgedakgrmd File opened for modification /bin/jiuuyxbdkves File opened for modification /bin/xhbgaynbtvqa File opened for modification /bin/wlquarqwhqi File opened for modification /bin/yyqkcpar File opened for modification /bin/rzsaczvgrz File opened for modification /bin/mclnzutzpxv File opened for modification /bin/zzftzttm File opened for modification /bin/cqtgdraxh File opened for modification /bin/wxjunl File opened for modification /bin/ggxvcwexlpuzzf File opened for modification /bin/bivdub File opened for modification /bin/ameclckcdb File opened for modification /bin/jlxgzy -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc File opened for reading /proc/net/tcp -
Reads runtime system information 41 IoCs
Reads data from /proc virtual filesystem.
description ioc File opened for reading /proc/634/fd File opened for reading /proc/640/fd File opened for reading /proc/642/fd File opened for reading /proc/667/fd File opened for reading /proc/672/fd File opened for reading /proc/597/fd File opened for reading /proc/345/fd File opened for reading /proc/360/fd File opened for reading /proc/361/fd File opened for reading /proc/453/fd File opened for reading /proc/580/fd File opened for reading /proc/1/fd File opened for reading /proc/221/fd File opened for reading /proc/423/fd File opened for reading /proc/622/fd File opened for reading /proc/657/fd File opened for reading /proc/664/fd File opened for reading /proc/287/fd File opened for reading /proc/342/fd File opened for reading /proc/451/fd File opened for reading /proc/637/fd File opened for reading /proc/651/fd File opened for reading /proc/379/fd File opened for reading /proc/625/fd File opened for reading /proc/655/fd File opened for reading /proc/251/fd File opened for reading /proc/358/fd File opened for reading /proc/364/fd File opened for reading /proc/616/fd File opened for reading /proc/649/fd File opened for reading /proc/670/fd File opened for reading /proc/372/fd File opened for reading /proc/425/fd File opened for reading /proc/619/fd File opened for reading /proc/631/fd File opened for reading /proc/646/fd File opened for reading /proc/252/fd File opened for reading /proc/285/fd File opened for reading /proc/359/fd File opened for reading /proc/627/fd File opened for reading /proc/661/fd -
Writes file to shm directory 2 IoCs
Malware can drop malicious files in the shm directory which will run directly from RAM.
description ioc File opened for modification /dev/shm/sem.bdxtek File opened for modification /dev/shm/sem.5xn3ao
Processes
-
/tmp/ea40ecec0b30982fbb1662e67f97f0e9d6f43d2d587f2f588525fae683abea73/tmp/ea40ecec0b30982fbb1662e67f97f0e9d6f43d2d587f2f588525fae683abea731⤵PID:585
-
/bin/qxmlwltjz/bin/qxmlwltjz1⤵
- Executes dropped EXE
PID:589
-
/bin/yyqkcpar/bin/yyqkcpar -d 5901⤵
- Executes dropped EXE
PID:594
-
/bin/zzftzttm/bin/zzftzttm -d 5901⤵
- Executes dropped EXE
PID:601
-
