Analysis
-
max time kernel
79s -
max time network
141s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231215-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
20-12-2023 01:58
Behavioral task
behavioral1
Sample
7beb45f0c5ee36d3747d9ab65eb1060e
Resource
ubuntu1804-amd64-20231215-en
General
-
Target
7beb45f0c5ee36d3747d9ab65eb1060e
-
Size
546KB
-
MD5
7beb45f0c5ee36d3747d9ab65eb1060e
-
SHA1
2090ef27619730d7211bd5ee195f2bd896e4b171
-
SHA256
03dde01384ac22b34f623f25d5c8ea284f8fb58e48a8d58efa4869b97479759e
-
SHA512
74c2f2b67a5d72c0c449db61693059aba161446bb3acf09e4eade547c5361eae065d9e64d5ffd0fabb054192ccdbbec6a30d9af00ddec3ee6588b36725ee2f88
-
SSDEEP
12288:D3P1A0+Kvdnd4Asvhc27/ao+PzENGtkZg0/CedRlZRqR6yse:Dfm0+KlZsJc27io2zYGtk20/LdF0+
Malware Config
Extracted
xorddos
topbannersun.com:8623
wowapplecar.com:8623
-
crc_polynomial
CDB88320
Signatures
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload 6 IoCs
Processes:
resource yara_rule /bin/mswhcgig family_xorddos /bin/cnnkqfuayzpwih family_xorddos /bin/nyfdxxwbw family_xorddos /bin/bkybrtmobib family_xorddos /bin/gdarnofcz family_xorddos /bin/reysvlp family_xorddos -
Deletes itself 33 IoCs
Processes:
pid 1534 1543 1549 1552 1556 1558 1572 1575 1578 1581 1583 1587 1590 1594 1596 1598 1602 1605 1608 1611 1613 1619 1622 1625 1628 1630 1634 1636 1640 1643 1645 1649 1652 -
Executes dropped EXE 34 IoCs
Processes:
mswhcgigylzjsgtekhtncpjmfpknrwqlllfghubftfzfydsyqzochwhzifdqgpvxesugyzrlnoedpxbqxxhypmbisdrzvmhrmglxwbbwjvzmkwnfcnnkqfuayzpwihpcfmxbvshfxwkikovzaguoewfdemuvrupvhsdckqbpjkhjgqdvnbgqxrtexhapcnyfdxxwbwclhmuryoqlxbkebvafoylnjuyhochkykolrrbbmokxtbhrlvekraubbefeuyxnwcsqzydsbzuebkybrtmobibcgefftbhmuhrhbuafymutzequcxozeykolgdarnofczexeuqlkbtakwmsljhtnscmjlkioc pid process /bin/mswhcgig 1537 mswhcgig /bin/ylzjsgtekhtn 1542 ylzjsgtekhtn /bin/cpjmfpk 1548 cpjmfpk /bin/nrwqll 1551 nrwqll /bin/lfghubftfzfyd 1554 lfghubftfzfyd /bin/syqzochw 1557 syqzochw /bin/hzifdqgpvxesug 1570 hzifdqgpvxesug /bin/yzrlnoedp 1573 yzrlnoedp /bin/xbqxxh 1576 xbqxxh /bin/ypmbis 1579 ypmbis /bin/drzvmhrmglxwbb 1582 drzvmhrmglxwbb /bin/wjvzmkwnf 1585 wjvzmkwnf /bin/cnnkqfuayzpwih 1588 cnnkqfuayzpwih /bin/pcfmxbvs 1591 pcfmxbvs /bin/hfxwkikovza 1593 hfxwkikovza /bin/guoewfdemuvr 1597 guoewfdemuvr /bin/upvhsdckqbpj 1600 upvhsdckqbpj /bin/khjgqdvn 1603 khjgqdvn /bin/bgqxrtexhapc 1606 bgqxrtexhapc /bin/nyfdxxwbw 1609 nyfdxxwbw /bin/clhmuryoqlxbk 1612 clhmuryoqlxbk /bin/ebvafoyl 1615 ebvafoyl /bin/njuyhochkykolr 1620 