Analysis
-
max time kernel
67s -
max time network
159s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231215-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
22-12-2023 16:01
Behavioral task
behavioral1
Sample
e555d685a5162bcef0f59a34a68ef819
Resource
ubuntu1804-amd64-20231215-en
General
-
Target
e555d685a5162bcef0f59a34a68ef819
-
Size
610KB
-
MD5
e555d685a5162bcef0f59a34a68ef819
-
SHA1
3ac8465d231841b93aeb4caeee56490c7e4748b8
-
SHA256
af4323d7f8b4626eaa5e110a3bfb59f1dd2b555cd7a5b801b667af80e306ff74
-
SHA512
ee9401e7341f5b2d14298b8332c03b9404535c0c3e2eb6286dd77bf01645334fb0765e16b49b0513b3983e727328200da29b33f64d175056ea7e331d2899f471
-
SSDEEP
12288:WBmHsnhar0nJ7FGY5HRYxC1mqiL40qFCWU7k/3U6yZNnXgW4UlUuTh1AG:WBmHgaUVFGAR11mTL40q/5GpXgUl/91h
Malware Config
Extracted
xorddos
http://www1.gggatat456.com/dd.rar
ppp.gggatat456.com:1522
ppp.xxxatat456.com:1522
-
crc_polynomial
EDB88320
Signatures
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload 9 IoCs
resource yara_rule behavioral1/files/fstream-5.dat family_xorddos behavioral1/files/fstream-6.dat family_xorddos behavioral1/files/fstream-8.dat family_xorddos behavioral1/files/fstream-9.dat family_xorddos behavioral1/files/fstream-10.dat family_xorddos behavioral1/files/fstream-11.dat family_xorddos behavioral1/files/fstream-12.dat family_xorddos behavioral1/files/fstream-14.dat family_xorddos behavioral1/files/fstream-15.dat family_xorddos -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes itself 1 IoCs
pid 1658 -
Executes dropped EXE 15 IoCs
ioc pid Process /usr/bin/igyvhiqzsv 1570 igyvhiqzsv /usr/bin/igyvhiqzsv 1576 igyvhiqzsv /usr/bin/igyvhiqzsv 1579 igyvhiqzsv /usr/bin/igyvhiqzsv 1582 igyvhiqzsv /usr/bin/igyvhiqzsv 1585 igyvhiqzsv /usr/bin/rwmjdzxgmh 1608 rwmjdzxgmh /usr/bin/rwmjdzxgmh 1611 rwmjdzxgmh /usr/bin/rwmjdzxgmh 1614 rwmjdzxgmh /usr/bin/rwmjdzxgmh 1616 rwmjdzxgmh /usr/bin/rwmjdzxgmh 1620 rwmjdzxgmh /usr/bin/uetmvsqpkv 1623 uetmvsqpkv /usr/bin/uetmvsqpkv 1626 uetmvsqpkv /usr/bin/uetmvsqpkv 1629 uetmvsqpkv /usr/bin/uetmvsqpkv 1632 uetmvsqpkv /usr/bin/uetmvsqpkv 1635 uetmvsqpkv -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc File opened for reading /proc/cpuinfo -
Creates/modifies Cron job 1 TTPs 2 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /etc/cron.hourly/gcc.sh Process not Found File opened for modification /etc/crontab sh -
description ioc File opened for modification /etc/init.d/e555d685a5162bcef0f59a34a68ef819 -
Write file to user bin folder 1 TTPs 4 IoCs
description ioc File opened for modification /usr/bin/igyvhiqzsv File opened for modification /usr/bin/rwmjdzxgmh File opened for modification /usr/bin/uetmvsqpkv File opened for modification /usr/bin/waztpfnlku -
Reads runtime system information 10 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/filesystems systemctl File opened for reading /proc/sys/kernel/osrelease systemctl File opened for reading /proc/1/sched systemctl File opened for reading /proc/meminfo Process not Found File opened for reading /proc/1/environ systemctl File opened for reading /proc/cmdline systemctl File opened for reading /proc/rs_dev Process not Found File opened for reading /proc/filesystems sed File opened for reading /proc/stat Process not Found File opened for reading /proc/self/stat systemctl
Processes
-
