General

  • Target

    3e34bff8e13cf6068f4a30218b55b549

  • Size

    611KB

  • Sample

    231219-2zz1sabhg3

  • MD5

    3e34bff8e13cf6068f4a30218b55b549

  • SHA1

    28231d2555db240754f3a8018144849f1c8385cf

  • SHA256

    a40587bfb96d4803a538113844d82b50f5b57351ad4d5e7b79e07d4004f85ea3

  • SHA512

    8516d2a10a5adf4d264eb80529aa73c769eb876a2cedc43e108ff906df582e7b039b1f8dc81991af0aabdbede0f92c2b4c0ffd6d2b49ab3cb3d50713375fe23e

  • SSDEEP

    12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrKT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNKBVEBl/91h

Malware Config

Extracted

Family

xorddos

C2

http://aa.finance1num.org/config.rar

cdn.netflix2cdn.com:3309

cdn.finance1num.com:3309

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      3e34bff8e13cf6068f4a30218b55b549

    • Size

      611KB

    • MD5

      3e34bff8e13cf6068f4a30218b55b549

    • SHA1

      28231d2555db240754f3a8018144849f1c8385cf

    • SHA256

      a40587bfb96d4803a538113844d82b50f5b57351ad4d5e7b79e07d4004f85ea3

    • SHA512

      8516d2a10a5adf4d264eb80529aa73c769eb876a2cedc43e108ff906df582e7b039b1f8dc81991af0aabdbede0f92c2b4c0ffd6d2b49ab3cb3d50713375fe23e

    • SSDEEP

      12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrKT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNKBVEBl/91h

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Deletes itself

    • Executes dropped EXE

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

MITRE ATT&CK Enterprise v15

Tasks