Analysis
-
max time kernel
2s -
max time network
128s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231222-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231222-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
22-12-2023 00:40
Behavioral task
behavioral1
Sample
39ffc090c3be8b2e3835c5c887d05573
Resource
ubuntu1804-amd64-20231222-en
General
-
Target
39ffc090c3be8b2e3835c5c887d05573
-
Size
538KB
-
MD5
39ffc090c3be8b2e3835c5c887d05573
-
SHA1
70f4f7f0a05b934fe7bd709ab6341d1d7c133105
-
SHA256
02663b6c8c7738fdc443491983ea3f5d7e7ea91a784a9cb006b0b4ded0a737f4
-
SHA512
a14cebafb26bb11c242974142bfbcf7bd8308c0ded4dd95e525f8390ab47561a7452b6b1351553eae87c37c630d958ef28321dba7d060eb9ae96bca8cc222f95
-
SSDEEP
12288:fB+OFJ52snwnBrHnL0iTwseG3vtxaYEM/tiL6yXZ:JzL5ZyrIiTNeG3vtxaYEwiL
Malware Config
Extracted
xorddos
topbannersun.com:5212
wowapplecar.com:5212
-
crc_polynomial
CDB88320
Signatures
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload 2 IoCs
Processes:
resource yara_rule /bin/axjdumprjvmewz family_xorddos /bin/zwemvjrpmudjxa family_xorddos -
Deletes itself 1 IoCs
Processes:
pid 1598 -
Executes dropped EXE 1 IoCs
Processes:
axjdumprjvmewzioc pid process /bin/axjdumprjvmewz 1600 axjdumprjvmewz -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
Processes:
description ioc File opened for modification /etc/cron.hourly/zwemvjrpmudjxa.sh -
Processes:
description ioc File opened for modification /etc/init.d/zwemvjrpmudjxa -
Writes file to system bin folder 1 TTPs 4 IoCs
Processes:
description ioc File opened for modification /bin/axjdumprjvmewz File opened for modification /bin/zwemvjrpmudjxa File opened for modification /bin/zwemvjrpmudjxa.sh File opened for modification /bin/ohjhmzhr -
Writes file to shm directory 2 IoCs
Malware can drop malicious files in the shm directory which will run directly from RAM.
Processes:
description ioc File opened for modification /dev/shm/sem.hmjqno File opened for modification /dev/shm/sem.gUI1IT
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
442KB
MD503116c7df5765baea6533e063ad36cee
SHA182fb127381ad3a61d22e4ffffe7e30a4c0998e10
SHA256fd715d0f4aa657093324210bfbb4a8e834d62eb13f9c20da231f2b0f445d82cc
SHA512aaf052d73bda54118a78f4c1756dcfc92e91b2d8234a36a6ffbe07ee9fd8f30f668ee274015ca72a659d2fcad79d108036621022dbddb62196517797d1739b5e
-
Filesize
538KB
MD5d93b8d869e5023dabb4504a61eebb4e8
SHA1574b5c00d6c7b44d6b49e0322c725600fad737eb
SHA25633bbb56e2c4322db22456ba8c2800979ad1eb34182d576467e2c4dbebe8e44c7
SHA5129f9f1054b9a49c0e2e74381fdb197aa0de8c1f5a8ea0ba8261fa007eba654728856e75a22f98e32f734ff59dba60915d639144b6bb8cb2a350e1761ffb6e66ad
-
Filesize
151B
MD552112589bffbccb9c3819aaa96219e82
SHA147074a290a755a8f4deec6305684e3a8cd8432fa
SHA25610d54f96be44adb29e21901a2fdf45f86baaf83c32335f0ef5d0c65b6ac6143f
SHA5121f61ed4f5310dfd05e3866ce90ec60509e61722b804e31ee2a0ca5cb363e589d358c4867d9db79458d98bc45bf0ed30a3158fc6e9ede732b68f1f9ff71d3f9f7
-
Filesize
358B
MD56286f8e758b3e29074ce1f9f9c5c23a8
SHA125f3606ae52b4ab0de203df546df1e0209e4ac1d
SHA2563338e1b3160380213cb7f490f00ac9c3c48a1a6074ee60bde06d77b9be9e83e7
SHA51281195614a5038bc66da88f1adae1a2d01249cd4c02f49808b0518f1bb3e747a870ceecf042646dc92b23494f93047dbc5c51b0d1b7c73b5a9948366c8d999027