/tmp/e555d685a5162bcef0f59a34a68ef819/tmp/e555d685a5162bcef0f59a34a68ef8191⤵PID:1557
-
/bin/shsh -c "sed -i '/\\/etc\\/cron.hourly\\/gcc.sh/d' /etc/crontab && echo '*/3 * * * * root /etc/cron.hourly/gcc.sh' >> /etc/crontab"1⤵
- Creates/modifies Cron job
PID:1563 -
/bin/sedsed -i "/\\/etc\\/cron.hourly\\/gcc.sh/d" /etc/crontab2⤵
- Reads runtime system information
PID:1564
-
-
/bin/chkconfigchkconfig --add e555d685a5162bcef0f59a34a68ef8191⤵PID:1560
-
/sbin/chkconfigchkconfig --add e555d685a5162bcef0f59a34a68ef8191⤵PID:1560
-
/usr/bin/chkconfigchkconfig --add e555d685a5162bcef0f59a34a68ef8191⤵PID:1560
-
/usr/sbin/chkconfigchkconfig --add e555d685a5162bcef0f59a34a68ef8191⤵PID:1560
-
/usr/local/bin/chkconfigchkconfig --add e555d685a5162bcef0f59a34a68ef8191⤵PID:1560
-
/usr/local/sbin/chkconfigchkconfig --add e555d685a5162bcef0f59a34a68ef8191⤵PID:1560
-
/usr/X11R6/bin/chkconfigchkconfig --add e555d685a5162bcef0f59a34a68ef8191⤵PID:1560
-
/bin/update-rc.dupdate-rc.d e555d685a5162bcef0f59a34a68ef819 defaults1⤵PID:1562
-
/sbin/update-rc.dupdate-rc.d e555d685a5162bcef0f59a34a68ef819 defaults1⤵PID:1562
-
/usr/bin/update-rc.dupdate-rc.d e555d685a5162bcef0f59a34a68ef819 defaults1⤵PID:1562
-
/usr/sbin/update-rc.dupdate-rc.d e555d685a5162bcef0f59a34a68ef819 defaults1⤵PID:1562
-
/bin/systemctlsystemctl daemon-reload2⤵
- Reads runtime system information
PID:1569
-
-
/usr/bin/igyvhiqzsv/usr/bin/igyvhiqzsv pwd 15581⤵
- Executes dropped EXE
PID:1570
-
/usr/bin/igyvhiqzsv/usr/bin/igyvhiqzsv ls 15581⤵
- Executes dropped EXE
PID:1576
-
/usr/bin/igyvhiqzsv/usr/bin/igyvhiqzsv "echo \"find\"" 15581⤵
- Executes dropped EXE
PID:1579
-
/usr/bin/igyvhiqzsv/usr/bin/igyvhiqzsv ifconfig 15581⤵
- Executes dropped EXE
PID:1582
-
/usr/bin/igyvhiqzsv/usr/bin/igyvhiqzsv "ls -la" 15581⤵
- Executes dropped EXE
PID:1585
-
/usr/bin/rwmjdzxgmh/usr/bin/rwmjdzxgmh gnome-terminal 15581⤵
- Executes dropped EXE
PID:1608
-
/usr/bin/rwmjdzxgmh/usr/bin/rwmjdzxgmh "netstat -antop" 15581⤵
- Executes dropped EXE
PID:1611
-
/usr/bin/rwmjdzxgmh/usr/bin/rwmjdzxgmh "ps -ef" 15581⤵
- Executes dropped EXE
PID:1614
-
/usr/bin/rwmjdzxgmh/usr/bin/rwmjdzxgmh "grep \"A\"" 15581⤵
- Executes dropped EXE
PID:1616
-
/usr/bin/rwmjdzxgmh/usr/bin/rwmjdzxgmh "sleep 1" 15581⤵
- Executes dropped EXE
PID:1620
-
/usr/bin/uetmvsqpkv/usr/bin/uetmvsqpkv sh 15581⤵
- Executes dropped EXE
PID:1623
-
/usr/bin/uetmvsqpkv/usr/bin/uetmvsqpkv "grep \"A\"" 15581⤵
- Executes dropped EXE
PID:1626
-
/usr/bin/uetmvsqpkv/usr/bin/uetmvsqpkv "ifconfig eth0" 15581⤵
- Executes dropped EXE
PID:1629
-
/usr/bin/uetmvsqpkv/usr/bin/uetmvsqpkv su 15581⤵
- Executes dropped EXE
PID:1632
-
/usr/bin/uetmvsqpkv/usr/bin/uetmvsqpkv "echo \"find\"" 15581⤵
- Executes dropped EXE
PID:1635
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228B
MD53bab747cedc5f0ebe86aaa7f982470cd
SHA13c7d1c6931c2b3dae39d38346b780ea57c8e6142
SHA25674d31cac40d98ee64df2a0c29ceb229d12ac5fa699c2ee512fc69360f0cf68c5
SHA51221e8a6d9ca8531d37def83d8903e5b0fa11ecf33d85d05edab1e0feb4acac65ae2cf5222650fb9f533f459ccc51bb2903276ff6f827b847cc5e6dac7d45a0a42
-
Filesize
425B
MD516b226c32df19063771b0b8461d3506a
SHA19508c11c7d9576a2de679398277c806c8dc35061
SHA256cc03a7905925bd8c1ee1facf97e61312629faa822d033bf2306934013ff5e0b8
SHA512a8ecee2f0464e51ec58f4a2b62d117986b52a8b06feeb542628674e3825f6531946ca4d9cd67a0b2bb42c339ed55b35befc6fb432145602a57f473285bd1b688
-
