General
-
Target
40b099e6bc67aead2daa62163d1e3ba8
-
Size
596KB
-
Sample
231222-bglgkacgb8
-
MD5
40b099e6bc67aead2daa62163d1e3ba8
-
SHA1
ef203a2d1cac02f877a9fb3c37e598333db95da2
-
SHA256
eb8a811dce3dfe9227be55d995d82d362296e5858f4f0ff9d7a9d54e8fe2cc0d
-
SHA512
34e626e1af66a49cd6cfa0fddda396aa873fbb7d6fe75c3e91dc528e776c31a95576c03778a902e316f5a93bf48bc6ad3f772c16e75baa5ea26b5b1c525b3d50
-
SSDEEP
12288:bfTGy+n69+5rTlFEcMWbHvx5SGEuWdeF6yxm9Ah7Dxu9hc7L:rTG/0+5dq4bHvx5SGodeLTD4XcP
Behavioral task
behavioral1
Sample
40b099e6bc67aead2daa62163d1e3ba8
Resource
ubuntu1804-amd64-20231215-en
Malware Config
Extracted
xorddos
http://info1.3000uc.com/b/u.php
gh.dsaj2a1.org:2818
103.24.0.162:2818
101.fwq.me:2818
-
crc_polynomial
EDB88320
Targets
-
-
Target
40b099e6bc67aead2daa62163d1e3ba8
-
Size
596KB
-
MD5
40b099e6bc67aead2daa62163d1e3ba8
-
SHA1
ef203a2d1cac02f877a9fb3c37e598333db95da2
-
SHA256
eb8a811dce3dfe9227be55d995d82d362296e5858f4f0ff9d7a9d54e8fe2cc0d
-
SHA512
34e626e1af66a49cd6cfa0fddda396aa873fbb7d6fe75c3e91dc528e776c31a95576c03778a902e316f5a93bf48bc6ad3f772c16e75baa5ea26b5b1c525b3d50
-
SSDEEP
12288:bfTGy+n69+5rTlFEcMWbHvx5SGEuWdeF6yxm9Ah7Dxu9hc7L:rTG/0+5dq4bHvx5SGodeLTD4XcP
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Deletes itself
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-