General

  • Target

    12580ef9ea8263664f1347834c162e98

  • Size

    596KB

  • Sample

    231221-2ar9msfbd8

  • MD5

    12580ef9ea8263664f1347834c162e98

  • SHA1

    d44055754ad40c523f1a16e616813e43c3fb5808

  • SHA256

    af8039032cc60ca4205c1bd471009977e331ca4926bf9d5203fca3ec30a5ba45

  • SHA512

    eba7c3de269317baf6d5e6ee73607b110563e620ada6c3924bd82fef7599637fc6db92629b55a9e1273d77a2f006c56267488b50c33e0953bb4ac0c38ef161fc

  • SSDEEP

    12288:bfTGy+n69+5rTlFEcMWbHvx5SGEuWd1F6yxm9Ah7Dxu9hc7L:rTG/0+5dq4bHvx5SGod1LTD4XcP

Malware Config

Extracted

Family

xorddos

C2

http://info1.3000uc.com/b/u.php

gh.dsaj2a1.org:2854

103.24.3.11:2854

102.fwq.me:2854

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      12580ef9ea8263664f1347834c162e98

    • Size

      596KB

    • MD5

      12580ef9ea8263664f1347834c162e98

    • SHA1

      d44055754ad40c523f1a16e616813e43c3fb5808

    • SHA256

      af8039032cc60ca4205c1bd471009977e331ca4926bf9d5203fca3ec30a5ba45

    • SHA512

      eba7c3de269317baf6d5e6ee73607b110563e620ada6c3924bd82fef7599637fc6db92629b55a9e1273d77a2f006c56267488b50c33e0953bb4ac0c38ef161fc

    • SSDEEP

      12288:bfTGy+n69+5rTlFEcMWbHvx5SGEuWd1F6yxm9Ah7Dxu9hc7L:rTG/0+5dq4bHvx5SGod1LTD4XcP

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Deletes itself

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

MITRE ATT&CK Enterprise v15

Tasks