Resubmissions
02-11-2023 08:28
231102-kdepaahe7v 1002-11-2023 08:25
231102-kbbjvabd87 1002-11-2023 08:23
231102-kaly7ahe31 1031-10-2023 10:42
231031-mr4lnsfe3y 10Analysis
-
max time kernel
194s -
max time network
195s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231026-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231026-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
31-10-2023 10:42
Behavioral task
behavioral1
Sample
3a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba.elf
Resource
ubuntu1804-amd64-20231026-en
General
-
Target
3a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba.elf
-
Size
611KB
-
MD5
85682d3effdb2d559fd84df491e9461a
-
SHA1
2fb53f36a77339e1dd8458dd3fe561355de76211
-
SHA256
3a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba
-
SHA512
f4cb94b160ed93d57b05d151c949c4dfd3a8b44d45af6d9432d2a9f1fafc02dec4e66d4f3cbdeeba16c769fc97b4f48a611aa92f653b1aa8f07b90d876168a86
-
SSDEEP
12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrryT6yF8EEP4UlUuTh1Ae:FBXmkN/+Fhu/Qo4h9L+zNNyBVEBl/91f
Malware Config
Extracted
xorddos
http://www1.gggatat456.com/dd.rar
ppp.gggatat456.com:1525
ppp.xxxatat456.com:1525
p5.dddgata789.com:1525
p5.lpjulidny7.com:1525
-
crc_polynomial
EDB88320
Signatures
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload 16 IoCs
Processes:
resource yara_rule /lib/libudev.so family_xorddos /usr/bin/phryavctmk family_xorddos /usr/bin/phryavctmk family_xorddos /usr/bin/phryavctmk family_xorddos /usr/bin/ouprsuhllh family_xorddos /usr/bin/ouprsuhllh family_xorddos /usr/bin/ouprsuhllh family_xorddos /usr/bin/qypwatneci family_xorddos /usr/bin/qypwatneci family_xorddos /usr/bin/qypwatneci family_xorddos /usr/bin/lfobwmyjyq family_xorddos /usr/bin/lfobwmyjyq family_xorddos /usr/bin/lfobwmyjyq family_xorddos /usr/bin/plnnpavjrx family_xorddos /usr/bin/plnnpavjrx family_xorddos /usr/bin/plnnpavjrx family_xorddos -
Deletes itself 2 IoCs
Processes:
pid 1658 1661 -
Executes dropped EXE 23 IoCs
Processes:
phryavctmkphryavctmkphryavctmkphryavctmkphryavctmkouprsuhllhouprsuhllhouprsuhllhouprsuhllhouprsuhllhqypwatneciqypwatneciqypwatneciqypwatneciqypwatnecilfobwmyjyqlfobwmyjyqlfobwmyjyqlfobwmyjyqlfobwmyjyqplnnpavjrxplnnpavjrxplnnpavjrxioc pid process /usr/bin/phryavctmk 1594 phryavctmk /usr/bin/phryavctmk 1597 phryavctmk /usr/bin/phryavctmk 1599 phryavctmk /usr/bin/phryavctmk 1603 phryavctmk /usr/bin/phryavctmk 1606 phryavctmk /usr/bin/ouprsuhllh 1609 ouprsuhllh /usr/bin/ouprsuhllh 1611 ouprsuhllh /usr/bin/ouprsuhllh 1614 ouprsuhllh /usr/bin/ouprsuhllh 1618 ouprsuhllh /usr/bin/ouprsuhllh 1621 ouprsuhllh /usr/bin/qypwatneci 1624 qypwatneci /usr/bin/qypwatneci 1627 qypwatneci /usr/bin/qypwatneci 1630 qypwatneci /usr/bin/qypwatneci 1632 qypwatneci /usr/bin/qypwatneci 1636 qypwatneci /usr/bin/lfobwmyjyq 1641 lfobwmyjyq /usr/bin/lfobwmyjyq 1644 lfobwmyjyq /usr/bin/lfobwmyjyq 1646 lfobwmyjyq /usr/bin/lfobwmyjyq 1649 lfobwmyjyq /usr/bin/lfobwmyjyq 1652 lfobwmyjyq /usr/bin/plnnpavjrx 1656 plnnpavjrx /usr/bin/plnnpavjrx 1659 plnnpavjrx /usr/bin/plnnpavjrx 1662 plnnpavjrx -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
-
Creates/modifies Cron job 1 TTPs 2 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
Processes:
shdescription ioc File opened for modification /etc/cron.hourly/gcc.sh File opened for modification /etc/crontab sh -
Processes:
description ioc File opened for modification /etc/init.d/3a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba.elf -
Write file to user bin folder 1 TTPs 5 IoCs
Processes:
description ioc File opened for modification /usr/bin/phryavctmk File opened for modification /usr/bin/ouprsuhllh File opened for modification /usr/bin/qypwatneci File opened for modification /usr/bin/lfobwmyjyq File opened for modification /usr/bin/plnnpavjrx -
Reads runtime system information 10 IoCs
Reads data from /proc virtual filesystem.
