Analysis
-
max time kernel
21s -
max time network
151s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231222-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231222-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
22-12-2023 01:16
Behavioral task
behavioral1
Sample
4354ecf6edd10d7625b429d765308ee2
Resource
ubuntu1804-amd64-20231222-en
General
-
Target
4354ecf6edd10d7625b429d765308ee2
-
Size
543KB
-
MD5
4354ecf6edd10d7625b429d765308ee2
-
SHA1
a936a99d2fbcb2666dbf4dcadd9e89ceadacb971
-
SHA256
f17b59caed6d1c06938854996cd6064308f31ec88a39ff2553b52368f9a12384
-
SHA512
c561361f8d1f9a211cc2e08662ff88b99c53700d77da6603d227379f122525171ced92d00edb1c7b5cfc9825b02cd24a1a060367e775e9ed630f853a2bbb5f79
-
SSDEEP
12288:1p+duTlNbCIn53vlJU0VkW3C3jyiXcsPl3D2KSKqfj6y1mC:r+ITlNblJ3UHW3CuiXcsPZDmKqfx7
Malware Config
Extracted
xorddos
topbannersun.com:5616
wowapplecar.com:5616
-
crc_polynomial
CDB88320
Signatures
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload 1 IoCs
resource yara_rule behavioral1/files/fstream-2.dat family_xorddos -
Deletes itself 22 IoCs
pid 1596 1606 1609 1612 1619 1621 1625 1628 1631 1634 1637 1640 1643 1647 1650 1652 1655 1659 1662 1665 1667 1670 -
Executes dropped EXE 22 IoCs
ioc pid Process /bin/drammvoplivwh 1599 drammvoplivwh /bin/augzxjgeqn 1604 augzxjgeqn /bin/tuzhffiuu 1607 tuzhffiuu /bin/yqqgpgdxyuktii 1610 yqqgpgdxyuktii /bin/wjhyca 1617 wjhyca /bin/eiajsudnswd 1620 eiajsudnswd /bin/qeiycnyxrixcb 1624 qeiycnyxrixcb /bin/iqoeuprhvbtuyz 1627 iqoeuprhvbtuyz /bin/gywkju 1630 gywkju /bin/wvopdnr 1633 wvopdnr /bin/jzxxftowajave 1636 jzxxftowajave /bin/qiurfixasohz 1639 qiurfixasohz /bin/jdsdlcqdw 1642 jdsdlcqdw /bin/qmuatlmjdud 1645 qmuatlmjdud /bin/zlscfgj 1648 zlscfgj /bin/dukxzvzpav 1651 dukxzvzpav /bin/pdnrpouq 1654 pdnrpouq /bin/umifwww 1657 umifwww /bin/pecmcujjfmbqcl 1660 pecmcujjfmbqcl /bin/fzbwnxnerbmyzj 1663 fzbwnxnerbmyzj /bin/iabkmfgw 1666 iabkmfgw /bin/emhmug 1669 emhmug -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc File opened for modification /etc/cron.hourly/hwvilpovmmard.sh -
description ioc File opened for modification /etc/init.d/hwvilpovmmard -
Writes file to system bin folder 1 TTPs 25 IoCs
description ioc File opened for modification /bin/iqoeuprhvbtuyz File opened for modification /bin/gywkju File opened for modification /bin/hwvilpovmmard.sh File opened for modification /bin/augzxjgeqn File opened for modification /bin/iabkmfgw File opened for modification /bin/wvopdnr File opened for modification /bin/qiurfixasohz File opened for modification /bin/qmuatlmjdud File opened for modification /bin/zlscfgj File opened for modification /bin/drammvoplivwh File opened for modification /bin/eiajsudnswd File opened for modification /bin/wjhyca File opened for modification /bin/jzxxftowajave File opened for modification /bin/jdsdlcqdw File opened for modification /bin/dukxzvzpav File opened for modification /bin/pecmcujjfmbqcl File opened for modification /bin/fzbwnxnerbmyzj File opened for modification /bin/emhmug File opened for modification /bin/qvmfzg File opened for modification /bin/hwvilpovmmard File opened for modification /bin/tuzhffiuu File opened for modification /bin/qeiycnyxrixcb File opened for modification /bin/yqqgpgdxyuktii File opened for modification /bin/pdnrpouq File opened for modification /bin/umifwww -
Writes file to shm directory 2 IoCs
Malware can drop malicious files in the shm directory which will run directly from RAM.
