General

  • Target

    28b4c1d34913014f2ea43298db493216

  • Size

    611KB

  • Sample

    231219-2qx5tsgdc8

  • MD5

    28b4c1d34913014f2ea43298db493216

  • SHA1

    113cb9d7f85f8d264f5a75ede41e275478841aac

  • SHA256

    8c765d8fdc96e55d5d050e875b5b58108ec0754cef6b9bf76684db49890e2e28

  • SHA512

    634af7f9986942d1e81fef965ea7f068051f72f2102e4dce0861a2df3c983f3d0001b7b9eec7ee98f6110eeed24761145aebaac9b7a267a84975797c00391e1b

  • SSDEEP

    12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrNT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNNBVEBl/91h

Malware Config

Extracted

Family

xorddos

C2

http://aa.finance1num.org/config.rar

cdn.netflix2cdn.com:23

cdn.finance1num.com:23

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      28b4c1d34913014f2ea43298db493216

    • Size

      611KB

    • MD5

      28b4c1d34913014f2ea43298db493216

    • SHA1

      113cb9d7f85f8d264f5a75ede41e275478841aac

    • SHA256

      8c765d8fdc96e55d5d050e875b5b58108ec0754cef6b9bf76684db49890e2e28

    • SHA512

      634af7f9986942d1e81fef965ea7f068051f72f2102e4dce0861a2df3c983f3d0001b7b9eec7ee98f6110eeed24761145aebaac9b7a267a84975797c00391e1b

    • SSDEEP

      12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrNT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNNBVEBl/91h

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Deletes itself

    • Executes dropped EXE

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

MITRE ATT&CK Enterprise v15

Tasks