General

  • Target

    dptxrnhxmx.elf

  • Size

    611KB

  • Sample

    231029-tagh5sab65

  • MD5

    85682d3effdb2d559fd84df491e9461a

  • SHA1

    2fb53f36a77339e1dd8458dd3fe561355de76211

  • SHA256

    3a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba

  • SHA512

    f4cb94b160ed93d57b05d151c949c4dfd3a8b44d45af6d9432d2a9f1fafc02dec4e66d4f3cbdeeba16c769fc97b4f48a611aa92f653b1aa8f07b90d876168a86

  • SSDEEP

    12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrryT6yF8EEP4UlUuTh1Ae:FBXmkN/+Fhu/Qo4h9L+zNNyBVEBl/91f

Malware Config

Extracted

Family

xorddos

C2

http://www1.gggatat456.com/dd.rar

ppp.gggatat456.com:1525

ppp.xxxatat456.com:1525

p5.dddgata789.com:1525

p5.lpjulidny7.com:1525

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      dptxrnhxmx.elf

    • Size

      611KB

    • MD5

      85682d3effdb2d559fd84df491e9461a

    • SHA1

      2fb53f36a77339e1dd8458dd3fe561355de76211

    • SHA256

      3a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba

    • SHA512

      f4cb94b160ed93d57b05d151c949c4dfd3a8b44d45af6d9432d2a9f1fafc02dec4e66d4f3cbdeeba16c769fc97b4f48a611aa92f653b1aa8f07b90d876168a86

    • SSDEEP

      12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrryT6yF8EEP4UlUuTh1Ae:FBXmkN/+Fhu/Qo4h9L+zNNyBVEBl/91f

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Deletes itself

    • Executes dropped EXE

    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

MITRE ATT&CK Enterprise v15

Tasks