Resubmissions

10-01-2024 09:22

240110-lb7gysdfd5 10

02-01-2024 22:09

240102-1262fabeej 10

02-01-2024 20:59

240102-zsqsesebc6 10

General

  • Target

    BFtZ.bin

  • Size

    535KB

  • Sample

    240110-lb7gysdfd5

  • MD5

    35793cbfd0a4376ea9380ffed9182334

  • SHA1

    31e5d905407966ca953def90eb45df417127cf38

  • SHA256

    303bb187a06415eedc0c5ece5692fe05b03e286435472d0e4fd4ca9386d9acf4

  • SHA512

    89fc15518e82cb7c7f97acb433a1881612d404585b5228e4554a3f9e58c3db7e9a057f669d98c11c10cf3dd5e73b48a9ebf2b983319eae709d9751f21dfaaf4a

  • SSDEEP

    12288:4Ufrcn+vwK5ripVU4tdZ1pNL/pVbz266ySjQn36Eoj:/fUywKQ7Fb1pNL/p52fjQn36Eu

Malware Config

Extracted

Family

xorddos

C2

http://aa.hostasa.org/config.rar

ppp.gggatat456.com:1522

ppp.xxxatat456.com:1522

www1.gggatat456.com:1522

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      BFtZ.bin

    • Size

      535KB

    • MD5

      35793cbfd0a4376ea9380ffed9182334

    • SHA1

      31e5d905407966ca953def90eb45df417127cf38

    • SHA256

      303bb187a06415eedc0c5ece5692fe05b03e286435472d0e4fd4ca9386d9acf4

    • SHA512

      89fc15518e82cb7c7f97acb433a1881612d404585b5228e4554a3f9e58c3db7e9a057f669d98c11c10cf3dd5e73b48a9ebf2b983319eae709d9751f21dfaaf4a

    • SSDEEP

      12288:4Ufrcn+vwK5ripVU4tdZ1pNL/pVbz266ySjQn36Eoj:/fUywKQ7Fb1pNL/p52fjQn36Eu

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Executes dropped EXE

    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

1
T1574

Privilege Escalation

Scheduled Task/Job

1
T1053

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

1
T1574

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Hijack Execution Flow

1
T1574

Discovery

Virtualization/Sandbox Evasion

1
T1497

Network Service Discovery

1
T1046

Tasks