description ioc File opened for modification /dev/shm/sem.xbcfhf File opened for modification /dev/shm/sem.LdcPFT
Processes
-
/tmp/4354ecf6edd10d7625b429d765308ee2/tmp/4354ecf6edd10d7625b429d765308ee21⤵PID:1586
-
/bin/drammvoplivwh/bin/drammvoplivwh1⤵
- Executes dropped EXE
PID:1599
-
/bin/augzxjgeqn/bin/augzxjgeqn -d 16001⤵
- Executes dropped EXE
PID:1604
-
/bin/tuzhffiuu/bin/tuzhffiuu -d 16001⤵
- Executes dropped EXE
PID:1607
-
/bin/yqqgpgdxyuktii/bin/yqqgpgdxyuktii -d 16001⤵
- Executes dropped EXE
PID:1610
-
/bin/wjhyca/bin/wjhyca -d 16001⤵
- Executes dropped EXE
PID:1617
-
/bin/eiajsudnswd/bin/eiajsudnswd -d 16001⤵
- Executes dropped EXE
PID:1620
-
/bin/qeiycnyxrixcb/bin/qeiycnyxrixcb -d 16001⤵
- Executes dropped EXE
PID:1624
-
/bin/iqoeuprhvbtuyz/bin/iqoeuprhvbtuyz -d 16001⤵
- Executes dropped EXE
PID:1627
-
/bin/gywkju/bin/gywkju -d 16001⤵
- Executes dropped EXE
PID:1630
-
/bin/wvopdnr/bin/wvopdnr -d 16001⤵
- Executes dropped EXE
PID:1633
-
/bin/jzxxftowajave/bin/jzxxftowajave -d 16001⤵
- Executes dropped EXE
PID:1636
-
/bin/qiurfixasohz/bin/qiurfixasohz -d 16001⤵
- Executes dropped EXE
PID:1639
-
/bin/jdsdlcqdw/bin/jdsdlcqdw -d 16001⤵
- Executes dropped EXE
PID:1642
-
/bin/qmuatlmjdud/bin/qmuatlmjdud -d 16001⤵
- Executes dropped EXE
PID:1645
-
/bin/zlscfgj/bin/zlscfgj -d 16001⤵
- Executes dropped EXE
PID:1648
-
/bin/dukxzvzpav/bin/dukxzvzpav -d 16001⤵
- Executes dropped EXE
PID:1651
-
/bin/pdnrpouq/bin/pdnrpouq -d 16001⤵
- Executes dropped EXE
PID:1654
-
/bin/umifwww/bin/umifwww -d 16001⤵
- Executes dropped EXE
PID:1657
-
/bin/pecmcujjfmbqcl/bin/pecmcujjfmbqcl -d 16001⤵
- Executes dropped EXE
PID:1660
-
/bin/fzbwnxnerbmyzj/bin/fzbwnxnerbmyzj -d 16001⤵
- Executes dropped EXE
PID:1663
-
/bin/iabkmfgw/bin/iabkmfgw -d 16001⤵
- Executes dropped EXE
PID:1666
-
/bin/emhmug/bin/emhmug -d 16001⤵
- Executes dropped EXE
PID:1669
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
543KB
MD54fedb6043e043dcf4bf3f68c074d2ae3
SHA1b0de474db49b7bcbdec3f4518f0450883c9c7800
SHA2563185bc9e46c9dfea5b2dda15742d3e9b50eab0e2bbe8f3aade442e032afd9b36
SHA51268ff5b4aed237847ce4dbadc7f79cc0efefe21688b782aff7cb2bfb9ecf640cce441cbdfbb0f0bac91b73cd22487ebcf0faf08e1c8b213164fbb052e3c408460
-
Filesize
150B
MD5189fdabcd70190bb50a2b2457de91a8e
SHA11bda24df7fcd14ad4317841acce593c3f87fece7
SHA2564cc60e3db2bad222c21cc08181eff1ca77300deb8e8f1e2b3f90437ce1db972b
SHA5128cb81d11f9de0c200cb1a393856a2dc35f8547c5007bf48a8f2fec36a5c67bd9519f46ce69141a227560c92e20979a56d6986973bbe1ed89d2e7f9d89ba95dd6
-
Filesize
32B
MD5c6e78b1c7c74bfde524a2ef1c95d1fc3
SHA137f2e97311ac2956068eeddd42815de282ad019e
SHA256c46fc82e07641d7d77a8bec8871332ed1a918eb8fd130e91bf54c834d6803d34
SHA51265b2f891681555c655da73bf62b5ec3f0b8abe816fefbe6978942ee41b5418b478c0b58ef49b4e0152265f7db7ca5c2efda7e7f9517f9c30bc970ed222131dc6
-
Filesize
353B
MD5157666ba91011cc7eea634c8558cab17
SHA10a1fe0a4056c93c8564fc501eb7d2bfc5689be43
SHA256cfbb206c0efd2ab9ac6ac53939ca70f09e8e61a9f3e3acd4fe06f41c9dbf68ee
SHA5121cc8df00282450e7f54eaf183c3316d7a6157594aa916e62c3f2c5f967dce739e46236e04bc879bc57e48c3d6c56a87dc9ea29675a4b8c9002c094087b447650