/bin/cqtgdraxh/bin/cqtgdraxh -d 5901⤵
- Executes dropped EXE
PID:604
-
/bin/wuwocdzwjwjlvq/bin/wuwocdzwjwjlvq -d 5901⤵
- Executes dropped EXE
PID:607
-
/bin/xkclgedakgrmd/bin/xkclgedakgrmd -d 5901⤵
- Executes dropped EXE
PID:610
-
/bin/wxjunl/bin/wxjunl -d 5901⤵
- Executes dropped EXE
PID:614
-
/bin/ohjksuijafve/bin/ohjksuijafve -d 5901⤵
- Executes dropped EXE
PID:617
-
/bin/bivdub/bin/bivdub -d 5901⤵
- Executes dropped EXE
PID:620
-
/bin/ggxvcwexlpuzzf/bin/ggxvcwexlpuzzf -d 5901⤵
- Executes dropped EXE
PID:623
-
/bin/rzsaczvgrz/bin/rzsaczvgrz -d 5901⤵
- Executes dropped EXE
PID:626
-
/bin/mclnzutzpxv/bin/mclnzutzpxv -d 5901⤵
- Executes dropped EXE
PID:629
-
/bin/whltikys/bin/whltikys -d 5901⤵
- Executes dropped EXE
PID:632
-
/bin/eskiirx/bin/eskiirx -d 5901⤵
- Executes dropped EXE
PID:644
-
/bin/agkigiodfclub/bin/agkigiodfclub -d 5901⤵
- Executes dropped EXE
PID:647
-
/bin/kreavluksbc/bin/kreavluksbc -d 5901⤵
- Executes dropped EXE
PID:650
-
/bin/jlxgzy/bin/jlxgzy -d 5901⤵
- Executes dropped EXE
PID:653
-
/bin/jiuuyxbdkves/bin/jiuuyxbdkves -d 5901⤵
- Executes dropped EXE
PID:656
-
/bin/jbpjcsvzx/bin/jbpjcsvzx -d 5901⤵
- Executes dropped EXE
PID:665
-
/bin/hulsnuz/bin/hulsnuz -d 5901⤵
- Executes dropped EXE
PID:668
-
/bin/xhbgaynbtvqa/bin/xhbgaynbtvqa -d 5901⤵
- Executes dropped EXE
PID:671
-
/bin/idfhvd/bin/idfhvd -d 5901⤵
- Executes dropped EXE
PID:677
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
549KB
MD58ea13405f48873a15947c1f1f0f1aeca
SHA189afe31ec07c54c7b862fb71721de4f7e9f3c6f1
SHA256551bb3ad5a425e5b6aebea782b3bab8974e9c645f05c138ec094f4e0feb42505
SHA512ae399f34109952847f2c657307559c8e31e68a57fca49b36aebcd704ed05c03fb4b22b5d55f606045987e67b129fb928353128436111ae52d0921aea91dd2c94
-
Filesize
549KB
MD58ea13405f48873a15947c1f1f0f1aeca
SHA189afe31ec07c54c7b862fb71721de4f7e9f3c6f1
SHA256551bb3ad5a425e5b6aebea782b3bab8974e9c645f05c138ec094f4e0feb42505
SHA512ae399f34109952847f2c657307559c8e31e68a57fca49b36aebcd704ed05c03fb4b22b5d55f606045987e67b129fb928353128436111ae52d0921aea91dd2c94
-
Filesize
549KB
MD58ea13405f48873a15947c1f1f0f1aeca
SHA189afe31ec07c54c7b862fb71721de4f7e9f3c6f1
SHA256551bb3ad5a425e5b6aebea782b3bab8974e9c645f05c138ec094f4e0feb42505
SHA512ae399f34109952847f2c657307559c8e31e68a57fca49b36aebcd704ed05c03fb4b22b5d55f606045987e67b129fb928353128436111ae52d0921aea91dd2c94
-
Filesize
549KB
MD58ea13405f48873a15947c1f1f0f1aeca
SHA189afe31ec07c54c7b862fb71721de4f7e9f3c6f1
SHA256551bb3ad5a425e5b6aebea782b3bab8974e9c645f05c138ec094f4e0feb42505
SHA512ae399f34109952847f2c657307559c8e31e68a57fca49b36aebcd704ed05c03fb4b22b5d55f606045987e67b129fb928353128436111ae52d0921aea91dd2c94
-
Filesize
549KB
MD58ea13405f48873a15947c1f1f0f1aeca
SHA189afe31ec07c54c7b862fb71721de4f7e9f3c6f1
SHA256551bb3ad5a425e5b6aebea782b3bab8974e9c645f05c138ec094f4e0feb42505
SHA512ae399f34109952847f2c657307559c8e31e68a57fca49b36aebcd704ed05c03fb4b22b5d55f606045987e67b129fb928353128436111ae52d0921aea91dd2c94
