Analysis
-
max time kernel
153s -
max time network
160s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231215-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
20-12-2023 17:22
Behavioral task
behavioral1
Sample
f60e7e3d7e68fac8a5a5827974ff78f0
Resource
ubuntu1804-amd64-20231215-en
General
-
Target
f60e7e3d7e68fac8a5a5827974ff78f0
-
Size
647KB
-
MD5
f60e7e3d7e68fac8a5a5827974ff78f0
-
SHA1
7bc91c75d85097f885ad507d8c6c7d8b6924b22e
-
SHA256
a518b18d18736dbf2f9c75442753dc9489e46cfc7fab169f80bff4b7bf09c625
-
SHA512
b99b7d4d7bb43ad175977fe9aff8d7cc9a3a3aac2258f5a28cb0edf92bf5b28a71c85ba90cb13b961662f1e486fd6a1312ad98af10bd5072533d08537216ee4d
-
SSDEEP
12288:RBRO1UmJJ0nHgBL9YfJip2qm+x4h1Ton7p6y07l7mtBDvnD/u9hMHDB:RBRpmJ+HyL9AiAqm+x4h1m76wvnDWXMN
Malware Config
Extracted
xorddos
http://info1.3000uc.com/b/u.php
aaaaaaaaaa.re67das.com:5859
vtqq.f3322.net:25
bii.f3322.net:25
-
crc_polynomial
EDB88320
Signatures
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload 4 IoCs
Processes:
resource yara_rule /lib/udev/udev family_xorddos /boot/uzyacawwnt family_xorddos /boot/tpmouafshf family_xorddos /boot/jmubomozop family_xorddos -
Deletes itself 2 IoCs
Processes:
pid 1534 1551 -
Executes dropped EXE 25 IoCs
Processes:
vfbzgutxrwgnmcqorbxnuzyacawwnttpmouafshffexpbuwihyzmonvskqcdpfkidytegxfjuaxhqtemgihtxhyccdfxgyrureulxkmpfcuwxjdnpptmcumtigqxysaqxrzartfhnbfiyxzfabdhcmhqlvkomasodaaqnqrmwjlwozuxmalbjmubomozopsaqbvelrivkpedxekjrodzpdtwrsxsxdxewtfkuifqswgqzcyzuygagcwrtvioc pid process /boot/vfbzgutxrw 1536 vfbzgutxrw /boot/gnmcqorbxn 1550 gnmcqorbxn /boot/uzyacawwnt 1578 uzyacawwnt /boot/tpmouafshf 1591 tpmouafshf /boot/fexpbuwihy 1594 fexpbuwihy /boot/zmonvskqcd 1599 zmonvskqcd /boot/pfkidytegx 1602 pfkidytegx /boot/fjuaxhqtem 1605 fjuaxhqtem /boot/gihtxhyccd 1608 gihtxhyccd /boot/fxgyrureul 1611 fxgyrureul /boot/xkmpfcuwxj 1614 xkmpfcuwxj /boot/dnpptmcumt 1632 dnpptmcumt /boot/igqxysaqxr 1635 igqxysaqxr /boot/zartfhnbfi 1638 zartfhnbfi /boot/yxzfabdhcm 1641 yxzfabdhcm /boot/hqlvkomaso 1644 hqlvkomaso /boot/daaqnqrmwj 1647 daaqnqrmwj /boot/lwozuxmalb 1650 lwozuxmalb /boot/jmubomozop 1653 jmubomozop /boot/saqbvelriv 1656 saqbvelriv /boot/kpedxekjro 1659 kpedxekjro /boot/dzpdtwrsxs 1662 dzpdtwrsxs /boot/xdxewtfkui 1665 xdxewtfkui /boot/fqswgqzcyz 1668 fqswgqzcyz /boot/uygagcwrtv 1671 uygagcwrtv -
Unexpected DNS network traffic destination 64 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 -
Creates/modifies Cron job 1 TTPs 2 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
Processes:
shdescription ioc process File opened for modification /etc/crontab sh File opened for modification /etc/cron.hourly/cron.sh -
Processes:
description ioc File opened for modification /etc/init.d/vfbzgutxrw -
Reads runtime system information 9 IoCs
Reads data from /proc virtual filesystem.
