General
-
Target
c49fa2869bac593226206beed59cf195
-
Size
301KB
-
Sample
231222-rvwgpabafj
-
MD5
c49fa2869bac593226206beed59cf195
-
SHA1
6bca760e29263c5aa1228059a9a2880da8764ac8
-
SHA256
2154547c69bf8bee7f296bd8ce56ffa4115da65c2308e9fc6d5079b2eb9dec93
-
SHA512
f645fe1f2700ce4b51119900a2b173490da594fc26da3269a519e992f93b92a0bb9d0f4fd04bbcadee7a0e828c981c32fb32be8c5ffbd1526d815da1e4e2e628
-
SSDEEP
6144:2RNh8Nm0vWTFeeqy+UlH6wpmT1gVipVyhrV9FL3eyPrCimjQZJkey:6h8Nm0uTFe32awpmT1gEp+ay+pAI
Behavioral task
behavioral1
Sample
atrdadsrcc
Resource
ubuntu1804-amd64-20231215-en
Malware Config
Extracted
xorddos
103.25.9.245:8002
103.240.141.50:8002
66.102.253.30:8002
ndns.dsaj2a1.org:8002
ndns.dsaj2a.org:8002
ndns.hcxiaoao.com:8002
ndns.dsaj2a.com:8002
-
crc_polynomial
EDB88320
Targets
-
-
Target
atrdadsrcc
-
Size
659KB
-
MD5
1d79488a09ef56ae2e60e1985b18e7a2
-
SHA1
0b25e8f36a9738bb4d2dd2cd711f1aa7213db517
-
SHA256
4aaa0b0d1ccb91b090df97a47b15536157f6f141cdce67867d339d0f01b3981d
-
SHA512
b77fda07473e8f3e7ff2a1e25bb556164e3fddb40fe791a0b96538dfcc766f96c6e15082dccc77e79fff73f34497d0c43643134a633ff8740bbc4a287ec0c91b
-
SSDEEP
12288:aBo9ETRNT9Wn1J0OhS18tDm8PCExfLZ9JCCpyvOH36ybCQ7YLVN1/lFkThVArw:aBo9ANo70OE8A8PCExfLZ/CTvQrKLd/Q
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Deletes itself
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks CPU configuration
Checks CPU information which indicate if the system is a virtual machine.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-