General

  • Target

    9283b6d62d082b766334bb320a159ef69ac45bcdaf62d57a9e322a685e0b025d.exe

  • Size

    535KB

  • Sample

    230904-173wzabe3v

  • MD5

    3d862e6f731cf85254cc6ccaa726e4b7

  • SHA1

    ea164000f476d2e4eae5fc0874ebcbb62a3c9d66

  • SHA256

    9283b6d62d082b766334bb320a159ef69ac45bcdaf62d57a9e322a685e0b025d

  • SHA512

    c237d6b49668724e6cd9553dbe002b7278c16c1553db7cca2d3950d77b81a0858b08810e0d38e9161d3cab8f79eae0477407960dd479a7c4ecb6a6850475a2d1

  • SSDEEP

    12288:4Ufrcn+vwK5ripVU4tdZ1pNL/pVbzg66ySjQn36EojD:/fUywKQ7Fb1pNL/p5gfjQn36EuD

Malware Config

Extracted

Family

xorddos

C2

http://aa.hostasa.org/config.rar

ppp.gggatat456.com:1520

ppp.xxxatat456.com:1520

www1.gggatat456.com:1520

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      9283b6d62d082b766334bb320a159ef69ac45bcdaf62d57a9e322a685e0b025d.exe

    • Size

      535KB

    • MD5

      3d862e6f731cf85254cc6ccaa726e4b7

    • SHA1

      ea164000f476d2e4eae5fc0874ebcbb62a3c9d66

    • SHA256

      9283b6d62d082b766334bb320a159ef69ac45bcdaf62d57a9e322a685e0b025d

    • SHA512

      c237d6b49668724e6cd9553dbe002b7278c16c1553db7cca2d3950d77b81a0858b08810e0d38e9161d3cab8f79eae0477407960dd479a7c4ecb6a6850475a2d1

    • SSDEEP

      12288:4Ufrcn+vwK5ripVU4tdZ1pNL/pVbzg66ySjQn36EojD:/fUywKQ7Fb1pNL/p5gfjQn36EuD

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Executes dropped EXE

    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

MITRE ATT&CK Enterprise v15

Tasks