Analysis

  • max time kernel
    36s
  • max time network
    99s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20231222-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20231222-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    22-12-2023 02:49

General

  • Target

    5602159b146889a8d8f73317cd07c88c

  • Size

    544KB

  • MD5

    5602159b146889a8d8f73317cd07c88c

  • SHA1

    7d27cf3a17a76da44da1b17258cd4768c6d6a2ce

  • SHA256

    42d1a53a951c417d9ecfee401060e7eb6cdc7f1eee2199fc301bc954294a94a2

  • SHA512

    63bba00e8d0965e49ac39d6fba2d3b3069299ef786ad805732ac5bd25e02718b94ac6f7f2ed8ab109966a0828ca249cd96aebd59cbd80d28c9469db1e9aae68a

  • SSDEEP

    12288:JbinNy0Y1nvEtXBx6DkkJmAGyPexU279WnjVZ6ySWK:1iNy0evmxvkJmApPexUm9cVE

Malware Config

Extracted

Family

xorddos

C2

topbannersun.com:5717

wowapplecar.com:5717

Attributes
  • crc_polynomial

    CDB88320

xor.plain

Signatures

  • XorDDoS

    Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

  • XorDDoS payload 4 IoCs
  • Deletes itself 33 IoCs
  • Executes dropped EXE 34 IoCs
  • Creates/modifies Cron job 1 TTPs 1 IoCs

    Cron allows running tasks on a schedule, and is commonly used for malware persistence.

  • Modifies init.d 1 TTPs 1 IoCs

    Adds/modifies system service, likely for persistence.

  • Writes file to system bin folder 1 TTPs 37 IoCs
  • Writes file to shm directory 2 IoCs

    Malware can drop malicious files in the shm directory which will run directly from RAM.

Processes

  • /tmp/5602159b146889a8d8f73317cd07c88c
    /tmp/5602159b146889a8d8f73317cd07c88c
    1⤵
      PID:1603
    • /bin/vfctqkodqkhr
      /bin/vfctqkodqkhr
      1⤵
      • Executes dropped EXE
      PID:1607
    • /bin/ldbrmkvcfpx
      /bin/ldbrmkvcfpx -d 1608
      1⤵
      • Executes dropped EXE
      PID:1612
    • /bin/ndggewlzpzjgd
      /bin/ndggewlzpzjgd -d 1608
      1⤵
      • Executes dropped EXE
      PID:1618
    • /bin/oazcvzbmbgvcz
      /bin/oazcvzbmbgvcz -d 1608
      1⤵
      • Executes dropped EXE
      PID:1621
    • /bin/pqvswdzvoykqit
      /bin/pqvswdzvoykqit -d 1608
      1⤵
      • Executes dropped EXE
      PID:1624
    • /bin/hjljlgin
      /bin/hjljlgin -d 1608
      1⤵
      • Executes dropped EXE
      PID:1627
    • /bin/mojnfcafgyqult
      /bin/mojnfcafgyqult -d 1608
      1⤵
      • Executes dropped EXE
      PID:1639
    • /bin/tofxku
      /bin/tofxku -d 1608
      1⤵
      • Executes dropped EXE
      PID:1642
    • /bin/zjnqvu
      /bin/zjnqvu -d 1608
      1⤵
      • Executes dropped EXE
      PID:1645
    • /bin/dsmtcb
      /bin/dsmtcb -d 1608
      1⤵
      • Executes dropped EXE
      PID:1648
    • /bin/gbgpbwjordjh
      /bin/gbgpbwjordjh -d 1608
      1⤵
      • Executes dropped EXE
      PID:1651
    • /bin/drduauf
      /bin/drduauf -d 1608
      1⤵
      • Executes dropped EXE
      PID:1660
    • /bin/wyfhkgmsvykv
      /bin/wyfhkgmsvykv -d 1608
      1⤵
      • Executes dropped EXE
      PID:1663
    • /bin/olfomtmyrmbk
      /bin/olfomtmyrmbk -d 1608
      1⤵
      • Executes dropped EXE
      PID:1666
    • /bin/yllfvkfcrq
      /bin/yllfvkfcrq -d 1608
      1⤵
      • Executes dropped EXE
      PID:1669
    • /bin/ekfevcwlpcaexm
      /bin/ekfevcwlpcaexm -d 1608
      1⤵
      • Executes dropped EXE
      PID:1672
    • /bin/urkhaxyncjjp
      /bin/urkhaxyncjjp -d 1608
      1⤵
      • Executes dropped EXE
      PID:1675
    • /bin/phvzvx
      /bin/phvzvx -d 1608
      1⤵
      • Executes dropped EXE
      PID:1678
    • /bin/nbgetolmequa
      /bin/nbgetolmequa -d 1608
      1⤵
      • Executes dropped EXE
      PID:1681
    • /bin/ghjgixkriawzhs
      /bin/ghjgixkriawzhs -d 1608
      1⤵
      • Executes dropped EXE
      PID:1684
    • /bin/crbrthx
      /bin/crbrthx -d 1608
      1⤵
      • Executes dropped EXE
      PID:1687
    • /bin/dwiefcfhuga
      /bin/dwiefcfhuga -d 1608
      1⤵
      • Executes dropped EXE
      PID:1690
    • /bin/pxbmhephbst
      /bin/pxbmhephbst -d 1608
      1⤵
      • Executes dropped EXE
      PID:1693
    • /bin/epuzjqnmox
      /bin/epuzjqnmox -d 1608
      1⤵
      • Executes dropped EXE
      PID:1695
    • /bin/taycug
      /bin/taycug -d 1608
      1⤵
      • Executes dropped EXE
      PID:1699
    • /bin/jvbmjk
      /bin/jvbmjk -d 1608
      1⤵
      • Executes dropped EXE
      PID:1702
    • /bin/ajpzogvuke
      /bin/ajpzogvuke -d 1608
      1⤵
      • Executes dropped EXE
      PID:1705
    • /bin/ilyzoytpzksn
      /bin/ilyzoytpzksn -d 1608
      1⤵
      • Executes dropped EXE
      PID:1708
    • /bin/gbdfimrkxij
      /bin/gbdfimrkxij -d 1608
      1⤵
      • Executes dropped EXE
      PID:1711
    • /bin/pgibkxj
      /bin/pgibkxj -d 1608
      1⤵
      • Executes dropped EXE
      PID:1714
    • /bin/xilvdcuqvh
      /bin/xilvdcuqvh -d 1608
      1⤵
      • Executes dropped EXE
      PID:1717
    • /bin/tvefsp
      /bin/tvefsp -d 1608
      1⤵
      • Executes dropped EXE
      PID:1722
    • /bin/pxpldshvprfsb
      /bin/pxpldshvprfsb -d 1608
      1⤵
      • Executes dropped EXE
      PID:1725
    • /bin/cuygyxqm
      /bin/cuygyxqm -d 1608
      1⤵
      • Executes dropped EXE
      PID:1727

