General
-
Target
e555d685a5162bcef0f59a34a68ef819
-
Size
610KB
-
Sample
231222-tgk5xafah7
-
MD5
e555d685a5162bcef0f59a34a68ef819
-
SHA1
3ac8465d231841b93aeb4caeee56490c7e4748b8
-
SHA256
af4323d7f8b4626eaa5e110a3bfb59f1dd2b555cd7a5b801b667af80e306ff74
-
SHA512
ee9401e7341f5b2d14298b8332c03b9404535c0c3e2eb6286dd77bf01645334fb0765e16b49b0513b3983e727328200da29b33f64d175056ea7e331d2899f471
-
SSDEEP
12288:WBmHsnhar0nJ7FGY5HRYxC1mqiL40qFCWU7k/3U6yZNnXgW4UlUuTh1AG:WBmHgaUVFGAR11mTL40q/5GpXgUl/91h
Behavioral task
behavioral1
Sample
e555d685a5162bcef0f59a34a68ef819
Resource
ubuntu1804-amd64-20231215-en
Malware Config
Extracted
xorddos
http://www1.gggatat456.com/dd.rar
ppp.gggatat456.com:1522
ppp.xxxatat456.com:1522
-
crc_polynomial
EDB88320
Targets
-
-
Target
e555d685a5162bcef0f59a34a68ef819
-
Size
610KB
-
MD5
e555d685a5162bcef0f59a34a68ef819
-
SHA1
3ac8465d231841b93aeb4caeee56490c7e4748b8
-
SHA256
af4323d7f8b4626eaa5e110a3bfb59f1dd2b555cd7a5b801b667af80e306ff74
-
SHA512
ee9401e7341f5b2d14298b8332c03b9404535c0c3e2eb6286dd77bf01645334fb0765e16b49b0513b3983e727328200da29b33f64d175056ea7e331d2899f471
-
SSDEEP
12288:WBmHsnhar0nJ7FGY5HRYxC1mqiL40qFCWU7k/3U6yZNnXgW4UlUuTh1AG:WBmHgaUVFGAR11mTL40q/5GpXgUl/91h
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Deletes itself
-
Executes dropped EXE
-
Checks CPU configuration
Checks CPU information which indicate if the system is a virtual machine.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-