General

  • Target

    40b099e6bc67aead2daa62163d1e3ba8

  • Size

    596KB

  • Sample

    231222-bglgkacgb8

  • MD5

    40b099e6bc67aead2daa62163d1e3ba8

  • SHA1

    ef203a2d1cac02f877a9fb3c37e598333db95da2

  • SHA256

    eb8a811dce3dfe9227be55d995d82d362296e5858f4f0ff9d7a9d54e8fe2cc0d

  • SHA512

    34e626e1af66a49cd6cfa0fddda396aa873fbb7d6fe75c3e91dc528e776c31a95576c03778a902e316f5a93bf48bc6ad3f772c16e75baa5ea26b5b1c525b3d50

  • SSDEEP

    12288:bfTGy+n69+5rTlFEcMWbHvx5SGEuWdeF6yxm9Ah7Dxu9hc7L:rTG/0+5dq4bHvx5SGodeLTD4XcP

Malware Config

Extracted

Family

xorddos

C2

http://info1.3000uc.com/b/u.php

gh.dsaj2a1.org:2818

103.24.0.162:2818

101.fwq.me:2818

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      40b099e6bc67aead2daa62163d1e3ba8

    • Size

      596KB

    • MD5

      40b099e6bc67aead2daa62163d1e3ba8

    • SHA1

      ef203a2d1cac02f877a9fb3c37e598333db95da2

    • SHA256

      eb8a811dce3dfe9227be55d995d82d362296e5858f4f0ff9d7a9d54e8fe2cc0d

    • SHA512

      34e626e1af66a49cd6cfa0fddda396aa873fbb7d6fe75c3e91dc528e776c31a95576c03778a902e316f5a93bf48bc6ad3f772c16e75baa5ea26b5b1c525b3d50

    • SSDEEP

      12288:bfTGy+n69+5rTlFEcMWbHvx5SGEuWdeF6yxm9Ah7Dxu9hc7L:rTG/0+5dq4bHvx5SGodeLTD4XcP

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Deletes itself

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

MITRE ATT&CK Enterprise v15

Tasks