General

  • Target

    c49fa2869bac593226206beed59cf195

  • Size

    301KB

  • Sample

    231222-rvwgpabafj

  • MD5

    c49fa2869bac593226206beed59cf195

  • SHA1

    6bca760e29263c5aa1228059a9a2880da8764ac8

  • SHA256

    2154547c69bf8bee7f296bd8ce56ffa4115da65c2308e9fc6d5079b2eb9dec93

  • SHA512

    f645fe1f2700ce4b51119900a2b173490da594fc26da3269a519e992f93b92a0bb9d0f4fd04bbcadee7a0e828c981c32fb32be8c5ffbd1526d815da1e4e2e628

  • SSDEEP

    6144:2RNh8Nm0vWTFeeqy+UlH6wpmT1gVipVyhrV9FL3eyPrCimjQZJkey:6h8Nm0uTFe32awpmT1gEp+ay+pAI

Malware Config

Extracted

Family

xorddos

C2

103.25.9.245:8002

103.240.141.50:8002

66.102.253.30:8002

ndns.dsaj2a1.org:8002

ndns.dsaj2a.org:8002

ndns.hcxiaoao.com:8002

ndns.dsaj2a.com:8002

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      atrdadsrcc

    • Size

      659KB

    • MD5

      1d79488a09ef56ae2e60e1985b18e7a2

    • SHA1

      0b25e8f36a9738bb4d2dd2cd711f1aa7213db517

    • SHA256

      4aaa0b0d1ccb91b090df97a47b15536157f6f141cdce67867d339d0f01b3981d

    • SHA512

      b77fda07473e8f3e7ff2a1e25bb556164e3fddb40fe791a0b96538dfcc766f96c6e15082dccc77e79fff73f34497d0c43643134a633ff8740bbc4a287ec0c91b

    • SSDEEP

      12288:aBo9ETRNT9Wn1J0OhS18tDm8PCExfLZ9JCCpyvOH36ybCQ7YLVN1/lFkThVArw:aBo9ANo70OE8A8PCExfLZ/CTvQrKLd/Q

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Deletes itself

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

MITRE ATT&CK Enterprise v15

Tasks