njuyhochkykolr /bin/rbbmok 1623 rbbmok /bin/xtbhrl 1626 xtbhrl /bin/vekraubbefeuy 1629 vekraubbefeuy /bin/xnwcsqzydsbzue 1632 xnwcsqzydsbzue /bin/bkybrtmobib 1635 bkybrtmobib /bin/cgefftbhmuh 1638 cgefftbhmuh /bin/rhbuafymutze 1641 rhbuafymutze /bin/qucxozeykol 1644 qucxozeykol /bin/gdarnofcz 1647 gdarnofcz /bin/exeuqlkbtakw 1650 exeuqlkbtakw /bin/msljhtnscmjlk 1653 msljhtnscmjlk -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
Processes:
description ioc File opened for modification /etc/cron.hourly/gigchwsm.sh -
Processes:
description ioc File opened for modification /etc/init.d/gigchwsm -
Writes file to system bin folder 1 TTPs 37 IoCs
Processes:
description ioc File opened for modification /bin/nyfdxxwbw File opened for modification /bin/gigchwsm.sh File opened for modification /bin/nrwqll File opened for modification /bin/cnnkqfuayzpwih File opened for modification /bin/cgefftbhmuh File opened for modification /bin/exeuqlkbtakw File opened for modification /bin/hzifdqgpvxesug File opened for modification /bin/njuyhochkykolr File opened for modification /bin/xtbhrl File opened for modification /bin/gigchwsm File opened for modification /bin/vekraubbefeuy File opened for modification /bin/wjvzmkwnf File opened for modification /bin/khjgqdvn File opened for modification /bin/xnwcsqzydsbzue File opened for modification /bin/rhbuafymutze File opened for modification /bin/mswhcgig File opened for modification /bin/cpjmfpk File opened for modification /bin/yzrlnoedp File opened for modification /bin/hfxwkikovza File opened for modification /bin/ebvafoyl File opened for modification /bin/rbbmok File opened for modification /bin/gdarnofcz File opened for modification /bin/ylzjsgtekhtn File opened for modification /bin/syqzochw File opened for modification /bin/pcfmxbvs File opened for modification /bin/bgqxrtexhapc File opened for modification /bin/msljhtnscmjlk File opened for modification /bin/xbqxxh File opened for modification /bin/drzvmhrmglxwbb File opened for modification /bin/upvhsdckqbpj File opened for modification /bin/lfghubftfzfyd File opened for modification /bin/ypmbis File opened for modification /bin/clhmuryoqlxbk File opened for modification /bin/reysvlp File opened for modification /bin/guoewfdemuvr File opened for modification /bin/bkybrtmobib File opened for modification /bin/qucxozeykol -
Writes file to shm directory 2 IoCs
Malware can drop malicious files in the shm directory which will run directly from RAM.
