Analysis
-
max time kernel
155s -
max time network
160s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231215-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
22-12-2023 14:10
Behavioral task
behavioral1
Sample
b90f98a1de56b02687d6b719646ce12a
Resource
ubuntu1804-amd64-20231215-en
General
-
Target
b90f98a1de56b02687d6b719646ce12a
-
Size
544KB
-
MD5
b90f98a1de56b02687d6b719646ce12a
-
SHA1
e2cd4662a8885a350dcb5c0ea38e7ee377cd3aff
-
SHA256
6814a4bbe0b6078dc04a4144e8017a50c3a453793e01cb3ae3440c575876ba6a
-
SHA512
e5fab8a263ec7ed03ee4b5d110aa8e2985dcc81691cb2939830df0b472c2a4b0d4c7e524bccaf0a111211d150eff8711807a9787c4bd23677d4529340fff6db0
-
SSDEEP
12288:dMt0ECI+AnmBeGHOkVZAG2/2//PXaIWtpm6y92u:atPCIN7G/VZAp/2//fa7po
Malware Config
Extracted
xorddos
-
crc_polynomial
CDB88320
Signatures
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload 2 IoCs
resource yara_rule behavioral1/files/fstream-23.dat family_xorddos behavioral1/files/fstream-47.dat family_xorddos -
Deletes itself 32 IoCs
pid 1557 1570 1573 1576 1579 1581 1585 1588 1591 1594 1596 1600 1603 1606 1609 1611 1615 1618 1621 1624 1626 1630 1633 1636 1639 1641 1646 1650 1653 1656 1658 1662 -
Executes dropped EXE 32 IoCs
ioc pid Process /bin/kchwyvh 1560 kchwyvh /bin/qoezastzyk 1568 qoezastzyk /bin/pojbeledr 1571 pojbeledr /bin/fmubhelkclub 1574 fmubhelkclub /bin/yvnazlayd 1577 yvnazlayd /bin/iewvizoogaiki 1580 iewvizoogaiki /bin/bmowawdd 1583 bmowawdd /bin/slgtispo 1586 slgtispo /bin/dpofzwwhtcnd 1589 dpofzwwhtcnd /bin/duzxkpupekw 1592 duzxkpupekw /bin/umawcdedwg 1595 umawcdedwg /bin/trvmddfz 1598 trvmddfz /bin/smdrxlxb 1601 smdrxlxb /bin/dkqlqbzczeg 1604 dkqlqbzczeg /bin/axlmbrrctlrx 1607 axlmbrrctlrx /bin/okapwguhwfxyg 1610 okapwguhwfxyg /bin/ebkhqv 1613 ebkhqv /bin/tqcamhamobmbl 1616 tqcamhamobmbl /bin/oqanysg 1619 oqanysg /bin/enmoue 1622 enmoue /bin/joulcmlrmgywkl 1625 joulcmlrmgywkl /bin/nmvuren 1628 nmvuren /bin/nezhixk 1631 nezhixk /bin/metvgbifyhyq 1634 metvgbifyhyq /bin/vxshuobyddlhd 1637 vxshuobyddlhd /bin/scftojml 1640 scftojml /bin/rxphjdsazwzzzw 1645 rxphjdsazwzzzw /bin/euzsdppvy 1648 euzsdppvy /bin/wiqshprgfx 1651 wiqshprgfx /bin/hphwhdwietz 1654 hphwhdwietz /bin/uwdrhhyydipxq 1657 uwdrhhyydipxq /bin/jonobk 1660 jonobk -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc File opened for modification /etc/cron.hourly/hvywhck.sh -
description ioc File opened for modification /etc/init.d/hvywhck -
Writes file to system bin folder 1 TTPs 35 IoCs
description ioc File opened for modification /bin/bmowawdd File opened for modification /bin/scftojml File opened for modification /bin/uwdrhhyydipxq File opened for modification /bin/hvywhck File opened for modification /bin/pojbeledr File opened for modification /bin/fmubhelkclub File opened for modification /bin/euzsdppvy File opened for modification /bin/kchwyvh File opened for modification /bin/axlmbrrctlrx File opened for modification /bin/nezhixk File opened for modification /bin/oqanysg File opened for modification /bin/enmoue File opened for modification /bin/vxshuobyddlhd File opened for modification /bin/iewvizoogaiki File opened for modification /bin/slgtispo File opened for modification /bin/smdrxlxb File opened for modification /bin/joulcmlrmgywkl File opened for modification /bin/hvywhck.sh File opened for modification /bin/yvnazlayd File opened for modification /bin/dpofzwwhtcnd File opened for modification /bin/tsmipnonckkom File opened for modification /bin/nmvuren File opened for modification /bin/rxphjdsazwzzzw File opened for modification /bin/hphwhdwietz File opened for modification /bin/jonobk File opened for modification /bin/qoezastzyk File opened for modification /bin/dkqlqbzczeg File opened for modification /bin/wiqshprgfx File opened for modification /bin/ebkhqv File opened for modification /bin/tqcamhamobmbl File opened for modification /bin/metvgbifyhyq File opened for modification /bin/duzxkpupekw File opened for modification /bin/umawcdedwg File opened for modification /bin/trvmddfz File opened for modification /bin/okapwguhwfxyg -
Writes file to shm directory 2 IoCs
Malware can drop malicious files in the shm directory which will run directly from RAM.
