General

  • Target

    96671eab0913c0003c63f4d2c50318db

  • Size

    535KB

  • Sample

    231220-kgpcwsfeg8

  • MD5

    96671eab0913c0003c63f4d2c50318db

  • SHA1

    0ef56578885236f87ae7f1c7580b8ed50c9ade77

  • SHA256

    5a7d7f1d53f039e7b69cf8d040cc043d1264b14107a8a73034e6b90d8e81f87a

  • SHA512

    198d02b0312a271e88a4c3749cb7b828fcffd0ffb3327dc3e54c68953c99b03a0354192314e43691e0c02354a34d5ca074b0165568195d8ed0f6018b24857d82

  • SSDEEP

    12288:4Ufrcn+vwK5ripVU4tdZ1pNL/pVbzZ66ySjQn36Eoj:/fUywKQ7Fb1pNL/p5ZfjQn36Eu

Malware Config

Extracted

Family

xorddos

C2

http://aa.hostasa.org/config.rar

ppp.gggatat456.com:1523

ppp.xxxatat456.com:1523

www1.gggatat456.com:1523

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      96671eab0913c0003c63f4d2c50318db

    • Size

      535KB

    • MD5

      96671eab0913c0003c63f4d2c50318db

    • SHA1

      0ef56578885236f87ae7f1c7580b8ed50c9ade77

    • SHA256

      5a7d7f1d53f039e7b69cf8d040cc043d1264b14107a8a73034e6b90d8e81f87a

    • SHA512

      198d02b0312a271e88a4c3749cb7b828fcffd0ffb3327dc3e54c68953c99b03a0354192314e43691e0c02354a34d5ca074b0165568195d8ed0f6018b24857d82

    • SSDEEP

      12288:4Ufrcn+vwK5ripVU4tdZ1pNL/pVbzZ66ySjQn36Eoj:/fUywKQ7Fb1pNL/p5ZfjQn36Eu

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Deletes itself

    • Executes dropped EXE

    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

MITRE ATT&CK Enterprise v15

Tasks