General
-
Target
b52205215441c3926b7eec083d4d3555
-
Size
611KB
-
Sample
231220-p5p2jscahp
-
MD5
b52205215441c3926b7eec083d4d3555
-
SHA1
f267c0c2d82b6642abcff6bb4ca5e38ef9fe1a23
-
SHA256
c0981ccf0cb2cefef67e5e52abd9bf4020ccacea1fb2f65a6ffc0f93922d22bb
-
SHA512
1bc0d0e3d43fd4b5b5c74a970a47f49090709d719f8e21b4c78b664f254ba4bd3f51771e723383f3677b02aa525e7960b5227e67e49fb46add25a907eafe25d7
-
SSDEEP
12288:FBXOv9wV1/n/dQFhWlH/c1dHo4h9L+zNZrr3T6yF8EEP4UlUuTh1AG:FBXGkN/+Fhu/Qo4h9L+zNN3BVEBl/91h
Behavioral task
behavioral1
Sample
b52205215441c3926b7eec083d4d3555
Resource
ubuntu1804-amd64-20231215-en
Malware Config
Extracted
xorddos
http://aa.finance1num.org/config.rar
cdn.netflix2cdn.com:21
cdn.finance1num.com:21
-
crc_polynomial
EDB88320
Targets
-
-
Target
b52205215441c3926b7eec083d4d3555
-
Size
611KB
-
MD5
b52205215441c3926b7eec083d4d3555
-
SHA1
f267c0c2d82b6642abcff6bb4ca5e38ef9fe1a23
-
SHA256
c0981ccf0cb2cefef67e5e52abd9bf4020ccacea1fb2f65a6ffc0f93922d22bb
-
SHA512
1bc0d0e3d43fd4b5b5c74a970a47f49090709d719f8e21b4c78b664f254ba4bd3f51771e723383f3677b02aa525e7960b5227e67e49fb46add25a907eafe25d7
-
SSDEEP
12288:FBXOv9wV1/n/dQFhWlH/c1dHo4h9L+zNZrr3T6yF8EEP4UlUuTh1AG:FBXGkN/+Fhu/Qo4h9L+zNN3BVEBl/91h
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Deletes itself
-
Executes dropped EXE
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-