Processes:
description ioc File opened for modification /dev/shm/sem.cohxcf File opened for modification /dev/shm/sem.n15Zlp
Processes
-
/tmp/7beb45f0c5ee36d3747d9ab65eb1060e/tmp/7beb45f0c5ee36d3747d9ab65eb1060e1⤵PID:1533
-
/bin/mswhcgig/bin/mswhcgig1⤵
- Executes dropped EXE
PID:1537
-
/bin/ylzjsgtekhtn/bin/ylzjsgtekhtn -d 15381⤵
- Executes dropped EXE
PID:1542
-
/bin/cpjmfpk/bin/cpjmfpk -d 15381⤵
- Executes dropped EXE
PID:1548
-
/bin/nrwqll/bin/nrwqll -d 15381⤵
- Executes dropped EXE
PID:1551
-
/bin/lfghubftfzfyd/bin/lfghubftfzfyd -d 15381⤵
- Executes dropped EXE
PID:1554
-
/bin/syqzochw/bin/syqzochw -d 15381⤵
- Executes dropped EXE
PID:1557
-
/bin/hzifdqgpvxesug/bin/hzifdqgpvxesug -d 15381⤵
- Executes dropped EXE
PID:1570
-
/bin/yzrlnoedp/bin/yzrlnoedp -d 15381⤵
- Executes dropped EXE
PID:1573
-
/bin/xbqxxh/bin/xbqxxh -d 15381⤵
- Executes dropped EXE
PID:1576
-
/bin/ypmbis/bin/ypmbis -d 15381⤵
- Executes dropped EXE
PID:1579
-
/bin/drzvmhrmglxwbb/bin/drzvmhrmglxwbb -d 15381⤵
- Executes dropped EXE
PID:1582
-
/bin/wjvzmkwnf/bin/wjvzmkwnf -d 15381⤵
- Executes dropped EXE
PID:1585
-
/bin/cnnkqfuayzpwih/bin/cnnkqfuayzpwih -d 15381⤵
- Executes dropped EXE
PID:1588
-
/bin/pcfmxbvs/bin/pcfmxbvs -d 15381⤵
- Executes dropped EXE
PID:1591
-
/bin/hfxwkikovza/bin/hfxwkikovza -d 15381⤵
- Executes dropped EXE
PID:1593
-
/bin/guoewfdemuvr/bin/guoewfdemuvr -d 15381⤵
- Executes dropped EXE
PID:1597
-
/bin/upvhsdckqbpj/bin/upvhsdckqbpj -d 15381⤵
- Executes dropped EXE
PID:1600
-
/bin/khjgqdvn/bin/khjgqdvn -d 15381⤵
- Executes dropped EXE
PID:1603
-
/bin/bgqxrtexhapc/bin/bgqxrtexhapc -d 15381⤵
- Executes dropped EXE
PID:1606
-
/bin/nyfdxxwbw/bin/nyfdxxwbw -d 15381⤵
- Executes dropped EXE
PID:1609
-
/bin/clhmuryoqlxbk/bin/clhmuryoqlxbk -d 15381⤵
- Executes dropped EXE
PID:1612
-
/bin/ebvafoyl/bin/ebvafoyl -d 15381⤵
- Executes dropped EXE
PID:1615
-
/bin/njuyhochkykolr/bin/njuyhochkykolr -d 15381⤵
- Executes dropped EXE
PID:1620
-
/bin/rbbmok/bin/rbbmok -d 15381⤵
- Executes dropped EXE
PID:1623
-
/bin/xtbhrl/bin/xtbhrl -d 15381⤵
- Executes dropped EXE
PID:1626
-
/bin/vekraubbefeuy/bin/vekraubbefeuy -d 15381⤵
- Executes dropped EXE
PID:1629
-
/bin/xnwcsqzydsbzue/bin/xnwcsqzydsbzue -d 15381⤵
- Executes dropped EXE
PID:1632
-
/bin/bkybrtmobib/bin/bkybrtmobib -d 15381⤵
- Executes dropped EXE
PID:1635
-
/bin/cgefftbhmuh/bin/cgefftbhmuh -d 15381⤵
- Executes dropped EXE
PID:1638
-
/bin/rhbuafymutze/bin/rhbuafymutze -d 15381⤵
- Executes dropped EXE
PID:1641
-
/bin/qucxozeykol/bin/qucxozeykol -d 15381⤵
- Executes dropped EXE
PID:1644
-
/bin/gdarnofcz/bin/gdarnofcz -d 15381⤵
- Executes dropped EXE
PID:1647
-
/bin/exeuqlkbtakw/bin/exeuqlkbtakw -d 15381⤵
- Executes dropped EXE
PID:1650
-
/bin/msljhtnscmjlk/bin/msljhtnscmjlk -d 15381⤵
- Executes dropped EXE
