Analysis
-
max time kernel
154s -
max time network
152s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231215-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
22-12-2023 03:23
Behavioral task
behavioral1
Sample
5a5fbd54bcfacae5b6b7ba089e7ff543
Resource
ubuntu1804-amd64-20231215-en
General
-
Target
5a5fbd54bcfacae5b6b7ba089e7ff543
-
Size
537KB
-
MD5
5a5fbd54bcfacae5b6b7ba089e7ff543
-
SHA1
b92b3bf25c0a8246355177bfac4aba5831893827
-
SHA256
8990c690ba23b4aa59e900084dd27c71b59728857dc30626892d495487791cb3
-
SHA512
53c36bdd8f2d228e4a4014eb42e982cc32047ea8651912c7dc7926c697df0fbe9fd54df3b9c80a445f0c786d46f3a33b976c21c1ff109b34233035971a5a0b80
-
SSDEEP
12288:ISraVbNYn/gpq5xnFeEu1eZ1gVcxfwbuHvh3u6yp5k:Im8bKEWt0EucZ1gVcxfwa53U
Malware Config
Extracted
xorddos
topbannersun.com:5414
wowapplecar.com:5414
-
crc_polynomial
CDB88320
Signatures
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload 1 IoCs
Processes:
resource yara_rule /bin/nclqbux family_xorddos -
Deletes itself 40 IoCs
Processes:
pid 1544 1551 1555 1560 1563 1566 1569 1572 1575 1579 1581 1585 1587 1591 1594 1596 1599 1602 1605 1608 1611 1615 1618 1620 1623 1644 1647 1650 1654 1657 1660 1662 1665 1669 1671 1675 1677 1680 1684 1736 -
Executes dropped EXE 40 IoCs
Processes:
nclqbuxqcortrhiangqzxvfipdovodpmznxcjwoptbidjleiijraowesahjmckbokxcbqrfawolxwmqwaoifiirurbwspqtkikrjifwjeswoxlwctgrnbkzcghuztmkouskfwfcvvagezaxmdhdclmikhlyszmmcktffqhlnnlbquvirhreocigzuscfnhdqyqdndovnvqvmzmsqvazuvrycgojxmbdzetqgluezussmlujzpqpwtabdxqeugjwlmwuvravuyqoafeperyaxvqbpynavatukkxghzznghrxlqpjsmgiyjeygenbalyiuxoubeumxlxpzfalteryrstdxbywsuhpojllvicupetphxgfqagkvzgqdxkulipzioc pid process /bin/nclqbux 1546 nclqbux /bin/qcortrhiangq 1550 qcortrhiangq /bin/zxvfipd 1553 zxvfipd /bin/ovodpm 1559 ovodpm /bin/znxcjwopt 1562 znxcjwopt /bin/bidjleiijraow 1565 bidjleiijraow /bin/esahjmckb 1568 esahjmckb /bin/okxcbqrfawol 1571 okxcbqrfawol /bin/xwmqwaoifii 1574 xwmqwaoifii /bin/rurbwsp 1577 rurbwsp /bin/qtkikrjifwjes 1580 qtkikrjifwjes /bin/woxlwctgrnbk 1583 woxlwctgrnbk /bin/zcghuzt 1586 zcghuzt /bin/mkouskfwfcvvag 1589 mkouskfwfcvvag /bin/ezaxmdhdc 1592 ezaxmdhdc /bin/lmikhlysz 1595 lmikhlysz /bin/mmcktffqhl 1598 mmcktffqhl /bin/nnlbqu 1601 nnlbqu /bin/virhreo 1604 virhreo /bin/cigzuscfnh 1607 cigzuscfnh /bin/dqyqdnd 1610 dqyqdnd /bin/ovnvqvmzmsq 1613 ovnvqvmzmsq /bin/vazuvrycg 1616 vazuvrycg /bin/ojxmbdzetq 1619 ojxmbdzetq /bin/gluezussml 1622 gluezussml /bin/ujzpqpwta 1643 ujzpqpwta /bin/bdxqeug 1646 bdxqeug /bin/jwlmwuvravu 1649 jwlmwuvravu /bin/yqoafepe 1652 yqoafepe /bin/ryaxvqbpynava 1655 ryaxvqbpynava /bin/tukkxghz 1658 tukkxghz /bin/znghrxlqpjsmgi 1661 znghrxlqpjsmgi /bin/yjeygen 1664 yjeygen /bin/balyiuxou 1667 balyiuxou /bin/beumxlxpzfa 1670 beumxlxpzfa /bin/lteryrs 1673 lteryrs /bin/tdxbywsuhp 1676 tdxbywsuhp /bin/ojllvicupe 1679 ojllvicupe /bin/tphxgfqagk 1682 tphxgfqagk /bin/vzgqdxkulipz 1735 vzgqdxkulipz -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
Processes:
description ioc File opened for modification /etc/cron.hourly/xubqlcn.sh -
Processes:
description ioc File opened for modification /etc/init.d/xubqlcn -
Writes file to system bin folder 1 TTPs 47 IoCs
Processes:
