General
-
Target
96671eab0913c0003c63f4d2c50318db
-
Size
535KB
-
Sample
231220-kgpcwsfeg8
-
MD5
96671eab0913c0003c63f4d2c50318db
-
SHA1
0ef56578885236f87ae7f1c7580b8ed50c9ade77
-
SHA256
5a7d7f1d53f039e7b69cf8d040cc043d1264b14107a8a73034e6b90d8e81f87a
-
SHA512
198d02b0312a271e88a4c3749cb7b828fcffd0ffb3327dc3e54c68953c99b03a0354192314e43691e0c02354a34d5ca074b0165568195d8ed0f6018b24857d82
-
SSDEEP
12288:4Ufrcn+vwK5ripVU4tdZ1pNL/pVbzZ66ySjQn36Eoj:/fUywKQ7Fb1pNL/p5ZfjQn36Eu
Behavioral task
behavioral1
Sample
96671eab0913c0003c63f4d2c50318db
Resource
ubuntu1804-amd64-20231215-en
Malware Config
Extracted
xorddos
http://aa.hostasa.org/config.rar
ppp.gggatat456.com:1523
ppp.xxxatat456.com:1523
www1.gggatat456.com:1523
-
crc_polynomial
EDB88320
Targets
-
-
Target
96671eab0913c0003c63f4d2c50318db
-
Size
535KB
-
MD5
96671eab0913c0003c63f4d2c50318db
-
SHA1
0ef56578885236f87ae7f1c7580b8ed50c9ade77
-
SHA256
5a7d7f1d53f039e7b69cf8d040cc043d1264b14107a8a73034e6b90d8e81f87a
-
SHA512
198d02b0312a271e88a4c3749cb7b828fcffd0ffb3327dc3e54c68953c99b03a0354192314e43691e0c02354a34d5ca074b0165568195d8ed0f6018b24857d82
-
SSDEEP
12288:4Ufrcn+vwK5ripVU4tdZ1pNL/pVbzZ66ySjQn36Eoj:/fUywKQ7Fb1pNL/p5ZfjQn36Eu
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Deletes itself
-
Executes dropped EXE
-
Checks CPU configuration
Checks CPU information which indicate if the system is a virtual machine.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-