Processes:
systemctlseddescription ioc File opened for reading /proc/stat File opened for reading /proc/filesystems systemctl File opened for reading /proc/sys/kernel/osrelease systemctl File opened for reading /proc/1/environ systemctl File opened for reading /proc/cmdline systemctl File opened for reading /proc/rs_dev File opened for reading /proc/filesystems sed File opened for reading /proc/self/stat systemctl File opened for reading /proc/1/sched systemctl File opened for reading /proc/meminfo
Processes
-
/tmp/3a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba.elf/tmp/3a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba.elf1⤵PID:1547
-
/bin/shsh -c "sed -i '/\\/etc\\/cron.hourly\\/gcc.sh/d' /etc/crontab && echo '*/3 * * * * root /etc/cron.hourly/gcc.sh' >> /etc/crontab"1⤵
- Creates/modifies Cron job
PID:1553 -
/bin/sedsed -i "/\\/etc\\/cron.hourly\\/gcc.sh/d" /etc/crontab2⤵
- Reads runtime system information
PID:1554
-
-
/bin/chkconfigchkconfig --add 3a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba.elf1⤵PID:1550
-
/sbin/chkconfigchkconfig --add 3a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba.elf1⤵PID:1550
-
/usr/bin/chkconfigchkconfig --add 3a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba.elf1⤵PID:1550
-
/usr/sbin/chkconfigchkconfig --add 3a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba.elf1⤵PID:1550
-
/usr/local/bin/chkconfigchkconfig --add 3a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba.elf1⤵PID:1550
-
/usr/local/sbin/chkconfigchkconfig --add 3a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba.elf1⤵PID:1550
-
/usr/X11R6/bin/chkconfigchkconfig --add 3a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba.elf1⤵PID:1550
-
/bin/update-rc.dupdate-rc.d 3a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba.elf defaults1⤵PID:1552
-
/sbin/update-rc.dupdate-rc.d 3a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba.elf defaults1⤵PID:1552
-
/usr/bin/update-rc.dupdate-rc.d 3a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba.elf defaults1⤵PID:1552
-
/usr/sbin/update-rc.dupdate-rc.d 3a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba.elf defaults1⤵PID:1552
-
/bin/systemctlsystemctl daemon-reload2⤵
- Reads runtime system information
PID:1558
-
-
/usr/bin/phryavctmk/usr/bin/phryavctmk pwd 15481⤵
- Executes dropped EXE
PID:1594
-
/usr/bin/phryavctmk/usr/bin/phryavctmk whoami 15481⤵
- Executes dropped EXE
PID:1597
-
/usr/bin/phryavctmk/usr/bin/phryavctmk "route -n" 15481⤵
- Executes dropped EXE
PID:1599
-
/usr/bin/phryavctmk/usr/bin/phryavctmk su 15481⤵
- Executes dropped EXE
