General
-
Target
85682d3effdb2d559fd84df491e9461a.bin
-
Size
280KB
-
Sample
231031-mr4lnsfe3y
-
MD5
f7deb1e92e10d40f33b50b886e657e8f
-
SHA1
ce093f05fdfb05de22a14fcf89ef2b977b008985
-
SHA256
8e996db5961bec2587b92b94e946d2b58230187426757f199ca99b59074d6391
-
SHA512
9c1795f9a0ba280c3eab424f31e0db6dcf4e7c607701fc7bac7f57dc7c5905113d9d3a1e2ea6dc5a19ffaa678e532ab2057b5952346c13680b63f20c2e38c583
-
SSDEEP
6144:OSSULPH/xircidRzYbGtN7HI5Z3IPYATgntsozTYjW39QR+HuofyZyP:BSU7H0rFdxtls8YATAKWeufyZE
Behavioral task
behavioral1
Sample
3a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba.elf
Resource
ubuntu1804-amd64-20231026-en
Malware Config
Extracted
xorddos
http://www1.gggatat456.com/dd.rar
ppp.gggatat456.com:1525
ppp.xxxatat456.com:1525
p5.dddgata789.com:1525
p5.lpjulidny7.com:1525
-
crc_polynomial
EDB88320
Targets
-
-
Target
3a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba.elf
-
Size
611KB
-
MD5
85682d3effdb2d559fd84df491e9461a
-
SHA1
2fb53f36a77339e1dd8458dd3fe561355de76211
-
SHA256
3a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba
-
SHA512
f4cb94b160ed93d57b05d151c949c4dfd3a8b44d45af6d9432d2a9f1fafc02dec4e66d4f3cbdeeba16c769fc97b4f48a611aa92f653b1aa8f07b90d876168a86
-
SSDEEP
12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrryT6yF8EEP4UlUuTh1Ae:FBXmkN/+Fhu/Qo4h9L+zNNyBVEBl/91f
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Deletes itself
-
Executes dropped EXE
-
Checks CPU configuration
Checks CPU information which indicate if the system is a virtual machine.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-