description ioc File opened for modification /bin/mmcktffqhl File opened for modification /bin/virhreo File opened for modification /bin/tukkxghz File opened for modification /bin/tdxbywsuhp File opened for modification /bin/zxvfipd File opened for modification /bin/avrowuodpehyrb File opened for modification /bin/ujzpqpwta File opened for modification /bin/ezaxmdhdc File opened for modification /bin/yjeygen File opened for modification /bin/beumxlxpzfa File opened for modification /bin/znxcjwopt File opened for modification /bin/bidjleiijraow File opened for modification /bin/zcghuzt File opened for modification /bin/mkouskfwfcvvag File opened for modification /bin/ojllvicupe File opened for modification /bin/abuhhxaa File opened for modification /bin/esahjmckb File opened for modification /bin/cigzuscfnh File opened for modification /bin/znghrxlqpjsmgi File opened for modification /bin/lteryrs File opened for modification /bin/woxlwctgrnbk File opened for modification /bin/balyiuxou File opened for modification /bin/imbsqxhv File opened for modification /bin/ovodpm File opened for modification /bin/okxcbqrfawol File opened for modification /bin/xwmqwaoifii File opened for modification /bin/qtkikrjifwjes File opened for modification /bin/vazuvrycg File opened for modification /bin/ojxmbdzetq File opened for modification /bin/jwlmwuvravu File opened for modification /bin/xubqlcn File opened for modification /bin/qcortrhiangq File opened for modification /bin/nnlbqu File opened for modification /bin/ovnvqvmzmsq File opened for modification /bin/xubqlcn.sh File opened for modification /bin/rurbwsp File opened for modification /bin/mklhdklj File opened for modification /bin/fnebfaluxb File opened for modification /bin/bdxqeug File opened for modification /bin/yqoafepe File opened for modification /bin/ryaxvqbpynava File opened for modification /bin/tphxgfqagk File opened for modification /bin/nclqbux File opened for modification /bin/lmikhlysz File opened for modification /bin/dqyqdnd File opened for modification /bin/gluezussml File opened for modification /bin/vzgqdxkulipz -
Writes file to shm directory 2 IoCs
Malware can drop malicious files in the shm directory which will run directly from RAM.
Processes:
description ioc File opened for modification /dev/shm/sem.usxguu File opened for modification /dev/shm/sem.JHq1Pj
Processes
-
/tmp/5a5fbd54bcfacae5b6b7ba089e7ff543/tmp/5a5fbd54bcfacae5b6b7ba089e7ff5431⤵PID:1543
-
/bin/nclqbux/bin/nclqbux1⤵
- Executes dropped EXE
PID:1546
-
/bin/qcortrhiangq/bin/qcortrhiangq -d 15471⤵
- Executes dropped EXE
PID:1550
-
/bin/zxvfipd/bin/zxvfipd -d 15471⤵
- Executes dropped EXE
PID:1553
-
/bin/ovodpm/bin/ovodpm -d 15471⤵
- Executes dropped EXE
PID:1559
-
/bin/znxcjwopt/bin/znxcjwopt -d 15471⤵
- Executes dropped EXE
PID:1562
-
/bin/bidjleiijraow/bin/bidjleiijraow -d 15471⤵
- Executes dropped EXE
PID:1565
-
/bin/esahjmckb/bin/esahjmckb -d 15471⤵
- Executes dropped EXE
PID:1568
-
/bin/okxcbqrfawol/bin/okxcbqrfawol -d 15471⤵
- Executes dropped EXE
PID:1571
-
/bin/xwmqwaoifii/bin/xwmqwaoifii -d 15471⤵
- Executes dropped EXE
PID:1574
-
/bin/rurbwsp/bin/rurbwsp -d 15471⤵
- Executes dropped EXE
PID:1577
-
/bin/qtkikrjifwjes/bin/qtkikrjifwjes -d 15471⤵
- Executes dropped EXE
PID:1580
-
/bin/woxlwctgrnbk/bin/woxlwctgrnbk -d 15471⤵
- Executes dropped EXE
PID:1583
-
/bin/zcghuzt/bin/zcghuzt -d 15471⤵
