General
-
Target
854f9f0fd26d823d0b678b7228154138
-
Size
596KB
-
Sample
231222-mls8raaah9
-
MD5
854f9f0fd26d823d0b678b7228154138
-
SHA1
ebaed77107d5ba6ff3d45155232d3c3e9fe34373
-
SHA256
42629d9d813e59c3d2b7aac0da644ddb1824a8b286b39393ad50a945d51ab363
-
SHA512
217d5d6d7436c98ea7b89d008fb1fd671ca327ba8b61edd48a5507a15717f105ab4d4ace798a90afffcb8ae0062041005777fd6bfd1f31dc014a7ccf9e9d6497
-
SSDEEP
12288:bfTGy+n69+5rTlFEcMWbHvx5SGEuWdMF6yxm9Ah7Dxu9hc7L:rTG/0+5dq4bHvx5SGodMLTD4XcP
Behavioral task
behavioral1
Sample
854f9f0fd26d823d0b678b7228154138
Resource
ubuntu1804-amd64-20231222-en
Malware Config
Extracted
xorddos
http://info1.3000uc.com/b/u.php
gh.dsaj2a1.org:2849
173.247.233.58:2849
iosapp.servegame.com:2849
-
crc_polynomial
EDB88320
Targets
-
-
Target
854f9f0fd26d823d0b678b7228154138
-
Size
596KB
-
MD5
854f9f0fd26d823d0b678b7228154138
-
SHA1
ebaed77107d5ba6ff3d45155232d3c3e9fe34373
-
SHA256
42629d9d813e59c3d2b7aac0da644ddb1824a8b286b39393ad50a945d51ab363
-
SHA512
217d5d6d7436c98ea7b89d008fb1fd671ca327ba8b61edd48a5507a15717f105ab4d4ace798a90afffcb8ae0062041005777fd6bfd1f31dc014a7ccf9e9d6497
-
SSDEEP
12288:bfTGy+n69+5rTlFEcMWbHvx5SGEuWdMF6yxm9Ah7Dxu9hc7L:rTG/0+5dq4bHvx5SGodMLTD4XcP
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Deletes itself
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-