General

  • Target

    55a111f4625348cffd6d910e49f5dbdc

  • Size

    611KB

  • Sample

    231219-29fd5acfbp

  • MD5

    55a111f4625348cffd6d910e49f5dbdc

  • SHA1

    0cb723f7dcf9ae320501ee93dba2363699811576

  • SHA256

    86a8a2107448d28214e43a86e1367feec9e7f45201a3013c57bc200bf760e1ee

  • SHA512

    c2d30d334e2f30684474c72034ab170bf662aff8130606eb4eee7bc39bfd75f4c5d111957621ae290e821be3cd31d2f517e275dda571299671397248502301d7

  • SSDEEP

    12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrgT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNgBVEBl/91h

Malware Config

Extracted

Family

xorddos

C2

http://aa.finance1num.org/config.rar

cdn.netflix2cdn.com:80

cdn.finance1num.com:80

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      55a111f4625348cffd6d910e49f5dbdc

    • Size

      611KB

    • MD5

      55a111f4625348cffd6d910e49f5dbdc

    • SHA1

      0cb723f7dcf9ae320501ee93dba2363699811576

    • SHA256

      86a8a2107448d28214e43a86e1367feec9e7f45201a3013c57bc200bf760e1ee

    • SHA512

      c2d30d334e2f30684474c72034ab170bf662aff8130606eb4eee7bc39bfd75f4c5d111957621ae290e821be3cd31d2f517e275dda571299671397248502301d7

    • SSDEEP

      12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrgT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNgBVEBl/91h

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Deletes itself

    • Executes dropped EXE

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

MITRE ATT&CK Enterprise v15

Tasks