PID:1603
-
/usr/bin/phryavctmk/usr/bin/phryavctmk "cat resolv.conf" 15481⤵
- Executes dropped EXE
PID:1606
-
/usr/bin/ouprsuhllh/usr/bin/ouprsuhllh "echo \"find\"" 15481⤵
- Executes dropped EXE
PID:1609
-
/usr/bin/ouprsuhllh/usr/bin/ouprsuhllh ifconfig 15481⤵
- Executes dropped EXE
PID:1611
-
/usr/bin/ouprsuhllh/usr/bin/ouprsuhllh "netstat -antop" 15481⤵
- Executes dropped EXE
PID:1614
-
/usr/bin/ouprsuhllh/usr/bin/ouprsuhllh "grep \"A\"" 15481⤵
- Executes dropped EXE
PID:1618
-
/usr/bin/ouprsuhllh/usr/bin/ouprsuhllh "ls -la" 15481⤵
- Executes dropped EXE
PID:1621
-
/usr/bin/qypwatneci/usr/bin/qypwatneci bash 15481⤵
- Executes dropped EXE
PID:1624
-
/usr/bin/qypwatneci/usr/bin/qypwatneci sh 15481⤵
- Executes dropped EXE
PID:1627
-
/usr/bin/qypwatneci/usr/bin/qypwatneci ls 15481⤵
- Executes dropped EXE
PID:1630
-
/usr/bin/qypwatneci/usr/bin/qypwatneci pwd 15481⤵
- Executes dropped EXE
PID:1632
-
/usr/bin/qypwatneci/usr/bin/qypwatneci "grep \"A\"" 15481⤵
- Executes dropped EXE
PID:1636
-
/usr/bin/lfobwmyjyq/usr/bin/lfobwmyjyq "netstat -antop" 15481⤵
- Executes dropped EXE
PID:1641
-
/usr/bin/lfobwmyjyq/usr/bin/lfobwmyjyq "ifconfig eth0" 15481⤵
- Executes dropped EXE
PID:1644
-
/usr/bin/lfobwmyjyq/usr/bin/lfobwmyjyq whoami 15481⤵
- Executes dropped EXE
PID:1646
-
/usr/bin/lfobwmyjyq/usr/bin/lfobwmyjyq who 15481⤵
- Executes dropped EXE
PID:1649
-
/usr/bin/lfobwmyjyq/usr/bin/lfobwmyjyq sh 15481⤵
- Executes dropped EXE
PID:1652
-
/usr/bin/plnnpavjrx/usr/bin/plnnpavjrx bash 15481⤵
- Executes dropped EXE
PID:1656
-
/usr/bin/plnnpavjrx/usr/bin/plnnpavjrx id 15481⤵
- Executes dropped EXE
PID:1659
-
/usr/bin/plnnpavjrx/usr/bin/plnnpavjrx uptime 15481⤵
- Executes dropped EXE
PID:1662
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228B
MD53bab747cedc5f0ebe86aaa7f982470cd
SHA13c7d1c6931c2b3dae39d38346b780ea57c8e6142
SHA25674d31cac40d98ee64df2a0c29ceb229d12ac5fa699c2ee512fc69360f0cf68c5
SHA51221e8a6d9ca8531d37def83d8903e5b0fa11ecf33d85d05edab1e0feb4acac65ae2cf5222650fb9f533f459ccc51bb2903276ff6f827b847cc5e6dac7d45a0a42
-
Filesize
605B
MD5422d14188d05ccccbd7d6c01b3a633fc
SHA1cfc080d110a8c19b65554fa4779537a769353504
SHA256f396b4e2dc56426e0b65860d408c989dd09e732c953a4be2ea235c6a040fade2
SHA51244fa90ca306668779a441cfc1344eb18ded225a4e72011cac0b8f90e1326724ea977c24f4bd173d2c9bacb02fef8369ccd2f94e4c3c84ba1d2966c79b3e4a3e8
-
Filesize
722B
MD58f111d100ea459f68d333d63a8ef2205
SHA1077ca9c46a964de67c0f7765745d5c6f9e2065c3
SHA2560e5c204385b21e15b031c83f37212bf5a4ee77b51762b7b54bd6ad973ebdf354
SHA512d81767b47fb84aaf435f930356ded574ee9825ec710a2e7c26074860d8a385741d65572740137b6f9686c285a32e2951ca933393b266746988f1737aad059adb