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • /bin/pxbmhephbst

      Filesize

      74KB

      MD5

      0f65bd8a103936fd446e45f0316a7bd4

      SHA1

      1bb03dfbdf07e2eede0e687bda9b1ceff5e0c59d

      SHA256

      7def82bdaff65a133cfa6e0664f4bd9d4fea62bacfc70637763d8370371fe763

      SHA512

      8c350b6359aabd29f2d6ab4c917164595e24d7fca0fe594564f25b2fa804381f44c79b04b1be102c3122c0444bf8dcd5f1b3d954a837de9566362f46e3a56024

    • /bin/tofxku

      Filesize

      472KB

      MD5

      80384b6905860fb1dd40323cea6f5c84

      SHA1

      94feb64f5c6eef8bc964fc9e4411527070850f5d

      SHA256

      a905d747f55cca4f2ceda10c466209e97da3d39c1fe21eb0d837446e8d82777d

      SHA512

      1aef48b0643b650f8997206b4677cbfb751adcc96eba5a3e0afb1f6cb0e80d77b20fa86383495f2e61878ac51758e69b4f865753effbdaf11a70cb38231ad618

    • /bin/vfctqkodqkhr

      Filesize

      544KB

      MD5

      c034e858e6070095a40649f86ec00d28

      SHA1

      4623606f813066b5cd0a0e5ce93e9b9e8c506474

      SHA256

      7c58ab658ef53e1e9d24d6d29d49a6d876f398e27427cae22ccff6a0371513b6

      SHA512

      476fe15bd608e4ddf1a1dbd637e5be366fa3d868a567420f7ca4ed67eaecbf73b09d3f6247f5bf24028e744b365671780d0089ae9e44b00d499dba4e31deeae4

    • /bin/zjnqvu

      Filesize

      58KB

      MD5

      f0a12a5e0046258f29a538c315310da5

      SHA1

      fa0a855d343ebca5b054d6992ea79d1477973eb8

      SHA256

      ec2e73c6d185f568905916dc9e28b2246a5f0227d6a29bf868d9687dd50d16ee

      SHA512

      cddf11d73a96780780d469c81936d45d17484dd3040eb22318fae2f6083cd5912e42a6f8345339c6bc79dad614bd94abbd320453737466e1d79780d7277fe501

    • /etc/cron.hourly/rhkqdokqtcfv.sh

      Filesize

      149B

      MD5

      e8eed4792d3991013f23ac463b9b3081

      SHA1

      ecea50b1f29798297e8b9c914d9d073033d5ee7d

      SHA256

      c3a6972eaba54981302e33c9267c49f11ef77144bd1b2408eafe8869be54b11a

      SHA512

      80dbe644d6ad5fd21d39b25eb9151715505b4f0863db3d915790cfc0fe5de9ebf4ed3479234ca8c6271855516c126b87bdaf5bdcd283bce1c9308a98d3419a01

    • /etc/daemon.cfg

      Filesize

      32B

      MD5

      321cf87b57022ebeff781cfd76ebd5f8

      SHA1

      41959b04a1ff667adf15adaf0dad6ca9cb5d1c31

      SHA256

      78b39aa36cb0563a4099a7efc64c716b78cc59b25c80a94dbcae6dfeb7fb38b1

      SHA512

      14fc84d12632f5db7f8ed99a90024256244c7d5ec06d1ab8347f0313a2508454abda18b6713af18bcbac283fd7c6e4169e3c662335ba4febfe07d4dfa4569de3

    • /etc/init.d/rhkqdokqtcfv

      Filesize

      348B

      MD5

      c36fba278f624fb9036db718afd3a341

      SHA1

      db7400ca8ffac25943296574b2ab6b91f2d04ac5

      SHA256

      d3122661b39d5f53c1eb2a85bc8ec9e5ae7d3edbd213a52bcf1ad071af19da04

      SHA512

      0d81db42c56423c2bd78afd39e85ea5a7aab18c87a91dccfeef4e62376b26b98e7ebf52ae9c4cad3af775fe4812704ce8ad45750bc15f0da82df4cb0abda4475