General
-
Target
a15e9d2d69c1407ac5b42ba46d71fc58
-
Size
603KB
-
Sample
231222-qnbm9sgegq
-
MD5
a15e9d2d69c1407ac5b42ba46d71fc58
-
SHA1
5a124a3a2f363bd3740ab792044d9a06dc4256d5
-
SHA256
7aa8eab2f01783bfe9bb7d8e051baebf563629645d73b2af42022d28a8143179
-
SHA512
f38eeae08e03f19339d03b01a271df14284bd22194887b492c24f6e4c89ef7b416507350cab6a5de8d90084519703b78cd844f35a54a4fa13b8643f0c6a395c5
-
SSDEEP
12288:R40XBrnlTCbI5ZBP5IePtqLn4yFeC+oT6ygF9b4elMuThmVF:e01tCbqNNPtqLn4yFmoEbdlH9mn
Behavioral task
behavioral1
Sample
a15e9d2d69c1407ac5b42ba46d71fc58
Resource
ubuntu1804-amd64-20231215-en
Malware Config
Extracted
xorddos
http://info1.3000uc.com/b/u.php
gh.dsaj2a1.org:2822
www.wangzongfacai.com:2822
174.139.217.145:2822
-
crc_polynomial
EDB88320
Targets
-
-
Target
a15e9d2d69c1407ac5b42ba46d71fc58
-
Size
603KB
-
MD5
a15e9d2d69c1407ac5b42ba46d71fc58
-
SHA1
5a124a3a2f363bd3740ab792044d9a06dc4256d5
-
SHA256
7aa8eab2f01783bfe9bb7d8e051baebf563629645d73b2af42022d28a8143179
-
SHA512
f38eeae08e03f19339d03b01a271df14284bd22194887b492c24f6e4c89ef7b416507350cab6a5de8d90084519703b78cd844f35a54a4fa13b8643f0c6a395c5
-
SSDEEP
12288:R40XBrnlTCbI5ZBP5IePtqLn4yFeC+oT6ygF9b4elMuThmVF:e01tCbqNNPtqLn4yFmoEbdlH9mn
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Deletes itself
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-