Filesize
722B
MD58f111d100ea459f68d333d63a8ef2205
SHA1077ca9c46a964de67c0f7765745d5c6f9e2065c3
SHA2560e5c204385b21e15b031c83f37212bf5a4ee77b51762b7b54bd6ad973ebdf354
SHA512d81767b47fb84aaf435f930356ded574ee9825ec710a2e7c26074860d8a385741d65572740137b6f9686c285a32e2951ca933393b266746988f1737aad059adb
-
Filesize
173KB
MD5a85f9a2ef3ace861f3646ec05f3dd269
SHA1679ce0b2044385ca853a9f0ac8dc9deb611285e0
SHA25602c68213ea34ac220f148334209dc11244a175b29c26dd2b3579908668c3895c
SHA512e8c0b86509f0ae600323bb4b2c88377726297cd5ede9fd88b65f649ba3b2eeb06ead1a13c61a13d4d5b5dff80dd8f35768a506edbf7cc9e2e660788adbdff468
-
Filesize
32B
MD54af65dc370f5066eb6dce1898321321a
SHA18249452de17ab582ab5395d74e4fe83f1c11209c
SHA2567255e5aaadeec13a193d23f1a42c284bac490b832894fab9a1c34a23f872652a
SHA51252d8457180ab14bf192dcf37b219dc8c81052b7de49746901e4af42899ebbb0b8cb4fe255271737dfc7bbbdd3f266d56e31d8c9f91fea2fbf029032e8c55d9ce
-
Filesize
195KB
MD5e1166796713d0e33a3a06d8b001a1a65
SHA197f1edda5177ecc2e8e0f3a9481e631354a9b84d
SHA2563e521543db00ddf93e2f1dccc1257c75221ee5a7c9fb02c8220489908c9faa2d
SHA512674219492f2fff388dbfd5c61bf8def92f002d6fa827f020a158a8d2589737235ec8136b97661f7262d783028c7bf2aae4850434d17a3d9d59dc9043a998f632
-
Filesize
610KB
MD5739ba57d17be5514f713f3eb5106f539
SHA11b06cf5346fdb870714fe1df4a9251f2871a6472
SHA2560a75e0362f06b11546983d34d2283f8d7c067bfaebaa40364c533050e84c8bc7
SHA512debbcd79baa4f451cf864a89a50828f8bd8a6c709980856094ef4470ede8fd3f2336444748f9ab334a34664fd06d523d611cffb8fa0971e66ba24874d62b5403
-
Filesize
610KB
MD575175484d3d911c21e88dec3020a190f
SHA1a8802fd921c32ef4d88efdad10030ee7e0e092c0
SHA256171e029c3a5c1075558c081b286b56440db822b21a7f7cec162d844515593aaf
SHA5124fea2e21b6a98c1c3553e5a81b52775e4946dc3953b8a4130ca44bd87ef5fe788e09435577b5b29b50da814016cc1ec63088d736ebe9080ebeb1e104337cf232
-
Filesize
610KB
MD5e555d685a5162bcef0f59a34a68ef819
SHA13ac8465d231841b93aeb4caeee56490c7e4748b8
SHA256af4323d7f8b4626eaa5e110a3bfb59f1dd2b555cd7a5b801b667af80e306ff74
SHA512ee9401e7341f5b2d14298b8332c03b9404535c0c3e2eb6286dd77bf01645334fb0765e16b49b0513b3983e727328200da29b33f64d175056ea7e331d2899f471
-
Filesize
610KB
MD54c2e79d641e87805ec8885c0e778cee1
SHA1192cf1098d241598381282e8f14b17aac011a232
SHA2560e1915eff3e268fe2874a8c97ce99cfaf6530206493ac146bb419b121488af64
SHA5122bc23c69b261402dafddd0be26ecf33d4b320a5f95c345ab7c7bf872483a23791de545277cd28815b8288d0c73b58a5a5bd64291c96c562971d29f97357c1dc6
-
Filesize
610KB
MD5f048975deb6097c0750321d61dbf141a
SHA14b89e160cacb98fb6cd91d8ca9ff4baafada387e
SHA256eed036a879f629ef99878882d1386f762b18e8db55f40932a925bf25f8539b4b
SHA512da803f478105f67b6bea768c58a34d09f925586dcbc46e12807911fedca1f6d7acd23651f585471241caae5c60cd529c4bbcc624b05cd3d55ae6c6fe8bc71320
-
Filesize
610KB
MD533b68de6d23700e77143938a969511bd
SHA16227227af08305459a86822e3734da62dc997311
SHA256f42a9b436160482d8da32eadc3fa343508f35c60791f47b22685bde43452e447
SHA512ffa8b6ba6cec71d6aa3eeecc94512c295543ee24fd9ab3ca9786f5ba4f2042a9f86b3f4020875628ebd31a7620ffd3c51dbbb02708f28de3de2057002cffa690
-
Filesize
610KB
MD599f16af65973a7e08988d694290c64bb
SHA11d58bd1d7beddf88054473a90835310ea01ad643
SHA256a1eb4bc22212208c92299cf708443648495c682f58a4d4d0207d03bac38cd7b4
SHA512123a3f1e4680be3d4b7efda028ddfe7ba895e243bb7c4e6e5c60c7072e10eec130508db5dc0c9553e4aa396cbf468c37075b4c3da95cc007c799e1c427598920