General
-
Target
9283b6d62d082b766334bb320a159ef69ac45bcdaf62d57a9e322a685e0b025d.exe
-
Size
535KB
-
Sample
230904-173wzabe3v
-
MD5
3d862e6f731cf85254cc6ccaa726e4b7
-
SHA1
ea164000f476d2e4eae5fc0874ebcbb62a3c9d66
-
SHA256
9283b6d62d082b766334bb320a159ef69ac45bcdaf62d57a9e322a685e0b025d
-
SHA512
c237d6b49668724e6cd9553dbe002b7278c16c1553db7cca2d3950d77b81a0858b08810e0d38e9161d3cab8f79eae0477407960dd479a7c4ecb6a6850475a2d1
-
SSDEEP
12288:4Ufrcn+vwK5ripVU4tdZ1pNL/pVbzg66ySjQn36EojD:/fUywKQ7Fb1pNL/p5gfjQn36EuD
Behavioral task
behavioral1
Sample
9283b6d62d082b766334bb320a159ef69ac45bcdaf62d57a9e322a685e0b025d.exe
Resource
ubuntu1804-amd64-20230831-en
Malware Config
Extracted
xorddos
http://aa.hostasa.org/config.rar
ppp.gggatat456.com:1520
ppp.xxxatat456.com:1520
www1.gggatat456.com:1520
-
crc_polynomial
EDB88320
Targets
-
-
Target
9283b6d62d082b766334bb320a159ef69ac45bcdaf62d57a9e322a685e0b025d.exe
-
Size
535KB
-
MD5
3d862e6f731cf85254cc6ccaa726e4b7
-
SHA1
ea164000f476d2e4eae5fc0874ebcbb62a3c9d66
-
SHA256
9283b6d62d082b766334bb320a159ef69ac45bcdaf62d57a9e322a685e0b025d
-
SHA512
c237d6b49668724e6cd9553dbe002b7278c16c1553db7cca2d3950d77b81a0858b08810e0d38e9161d3cab8f79eae0477407960dd479a7c4ecb6a6850475a2d1
-
SSDEEP
12288:4Ufrcn+vwK5ripVU4tdZ1pNL/pVbzg66ySjQn36EojD:/fUywKQ7Fb1pNL/p5gfjQn36EuD
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Executes dropped EXE
-
Checks CPU configuration
Checks CPU information which indicate if the system is a virtual machine.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-