-
Filesize
549KB
MD58ea13405f48873a15947c1f1f0f1aeca
SHA189afe31ec07c54c7b862fb71721de4f7e9f3c6f1
SHA256551bb3ad5a425e5b6aebea782b3bab8974e9c645f05c138ec094f4e0feb42505
SHA512ae399f34109952847f2c657307559c8e31e68a57fca49b36aebcd704ed05c03fb4b22b5d55f606045987e67b129fb928353128436111ae52d0921aea91dd2c94
-
Filesize
549KB
MD58ea13405f48873a15947c1f1f0f1aeca
SHA189afe31ec07c54c7b862fb71721de4f7e9f3c6f1
SHA256551bb3ad5a425e5b6aebea782b3bab8974e9c645f05c138ec094f4e0feb42505
SHA512ae399f34109952847f2c657307559c8e31e68a57fca49b36aebcd704ed05c03fb4b22b5d55f606045987e67b129fb928353128436111ae52d0921aea91dd2c94
-
Filesize
549KB
MD58ea13405f48873a15947c1f1f0f1aeca
SHA189afe31ec07c54c7b862fb71721de4f7e9f3c6f1
SHA256551bb3ad5a425e5b6aebea782b3bab8974e9c645f05c138ec094f4e0feb42505
SHA512ae399f34109952847f2c657307559c8e31e68a57fca49b36aebcd704ed05c03fb4b22b5d55f606045987e67b129fb928353128436111ae52d0921aea91dd2c94
-
Filesize
549KB
MD58ea13405f48873a15947c1f1f0f1aeca
SHA189afe31ec07c54c7b862fb71721de4f7e9f3c6f1
SHA256551bb3ad5a425e5b6aebea782b3bab8974e9c645f05c138ec094f4e0feb42505
SHA512ae399f34109952847f2c657307559c8e31e68a57fca49b36aebcd704ed05c03fb4b22b5d55f606045987e67b129fb928353128436111ae52d0921aea91dd2c94
-
Filesize
549KB
MD58ea13405f48873a15947c1f1f0f1aeca
SHA189afe31ec07c54c7b862fb71721de4f7e9f3c6f1
SHA256551bb3ad5a425e5b6aebea782b3bab8974e9c645f05c138ec094f4e0feb42505
SHA512ae399f34109952847f2c657307559c8e31e68a57fca49b36aebcd704ed05c03fb4b22b5d55f606045987e67b129fb928353128436111ae52d0921aea91dd2c94
-
Filesize
549KB
MD58ea13405f48873a15947c1f1f0f1aeca
SHA189afe31ec07c54c7b862fb71721de4f7e9f3c6f1
SHA256551bb3ad5a425e5b6aebea782b3bab8974e9c645f05c138ec094f4e0feb42505
SHA512ae399f34109952847f2c657307559c8e31e68a57fca49b36aebcd704ed05c03fb4b22b5d55f606045987e67b129fb928353128436111ae52d0921aea91dd2c94
-
Filesize
549KB
MD58ea13405f48873a15947c1f1f0f1aeca
SHA189afe31ec07c54c7b862fb71721de4f7e9f3c6f1
SHA256551bb3ad5a425e5b6aebea782b3bab8974e9c645f05c138ec094f4e0feb42505
SHA512ae399f34109952847f2c657307559c8e31e68a57fca49b36aebcd704ed05c03fb4b22b5d55f606045987e67b129fb928353128436111ae52d0921aea91dd2c94
-
Filesize
549KB
MD58ea13405f48873a15947c1f1f0f1aeca
SHA189afe31ec07c54c7b862fb71721de4f7e9f3c6f1
SHA256551bb3ad5a425e5b6aebea782b3bab8974e9c645f05c138ec094f4e0feb42505
SHA512ae399f34109952847f2c657307559c8e31e68a57fca49b36aebcd704ed05c03fb4b22b5d55f606045987e67b129fb928353128436111ae52d0921aea91dd2c94
-
Filesize
549KB
MD58ea13405f48873a15947c1f1f0f1aeca
SHA189afe31ec07c54c7b862fb71721de4f7e9f3c6f1
SHA256551bb3ad5a425e5b6aebea782b3bab8974e9c645f05c138ec094f4e0feb42505
SHA512ae399f34109952847f2c657307559c8e31e68a57fca49b36aebcd704ed05c03fb4b22b5d55f606045987e67b129fb928353128436111ae52d0921aea91dd2c94
-
Filesize
549KB
MD58ea13405f48873a15947c1f1f0f1aeca
SHA189afe31ec07c54c7b862fb71721de4f7e9f3c6f1