- Executes dropped EXE
PID:1586
-
/bin/mkouskfwfcvvag/bin/mkouskfwfcvvag -d 15471⤵
- Executes dropped EXE
PID:1589
-
/bin/ezaxmdhdc/bin/ezaxmdhdc -d 15471⤵
- Executes dropped EXE
PID:1592
-
/bin/lmikhlysz/bin/lmikhlysz -d 15471⤵
- Executes dropped EXE
PID:1595
-
/bin/mmcktffqhl/bin/mmcktffqhl -d 15471⤵
- Executes dropped EXE
PID:1598
-
/bin/nnlbqu/bin/nnlbqu -d 15471⤵
- Executes dropped EXE
PID:1601
-
/bin/virhreo/bin/virhreo -d 15471⤵
- Executes dropped EXE
PID:1604
-
/bin/cigzuscfnh/bin/cigzuscfnh -d 15471⤵
- Executes dropped EXE
PID:1607
-
/bin/dqyqdnd/bin/dqyqdnd -d 15471⤵
- Executes dropped EXE
PID:1610
-
/bin/ovnvqvmzmsq/bin/ovnvqvmzmsq -d 15471⤵
- Executes dropped EXE
PID:1613
-
/bin/vazuvrycg/bin/vazuvrycg -d 15471⤵
- Executes dropped EXE
PID:1616
-
/bin/ojxmbdzetq/bin/ojxmbdzetq -d 15471⤵
- Executes dropped EXE
PID:1619
-
/bin/gluezussml/bin/gluezussml -d 15471⤵
- Executes dropped EXE
PID:1622
-
/bin/ujzpqpwta/bin/ujzpqpwta -d 15471⤵
- Executes dropped EXE
PID:1643
-
/bin/bdxqeug/bin/bdxqeug -d 15471⤵
- Executes dropped EXE
PID:1646
-
/bin/jwlmwuvravu/bin/jwlmwuvravu -d 15471⤵
- Executes dropped EXE
PID:1649
-
/bin/yqoafepe/bin/yqoafepe -d 15471⤵
- Executes dropped EXE
PID:1652
-
/bin/ryaxvqbpynava/bin/ryaxvqbpynava -d 15471⤵
- Executes dropped EXE
PID:1655
-
/bin/tukkxghz/bin/tukkxghz -d 15471⤵
- Executes dropped EXE
PID:1658
-
/bin/znghrxlqpjsmgi/bin/znghrxlqpjsmgi -d 15471⤵
- Executes dropped EXE
PID:1661
-
/bin/yjeygen/bin/yjeygen -d 15471⤵
- Executes dropped EXE
PID:1664
-
/bin/balyiuxou/bin/balyiuxou -d 15471⤵
- Executes dropped EXE
PID:1667
-
/bin/beumxlxpzfa/bin/beumxlxpzfa -d 15471⤵
- Executes dropped EXE
PID:1670
-
/bin/lteryrs/bin/lteryrs -d 15471⤵
- Executes dropped EXE
PID:1673
-
/bin/tdxbywsuhp/bin/tdxbywsuhp -d 15471⤵
- Executes dropped EXE
PID:1676
-
/bin/ojllvicupe/bin/ojllvicupe -d 15471⤵
- Executes dropped EXE
PID:1679
-
/bin/tphxgfqagk/bin/tphxgfqagk -d 15471⤵
- Executes dropped EXE
PID:1682
-
/bin/vzgqdxkulipz/bin/vzgqdxkulipz -d 15471⤵
- Executes dropped EXE
PID:1735
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
537KB
MD56250df4efd0199f8f1cc71e2fa9d57bf
SHA11a7053b1dab667c745ce302ae9092a02c549d235
SHA256fdfd5621d81893d41a6ab9f78291f8b3891461ad274a58c1d6de8ac10ca83c53
SHA5125071a67acfbad3778c71220aeea3971a7cfc80547e30de3c8bc9086ec0523fe437a74c756faa55ce552495c9d36729519a919955e7d543fa64ac311c62990e51
-
Filesize
144B
MD558a29c287a7486b516896b77fb21a93d
SHA196ecc54043eab94fe3c52dd61ac341af02c77579
SHA256c1a19f0a7ea40729a46674f918f0788fc06ac50c7c286614ae7551093aa8d88a
SHA512181395498f3e6d8d4c877d524f1365779d5f115785707ceff146fba7cd86e35faca579821e391771f2ab79ee7649080df9a5f925fd10890b7b13dbffd84f6ce1
-
Filesize
32B
MD5e7a22522f2b9169d1d06bf98f3b15ad3
SHA1d26eec2b6247f62df6eb3082164e0b9d5d4a59dd
SHA25676d6778b3b21ce607b0222a6c3b4a7638cb345f5b2def2b622f087e9c4cb282a
SHA5124f3f472fa6a9499cfc341fd84d16d0454dc17bff2c023b5c2b0fce855006664c196c7708d8adb06d36d901954fc7976c40d7755ffc7a05661f3de39e814eaa65
-
Filesize
323B
MD53a8792e73510af4c3cfa198bea91ff0c
SHA13b1ec7b88c3cae1fe63898f9199490bf44d93d22
SHA256725249a8fc6b000e432485f58fe14537b30c335cd483283bd7ab3e1eaa98d7da
SHA5121a28ebb761736fdabc904c29072f54654a7bb30a49e58e2033f84db5071bf4304bee7e7572035c686e7235157cd19f5f58c6f26194aa390cbc0b76dd3f047d8c