General
-
Target
55a111f4625348cffd6d910e49f5dbdc
-
Size
611KB
-
Sample
231219-29fd5acfbp
-
MD5
55a111f4625348cffd6d910e49f5dbdc
-
SHA1
0cb723f7dcf9ae320501ee93dba2363699811576
-
SHA256
86a8a2107448d28214e43a86e1367feec9e7f45201a3013c57bc200bf760e1ee
-
SHA512
c2d30d334e2f30684474c72034ab170bf662aff8130606eb4eee7bc39bfd75f4c5d111957621ae290e821be3cd31d2f517e275dda571299671397248502301d7
-
SSDEEP
12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrgT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNgBVEBl/91h
Behavioral task
behavioral1
Sample
55a111f4625348cffd6d910e49f5dbdc
Resource
ubuntu1804-amd64-20231215-en
Malware Config
Extracted
xorddos
http://aa.finance1num.org/config.rar
cdn.netflix2cdn.com:80
cdn.finance1num.com:80
-
crc_polynomial
EDB88320
Targets
-
-
Target
55a111f4625348cffd6d910e49f5dbdc
-
Size
611KB
-
MD5
55a111f4625348cffd6d910e49f5dbdc
-
SHA1
0cb723f7dcf9ae320501ee93dba2363699811576
-
SHA256
86a8a2107448d28214e43a86e1367feec9e7f45201a3013c57bc200bf760e1ee
-
SHA512
c2d30d334e2f30684474c72034ab170bf662aff8130606eb4eee7bc39bfd75f4c5d111957621ae290e821be3cd31d2f517e275dda571299671397248502301d7
-
SSDEEP
12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrgT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNgBVEBl/91h
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Deletes itself
-
Executes dropped EXE
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-