General

  • Target

    b52205215441c3926b7eec083d4d3555

  • Size

    611KB

  • Sample

    231220-p5p2jscahp

  • MD5

    b52205215441c3926b7eec083d4d3555

  • SHA1

    f267c0c2d82b6642abcff6bb4ca5e38ef9fe1a23

  • SHA256

    c0981ccf0cb2cefef67e5e52abd9bf4020ccacea1fb2f65a6ffc0f93922d22bb

  • SHA512

    1bc0d0e3d43fd4b5b5c74a970a47f49090709d719f8e21b4c78b664f254ba4bd3f51771e723383f3677b02aa525e7960b5227e67e49fb46add25a907eafe25d7

  • SSDEEP

    12288:FBXOv9wV1/n/dQFhWlH/c1dHo4h9L+zNZrr3T6yF8EEP4UlUuTh1AG:FBXGkN/+Fhu/Qo4h9L+zNN3BVEBl/91h

Malware Config

Extracted

Family

xorddos

C2

http://aa.finance1num.org/config.rar

cdn.netflix2cdn.com:21

cdn.finance1num.com:21

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      b52205215441c3926b7eec083d4d3555

    • Size

      611KB

    • MD5

      b52205215441c3926b7eec083d4d3555

    • SHA1

      f267c0c2d82b6642abcff6bb4ca5e38ef9fe1a23

    • SHA256

      c0981ccf0cb2cefef67e5e52abd9bf4020ccacea1fb2f65a6ffc0f93922d22bb

    • SHA512

      1bc0d0e3d43fd4b5b5c74a970a47f49090709d719f8e21b4c78b664f254ba4bd3f51771e723383f3677b02aa525e7960b5227e67e49fb46add25a907eafe25d7

    • SSDEEP

      12288:FBXOv9wV1/n/dQFhWlH/c1dHo4h9L+zNZrr3T6yF8EEP4UlUuTh1AG:FBXGkN/+Fhu/Qo4h9L+zNN3BVEBl/91h

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Deletes itself

    • Executes dropped EXE

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

MITRE ATT&CK Enterprise v15

Tasks