Processes:
systemctlseddescription ioc File opened for reading /proc/rs_dev File opened for reading /proc/sys/kernel/osrelease systemctl File opened for reading /proc/1/sched systemctl File opened for reading /proc/cmdline systemctl File opened for reading /proc/filesystems sed File opened for reading /proc/stat File opened for reading /proc/filesystems systemctl File opened for reading /proc/self/stat systemctl File opened for reading /proc/1/environ systemctl
Processes
-
/tmp/f60e7e3d7e68fac8a5a5827974ff78f0/tmp/f60e7e3d7e68fac8a5a5827974ff78f01⤵PID:1533
-
/boot/vfbzgutxrw/boot/vfbzgutxrw1⤵
- Executes dropped EXE
PID:1536
-
/bin/shsh -c "sed -i '/\\/etc\\/cron.hourly\\/cron.sh/d' /etc/crontab && echo '*/3 * * * * root /etc/cron.hourly/cron.sh' >> /etc/crontab"1⤵
- Creates/modifies Cron job
PID:1542 -
/bin/sedsed -i "/\\/etc\\/cron.hourly\\/cron.sh/d" /etc/crontab2⤵
- Reads runtime system information
PID:1543
-
-
/bin/update-rc.dupdate-rc.d vfbzgutxrw defaults1⤵PID:1541
-
/sbin/update-rc.dupdate-rc.d vfbzgutxrw defaults1⤵PID:1541
-
/usr/bin/update-rc.dupdate-rc.d vfbzgutxrw defaults1⤵PID:1541
-
/usr/sbin/update-rc.dupdate-rc.d vfbzgutxrw defaults1⤵PID:1541
-
/bin/systemctlsystemctl daemon-reload2⤵
- Reads runtime system information
PID:1552
-
-
/bin/chkconfigchkconfig --add vfbzgutxrw1⤵PID:1539
-
/sbin/chkconfigchkconfig --add vfbzgutxrw1⤵PID:1539
-
/usr/bin/chkconfigchkconfig --add vfbzgutxrw1⤵PID:1539
-
/usr/sbin/chkconfigchkconfig --add vfbzgutxrw1⤵PID:1539
-
/usr/local/bin/chkconfigchkconfig --add vfbzgutxrw1⤵PID:1539
-
/usr/local/sbin/chkconfigchkconfig --add vfbzgutxrw1⤵PID:1539
-
/usr/X11R6/bin/chkconfigchkconfig --add vfbzgutxrw1⤵PID:1539
-
/boot/gnmcqorbxn/boot/gnmcqorbxn "echo \"find\"" 15371⤵
- Executes dropped EXE
PID:1550
-
/boot/uzyacawwnt/boot/uzyacawwnt pwd 15371⤵
- Executes dropped EXE
PID:1578
-
/boot/tpmouafshf/boot/tpmouafshf "sleep 1" 15371⤵
- Executes dropped EXE
PID:1591
-
/boot/fexpbuwihy/boot/fexpbuwihy "ps -ef" 15371⤵
- Executes dropped EXE
PID:1594
-
/boot/zmonvskqcd/boot/zmonvskqcd "grep \"A\"" 15371⤵
- Executes dropped EXE
PID:1599
-
/boot/pfkidytegx/boot/pfkidytegx "echo \"find\"" 15371⤵
- Executes dropped EXE
PID:1602
-
/boot/fjuaxhqtem/boot/fjuaxhqtem su 15371⤵
- Executes dropped EXE
PID:1605
-
/boot/gihtxhyccd/boot/gihtxhyccd "grep \"A\"" 15371⤵
- Executes dropped EXE
PID:1608
-
/boot/fxgyrureul/boot/fxgyrureul "netstat -antop" 15371⤵
- Executes dropped EXE
PID:1611
-
