General
-
Target
f46885b16a85fd6f20a6d8c6b3836e74
-
Size
247KB
-
Sample
231220-vs9s3sffc9
-
MD5
f46885b16a85fd6f20a6d8c6b3836e74
-
SHA1
21822af4b28c6174c4af73df8df87f1ea0282db4
-
SHA256
98982204bff4e5a3c206cfda13e2f2e899ab82db957596faf004d3698f707305
-
SHA512
d4d156ee913999e5b6a1bb488050510df3e96f739f0fd1a276acf4cd1f91fd9b77167b79dbfd93e940323c9c468e6300ce74d47070a7640c63d158ae4c25f188
-
SSDEEP
6144:JSDFOrnwRgUbMisI6sdkH+M6hWOcy5KOZW7U6NC9ihhhAYIl/mqYf:YZRgUY/fsJcO1KOiXSihhhAPef
Behavioral task
behavioral1
Sample
f46885b16a85fd6f20a6d8c6b3836e74
Resource
ubuntu1804-amd64-20231215-en
Malware Config
Extracted
xorddos
-
crc_polynomial
EDB88320
Targets
-
-
Target
f46885b16a85fd6f20a6d8c6b3836e74
-
Size
247KB
-
MD5
f46885b16a85fd6f20a6d8c6b3836e74
-
SHA1
21822af4b28c6174c4af73df8df87f1ea0282db4
-
SHA256
98982204bff4e5a3c206cfda13e2f2e899ab82db957596faf004d3698f707305
-
SHA512
d4d156ee913999e5b6a1bb488050510df3e96f739f0fd1a276acf4cd1f91fd9b77167b79dbfd93e940323c9c468e6300ce74d47070a7640c63d158ae4c25f188
-
SSDEEP
6144:JSDFOrnwRgUbMisI6sdkH+M6hWOcy5KOZW7U6NC9ihhhAYIl/mqYf:YZRgUY/fsJcO1KOiXSihhhAPef
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
Deletes itself
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-