-
Filesize
611KB
MD585682d3effdb2d559fd84df491e9461a
SHA12fb53f36a77339e1dd8458dd3fe561355de76211
SHA2563a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba
SHA512f4cb94b160ed93d57b05d151c949c4dfd3a8b44d45af6d9432d2a9f1fafc02dec4e66d4f3cbdeeba16c769fc97b4f48a611aa92f653b1aa8f07b90d876168a86
-
Filesize
32B
MD59dd7cbb7d7978a3979a260820d84c227
SHA1815fb2777be01438f915716fede219883f779f9e
SHA2563376c4b2e2309944b81f2131a0cb908ad4d9d40b389ac064a6b1ca910a9a46b7
SHA5123680e21aaed7c684c6e9f628e5da7702e0c9d5228ea967b5058cff8b752cbb93e0ebe91ad4ff9bc5b3f501d59e09a55a8b9d3d026196dc050c7873ba25226e7d
-
Filesize
611KB
MD585682d3effdb2d559fd84df491e9461a
SHA12fb53f36a77339e1dd8458dd3fe561355de76211
SHA2563a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba
SHA512f4cb94b160ed93d57b05d151c949c4dfd3a8b44d45af6d9432d2a9f1fafc02dec4e66d4f3cbdeeba16c769fc97b4f48a611aa92f653b1aa8f07b90d876168a86
-
Filesize
611KB
MD5a873c3aaa80fa6abbdd22d03a9bde6a6
SHA1b3c78caa75530a787bae8f50b440cc8b6a273ebd
SHA256b613ca47fc1a1a61a1d03af8a468efa6720109191ce456dbbe3340bd356b8a29
SHA512b558240ae3a8ab8e5d35b1128c43502da3353222ef0f0a6fecfd630d0cbd334684388604e67befaa75c677982bfe7da4c1a42129a63e75ea265db68ad73c11da
-
Filesize
611KB
MD5d5b9b15cad0f75ff6775d5658d951b3f
SHA1fa9763eb168ac977b693c81dc362ab0000880cd5
SHA256a8c6cabc106e9b9a76d8aef40ee416b5e707378daa12c996b3a57a7738ed4e25
SHA51255d6c735c22aa53ee37fa32f0f42fc6eceafc3f6c125c77d66bffd1e05063ff35cb58daff4c23687e4383306ff808288bf8610917e0961fe2570962881e66ea6
-
Filesize
611KB
MD5b1d1c246892d2879b5ec0d5c532209a3
SHA1b761f8ab4f2d08492a104c106f92fcd7d21e79ac
SHA256434a1089d994dff43d4811379c2207f96f8ac3b759e5b2f52b0fe6b39ed90620
SHA512c6c9657cc34f77d9e056c2554ea9ff87b746ca4ee12835e8a8049e591e68677c05247b1ceae6b5ad90cf32bdc732305b6a133e7add9bdf3064eec9155e5f5a40
-
Filesize
611KB
MD544a5b25cffd612bb952ed3c39b1b5fde
SHA10f0083942a7d8a42fcb7cd5b09daafa1eda21597
SHA256ef7fc5b7f7ac80655f954a9605bd201d7306208fde3e54c65a3bc4126dc0e27d
SHA5126420f020daeb43baaeaf6ec1ea0f026943daca471cd9ef7e5e485df9943e4adba5a32e67bcf8057b67fd72ea9b9c3d2039c907bcbb2a4cc3ca9924bc3ae81566
-
Filesize
611KB
MD585682d3effdb2d559fd84df491e9461a
SHA12fb53f36a77339e1dd8458dd3fe561355de76211
SHA2563a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba
SHA512f4cb94b160ed93d57b05d151c949c4dfd3a8b44d45af6d9432d2a9f1fafc02dec4e66d4f3cbdeeba16c769fc97b4f48a611aa92f653b1aa8f07b90d876168a86
-
Filesize
611KB
MD585682d3effdb2d559fd84df491e9461a
SHA12fb53f36a77339e1dd8458dd3fe561355de76211