/boot/xkmpfcuwxj/boot/xkmpfcuwxj "netstat -an" 15371⤵
- Executes dropped EXE
PID:1614
-
/boot/dnpptmcumt/boot/dnpptmcumt id 15371⤵
- Executes dropped EXE
PID:1632
-
/boot/igqxysaqxr/boot/igqxysaqxr uptime 15371⤵
- Executes dropped EXE
PID:1635
-
/boot/zartfhnbfi/boot/zartfhnbfi uptime 15371⤵
- Executes dropped EXE
PID:1638
-
/boot/yxzfabdhcm/boot/yxzfabdhcm uptime 15371⤵
- Executes dropped EXE
PID:1641
-
/boot/hqlvkomaso/boot/hqlvkomaso "netstat -an" 15371⤵
- Executes dropped EXE
PID:1644
-
/boot/daaqnqrmwj/boot/daaqnqrmwj "netstat -an" 15371⤵
- Executes dropped EXE
PID:1647
-
/boot/lwozuxmalb/boot/lwozuxmalb sh 15371⤵
- Executes dropped EXE
PID:1650
-
/boot/jmubomozop/boot/jmubomozop id 15371⤵
- Executes dropped EXE
PID:1653
-
/boot/saqbvelriv/boot/saqbvelriv who 15371⤵
- Executes dropped EXE
PID:1656
-
/boot/kpedxekjro/boot/kpedxekjro "echo \"find\"" 15371⤵
- Executes dropped EXE
PID:1659
-
/boot/dzpdtwrsxs/boot/dzpdtwrsxs "netstat -an" 15371⤵
- Executes dropped EXE
PID:1662
-
/boot/xdxewtfkui/boot/xdxewtfkui bash 15371⤵
- Executes dropped EXE
PID:1665
-
/boot/fqswgqzcyz/boot/fqswgqzcyz ifconfig 15371⤵
- Executes dropped EXE
PID:1668
-
/boot/uygagcwrtv/boot/uygagcwrtv "ps -ef" 15371⤵
- Executes dropped EXE
PID:1671
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5efe4c9f27cf150869445851dac8f37e1
SHA1bf9ae744320a639ab636bd95606db93cf1ab82b0
SHA256679d791dacf9ea61fcf2d6cc90608e77370a28360af01f2439941babb3254729
SHA512f97eb457be8c5329e36dabc8eb457caa2078e98316d73495a4fbd4222eba5c7cd422647b09567c7f7f63e9e4291f09bd61f6a6732b824d5ea0e468788db0fb20
-
Filesize
480KB
MD5872e17d95d7986256b0e57f4eeb39db3
SHA12013b41d59623a0629e89cf7a5cb8eb1951d4450
SHA256a35e8f5ff727170159dc762ea2b2d7c3f929329f203d20293d213e4190473b41
SHA512e07ab8e18241f63ced256b7d07dfefdd727c4dba7408f8bde17a74b0de53ee2c119fc14aef8edcfd98a3830d4df32014b9afcce79500ceed6e0b74b71eaa5e9f
-
Filesize
647KB
MD5f60e7e3d7e68fac8a5a5827974ff78f0
SHA17bc91c75d85097f885ad507d8c6c7d8b6924b22e
SHA256a518b18d18736dbf2f9c75442753dc9489e46cfc7fab169f80bff4b7bf09c625
SHA512b99b7d4d7bb43ad175977fe9aff8d7cc9a3a3aac2258f5a28cb0edf92bf5b28a71c85ba90cb13b961662f1e486fd6a1312ad98af10bd5072533d08537216ee4d
-
Filesize
488KB
MD5ba2b3b3e32d6da7c3d9c73e5a0f7e806
SHA1a2e4ce93703539e6caa7619c9827e04bd22272d4
SHA256e8a406d1622a8d84b68baa19cff80af13fa885b3878779c98475db9bf47f957b
SHA5128834eb84b78ebc33b0730673a6b1e02b29fba34da923b34619a8aa30d266dba7c1dbe1e0192a9656c33e27b7d98de5fd74af44d7cf78c2adc1a51a317f12f9dd