description ioc File opened for modification /dev/shm/sem.tomsar File opened for modification /dev/shm/sem.VuJeYI
Processes
-
/tmp/b90f98a1de56b02687d6b719646ce12a/tmp/b90f98a1de56b02687d6b719646ce12a1⤵PID:1556
-
/bin/kchwyvh/bin/kchwyvh1⤵
- Executes dropped EXE
PID:1560
-
/bin/qoezastzyk/bin/qoezastzyk -d 15611⤵
- Executes dropped EXE
PID:1568
-
/bin/pojbeledr/bin/pojbeledr -d 15611⤵
- Executes dropped EXE
PID:1571
-
/bin/fmubhelkclub/bin/fmubhelkclub -d 15611⤵
- Executes dropped EXE
PID:1574
-
/bin/yvnazlayd/bin/yvnazlayd -d 15611⤵
- Executes dropped EXE
PID:1577
-
/bin/iewvizoogaiki/bin/iewvizoogaiki -d 15611⤵
- Executes dropped EXE
PID:1580
-
/bin/bmowawdd/bin/bmowawdd -d 15611⤵
- Executes dropped EXE
PID:1583
-
/bin/slgtispo/bin/slgtispo -d 15611⤵
- Executes dropped EXE
PID:1586
-
/bin/dpofzwwhtcnd/bin/dpofzwwhtcnd -d 15611⤵
- Executes dropped EXE
PID:1589
-
/bin/duzxkpupekw/bin/duzxkpupekw -d 15611⤵
- Executes dropped EXE
PID:1592
-
/bin/umawcdedwg/bin/umawcdedwg -d 15611⤵
- Executes dropped EXE
PID:1595
-
/bin/trvmddfz/bin/trvmddfz -d 15611⤵
- Executes dropped EXE
PID:1598
-
/bin/smdrxlxb/bin/smdrxlxb -d 15611⤵
- Executes dropped EXE
PID:1601
-
/bin/dkqlqbzczeg/bin/dkqlqbzczeg -d 15611⤵
- Executes dropped EXE
PID:1604
-
/bin/axlmbrrctlrx/bin/axlmbrrctlrx -d 15611⤵
- Executes dropped EXE
PID:1607
-
/bin/okapwguhwfxyg/bin/okapwguhwfxyg -d 15611⤵
- Executes dropped EXE
PID:1610
-
/bin/ebkhqv/bin/ebkhqv -d 15611⤵
- Executes dropped EXE
PID:1613
-
/bin/tqcamhamobmbl/bin/tqcamhamobmbl -d 15611⤵
- Executes dropped EXE
PID:1616
-
/bin/oqanysg/bin/oqanysg -d 15611⤵
- Executes dropped EXE
PID:1619
-
/bin/enmoue/bin/enmoue -d 15611⤵
- Executes dropped EXE
PID:1622
-
/bin/joulcmlrmgywkl/bin/joulcmlrmgywkl -d 15611⤵
- Executes dropped EXE
PID:1625
-
/bin/nmvuren/bin/nmvuren -d 15611⤵
- Executes dropped EXE
PID:1628
-
/bin/nezhixk/bin/nezhixk -d 15611⤵
- Executes dropped EXE
PID:1631
-
/bin/metvgbifyhyq/bin/metvgbifyhyq -d 15611⤵
- Executes dropped EXE
PID:1634
-
/bin/vxshuobyddlhd/bin/vxshuobyddlhd -d 15611⤵
- Executes dropped EXE
PID:1637
-
/bin/scftojml/bin/scftojml -d 15611⤵
- Executes dropped EXE
PID:1640
-
/bin/rxphjdsazwzzzw/bin/rxphjdsazwzzzw -d 15611⤵
- Executes dropped EXE
PID:1645
-
/bin/euzsdppvy/bin/euzsdppvy -d 15611⤵
- Executes dropped EXE
PID:1648
-
/bin/wiqshprgfx/bin/wiqshprgfx -d 15611⤵
- Executes dropped EXE
PID:1651
-
/bin/hphwhdwietz/bin/hphwhdwietz -d 15611⤵
- Executes dropped EXE
PID:1654
-
/bin/uwdrhhyydipxq/bin/uwdrhhyydipxq -d 15611⤵
- Executes dropped EXE
PID:1657
-
/bin/jonobk/bin/jonobk -d 15611⤵
- Executes dropped EXE
PID:1660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544KB
MD5dd75d2ea0e3146317c1805279f3ec54d
SHA1a7844c09dd5ca901bf0f151dff1c56616e6904f9
SHA25689708c816f7498915a7c738387f0f820a7cbfc69d10e78207f398132fca8690e
SHA512a018561a4044c4cac4d39dd2cb60e65d839efdb22c59b13ae7d8cbe77321514d9527bd9c61e7af328d3a7e7f2ffc3f240806f70649217171bf9f3cb238f76e15
-
Filesize
424KB
MD586b658c0c7dd02bb95a70472da86c792
SHA1391cf8ba853b37011b2be934f920858cdb7fb7fa
SHA2568bfac8bc3a3102fdcc4d2c0c65751b905212a6804f0142fe2f3577dd73aa2f97
SHA512f858f7bd419613c0c0131dd8207e82b3b736ea589cf7f8c1aa78757d04f027c5f0832a7eaa1816d8fa5c546cc6678bb2237de89659c3ef436cb25d1be5d440df