SHA256551bb3ad5a425e5b6aebea782b3bab8974e9c645f05c138ec094f4e0feb42505
SHA512ae399f34109952847f2c657307559c8e31e68a57fca49b36aebcd704ed05c03fb4b22b5d55f606045987e67b129fb928353128436111ae52d0921aea91dd2c94
-
Filesize
549KB
MD58ea13405f48873a15947c1f1f0f1aeca
SHA189afe31ec07c54c7b862fb71721de4f7e9f3c6f1
SHA256551bb3ad5a425e5b6aebea782b3bab8974e9c645f05c138ec094f4e0feb42505
SHA512ae399f34109952847f2c657307559c8e31e68a57fca49b36aebcd704ed05c03fb4b22b5d55f606045987e67b129fb928353128436111ae52d0921aea91dd2c94
-
Filesize
549KB
MD58ea13405f48873a15947c1f1f0f1aeca
SHA189afe31ec07c54c7b862fb71721de4f7e9f3c6f1
SHA256551bb3ad5a425e5b6aebea782b3bab8974e9c645f05c138ec094f4e0feb42505
SHA512ae399f34109952847f2c657307559c8e31e68a57fca49b36aebcd704ed05c03fb4b22b5d55f606045987e67b129fb928353128436111ae52d0921aea91dd2c94
-
Filesize
549KB
MD58ea13405f48873a15947c1f1f0f1aeca
SHA189afe31ec07c54c7b862fb71721de4f7e9f3c6f1
SHA256551bb3ad5a425e5b6aebea782b3bab8974e9c645f05c138ec094f4e0feb42505
SHA512ae399f34109952847f2c657307559c8e31e68a57fca49b36aebcd704ed05c03fb4b22b5d55f606045987e67b129fb928353128436111ae52d0921aea91dd2c94
-
Filesize
549KB
MD58ea13405f48873a15947c1f1f0f1aeca
SHA189afe31ec07c54c7b862fb71721de4f7e9f3c6f1
SHA256551bb3ad5a425e5b6aebea782b3bab8974e9c645f05c138ec094f4e0feb42505
SHA512ae399f34109952847f2c657307559c8e31e68a57fca49b36aebcd704ed05c03fb4b22b5d55f606045987e67b129fb928353128436111ae52d0921aea91dd2c94
-
Filesize
549KB
MD58ea13405f48873a15947c1f1f0f1aeca
SHA189afe31ec07c54c7b862fb71721de4f7e9f3c6f1
SHA256551bb3ad5a425e5b6aebea782b3bab8974e9c645f05c138ec094f4e0feb42505
SHA512ae399f34109952847f2c657307559c8e31e68a57fca49b36aebcd704ed05c03fb4b22b5d55f606045987e67b129fb928353128436111ae52d0921aea91dd2c94
-
Filesize
16B
MD5076933ff9904d1110d896e2c525e39e5
SHA14188442577fa77f25820d9b2d01cc446e30684ac
SHA2564cbbd8ca5215b8d161aec181a74b694f4e24b001d5b081dc0030ed797a8973e0
SHA5126fcee9a7b7a7b821d241c03c82377928bc6882e7a08c78a4221199bfa220cdc55212273018ee613317c8293bb8d1ce08d1e017508e94e06ab85a734c99c7cc34
-
Filesize
146B
MD529812b2e4a51de67f8e2be7dbafd50c9
SHA1cb63797d7e86b851912a6b7beddcb04f083943da
SHA25643905e2ab0a99c994df0ad584904101346040860df961c98fca804d6a03ac1c7
SHA512f8b1c27c433cc624aacd0c030b402679445227ed0283d54c9577054ab0b580503c82f8b45be953364f65235019a02564e2f709c58895ab0f6d94cf505dcb3c20
-
Filesize
32B
MD5c768e9237d59c233de95c344a6717f3b
SHA16e8dae949fbece288c1c77a0622faf0c17ae7702
SHA25649a5d13488cce1b81592891323b3c3ac292245bf55a973c1ebfb98e884e68e52
SHA51292d085d3ad77d03796987c2ba54af3fc49fa702a89ffac1eeff6530c858708a44944e818dbb01d3da7a42174183b264a391ad115c603902d522e1385b538b606
-
Filesize
333B
MD5256cbad7a7120f91a8ce0806f4eff281
SHA11d381e2e97c43fb998b5b17264e52d6fe5032271
SHA256bfb42b7bf407a14b91a91d7cd3232dfb835228cc032688708d4dc97f7fc5ebdd
SHA512f18108acf0e0a786b892aa4d2a01045a3233f9618c002feaaa610f311c1ed345f54f7b7df375820c795ce9f2103f44d65d515fa7a372f63b3cf04404779a765b