SHA2563a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba
SHA512f4cb94b160ed93d57b05d151c949c4dfd3a8b44d45af6d9432d2a9f1fafc02dec4e66d4f3cbdeeba16c769fc97b4f48a611aa92f653b1aa8f07b90d876168a86
-
Filesize
611KB
MD5893809a8c7a91761d7c86cf8ae0f45ef
SHA1b366fc7b261a01c2e3be21eaa8bc50827a09b8e1
SHA25659d06c855ebc86abb1a1f6583df233569aae42be62539e74de276e080f16899c
SHA5126253b6b07c1d94460cebe9f0e459aec941d3def24645e5b5fdaf73ca98b58993c8016867d551105b27dd897b51e52087b269ae47c2c6ac56dec2bddeb20a3612
-
Filesize
611KB
MD570eb52b0e297d803572d43a8307765f6
SHA111a2f0bb058c0a63530a6bc682c6a2001a43adcc
SHA2563be735a517ec62db723e62dbf54d2d897e36a6be0ede74fc24d19ce647d06a31
SHA512d192ca09bb9ae211ba4676f276bd3d7d8ae8c06dd2ea16ec4cc1334d603899e83cf014af08afdf6aabebc57811c0c063be30fa3b999aa990ea7cd62c0e5c98d0
-
Filesize
611KB
MD585682d3effdb2d559fd84df491e9461a
SHA12fb53f36a77339e1dd8458dd3fe561355de76211
SHA2563a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba
SHA512f4cb94b160ed93d57b05d151c949c4dfd3a8b44d45af6d9432d2a9f1fafc02dec4e66d4f3cbdeeba16c769fc97b4f48a611aa92f653b1aa8f07b90d876168a86
-
Filesize
611KB
MD5c3ef3884ccdd672a918509ddc166bd7b
SHA1eac294a37389307f15272a6768ac37db9356e423
SHA2564b55804c3a93b7e22fd932ff5adc8fc0f4f102a4d647f22080a42dc034b3ff5a
SHA5128acbfefe67dc34a9c7e04ff1eb3ac3ab45f1528c8673d3214a48f9540a01724b6c343c7746f070b0b7a168474b578ee94507ff07e200546dfdcf87a97d1efa1c
-
Filesize
611KB
MD51181542acb6ed52108860929e514fc53
SHA118f1462a3c3344997b5271363c40232564f8fe38
SHA2569a0b8daa62ead191293f9e9e7ba42f0907a48f244946c1f1394a2ab236b8f184
SHA512c14ae5bc936902279e4120de72376962562474d931a83d92b5024407842751597c8f8ab021c54ed905d9de4eb3b647d45204ad0f5b0895d782c4ac4b117d699e
-
Filesize
611KB
MD585682d3effdb2d559fd84df491e9461a
SHA12fb53f36a77339e1dd8458dd3fe561355de76211
SHA2563a8a11b60fd8e2f93d29fb46cdda68fd404b06147a7c717d3619b088e39875ba
SHA512f4cb94b160ed93d57b05d151c949c4dfd3a8b44d45af6d9432d2a9f1fafc02dec4e66d4f3cbdeeba16c769fc97b4f48a611aa92f653b1aa8f07b90d876168a86
-
Filesize
611KB
MD583067e00d20a1d47f90807ea36be88a8
SHA1e0f2177cccd8dea629daec14031ca2f68d15e507
SHA2565afc2bf8779fad074489df99361fbc7592c6d369aa3965f21eac2feb320bb255
SHA512f51b01f7266fc1b19fcd5bfc6cb6dfb4d51cf472b1710803f9c0edffc109b811f767e511ecbc8bc48763a4ae3355d4556accc7844217ae1447394bd56fe9fcb8
-
Filesize
611KB
MD519839406e78abfffb8c1d7b79650ac3f
SHA1bd7a93fdce471f960dd3d165b23f951c5464c060
SHA256773957b6b7e6c7309fd17b9d690f777618a6c8205a53f0cf6e296956ccd14971
SHA512a9a0aa15381f3356618bbdbbf2634ddf1648091b313c2029a74d413b055c037f5f81370233ecd8a53389baab43b463793579075f84eada3c371dd3df202075f2