General
-
Target
8c8da16a2b9e7c318a9544ff032bddbe
-
Size
611KB
-
Sample
231220-hg817agbfk
-
MD5
8c8da16a2b9e7c318a9544ff032bddbe
-
SHA1
6a73498e4a7ea07cb6a508552e10f859ebeb9e04
-
SHA256
2674fcea6abf859f06e6bb629823423c326528a9e5623c8bdf05a370e78bdd4e
-
SHA512
e14bf4ac5adb60aa1423074b7d79908d484909f211ff439e58ae8b4d9309e106646716975ea7be05c46fe00abb8e524d816d891221aadf1e7af2950b8ea2b645
-
SSDEEP
12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrpT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNpBVEBl/91h
Behavioral task
behavioral1
Sample
8c8da16a2b9e7c318a9544ff032bddbe
Resource
ubuntu1804-amd64-20231215-en
Malware Config
Extracted
xorddos
http://aa.finance1num.org/config.rar
cdn.netflix2cdn.com:8080
cdn.finance1num.com:8080
-
crc_polynomial
EDB88320
Targets
-
-
Target
8c8da16a2b9e7c318a9544ff032bddbe
-
Size
611KB
-
MD5
8c8da16a2b9e7c318a9544ff032bddbe
-
SHA1
6a73498e4a7ea07cb6a508552e10f859ebeb9e04
-
SHA256
2674fcea6abf859f06e6bb629823423c326528a9e5623c8bdf05a370e78bdd4e
-
SHA512
e14bf4ac5adb60aa1423074b7d79908d484909f211ff439e58ae8b4d9309e106646716975ea7be05c46fe00abb8e524d816d891221aadf1e7af2950b8ea2b645
-
SSDEEP
12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrpT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNpBVEBl/91h
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Deletes itself
-
Executes dropped EXE
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-