PID:1653
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
243KB
MD58c8189905dc17c0a37464cccc6678d3a
SHA1b9dbb86413e692056e22c62d1bbfc7a075427941
SHA256b3a2afcb17674a3541255395c03c09e982540ba3c1ee0b70deb8dbb902e6af58
SHA512b132465d82f04d2af30098c159891a89124137043fe8031d179673fa970aed02ef310308c77352c309daa05471d65dc7bacdf77aa6eee046fded73f6471a1d29
-
Filesize
484KB
MD5eef37a5ee93d4602f8d0890ac4590de3
SHA172a4da7531623014f26c3faaacd6339509ddaafb
SHA25629a476aecbbc2396777996ac965c2f56fd510c9f96eb99ad2c5ab831630baed8
SHA5129751603af46ae0956a4164ed5726a6ba62ff59a3b6632d1aeac6927baf9f86e25dd6fb50c37a23a2a9d372f111f4f5ada87ffdbb67b8c35e377eb83c9b784e7d
-
Filesize
35KB
MD559e778a923b0ef1f25b7ac741e0fef5b
SHA17a546e9ae9596966cd13da1acb182b6672d0f099
SHA256b12eebd39c74e115a787ec15f946d8ea33b72766731868ac576b2ee8e2ad0806
SHA512b36435e468a28be002a85b77cd593f126162ded80a6ef224dc611914e80b93b2201de1caaf0d51f054ca910ff6b90cc5fcc866ceff611798b795460778160afd
-
Filesize
546KB
MD598b491b01433a825fc436280d2c618cc
SHA18c3f445a83f5ff6379db9ad2750238291aa7a846
SHA256b623413d516f4a903d3456193e6fe282703675d99d663791f0fe1415e21abcac
SHA51215e75f644a3738f3c989376716b03238432a959c51c6c8271f5b84df6554cac7f8cb3141e6b3ccb185c95e5181179f17d31106aa50ed153b6b100980b9a642cc
-
Filesize
112KB
MD55f1dfeba5f0752a36674e5df47ec8246
SHA1f946ef7b6e9c9df2d48fcc29d6e9cedcf65c6de4
SHA256cf3d3d0796d1e04a934e77714419aa156c493dcdfaf1c62fd842a597112e6fc9
SHA51292e33a059d467947fb5742b71db62aaa122f6aec39a75619af830934273cbac8805a8fc698daad33c115650b920364a258fd2dabe6828ee5f42fe6bbec41150e
-
Filesize
7KB
MD57cddf6e99352929bc47b0660ab89ef98
SHA1ed6acfcf564052794c8d8cd47d509b73cede0214
SHA256d0a9320035b538a60f872cebc9ce4f191bea6f34a8c2c564c82d6f7b4e350b2e
SHA51273b98e010f698533bd414852173ab297e449ff1f805e1ad351dd612bb40217c704c92db18868b59204659a1f4079f2cb9033440dff341311cbbcb2f1918bed20
-
Filesize
145B
MD50be61b5103c3e2ec0fa2bf722ce29226
SHA15ddf77657de053bb455b16e7a640b3301e7ae985
SHA256c1babf1e275dcf5db3f2e646c978b45312005331488e5a577fb4c6c3878e64f0
SHA512c63623d4e153be5b634a6e3514c55594c8733df0e0af21b15798025631c8d441736f0715dd2396c26dce300f5e2fff24fb856082d1b2e29d7c3607877c729f37
-
Filesize
32B
MD5e837e0574cf1e1c2d27f0dc1e202e330
SHA184eca7ea011dad59e0f050f50ee3520de2fb5899
SHA256210380c59589b58551b2e11d4a68888c376cba7f6cb05f7c4ea557acbc4a7145
SHA5128edbf47063fc6e5c69e0733dcd1301d669fda9335e0728378213ef41c6260b6a25ebc93d2cbe448f7b43bbc3bfad68c8930aeb2f74d4b9bf4557d3b9b51ae1ea
-
Filesize
328B
MD5de5a908a03c3bbdf2eaa5c20ef9fd666
SHA1dc8aa0b901588759b6f9a3aee30da10238ae6318
SHA25625fc77204b78d246aeb4aba97108c854ed684427403ab40a548f77d83241b853
SHA512d8147c5c934b107b2c3e265ac046b35e00eac4513926a29de83fc609644c38e711fe8a8f40cfa1c944dc168947e72fe577fa7481cf78905462732aac9d4a011f