Analysis
-
max time kernel
154s -
max time network
159s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231215-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
31-01-2024 12:12
Behavioral task
behavioral1
Sample
clcghvuyu
Resource
ubuntu1804-amd64-20231215-en
General
-
Target
clcghvuyu
-
Size
549KB
-
MD5
c57833b58d55d499ef46663216a196d6
-
SHA1
f9c5672d95b40c4c4ed68269c3b55035aa29d830
-
SHA256
ae30644277ee1b1352839d218becb0f4cc18dedc62615600ab8c57a01ba5753c
-
SHA512
1b9f920ad78813c5aaf1a2345439e8630033582568a2dadf9665c183b7a1c8a7cd08212a86568ab41dcc94c958ee092d76d53836c085ce988c2e4f154cbf9e55
-
SSDEEP
12288:VeRvuKqiVZ4En5drNK0pPEfJKlHZ8mG97Qxee6yzmxi:VIv/qiVNHNDEfJKHZ8mG9QeeOi
Malware Config
Extracted
xorddos
p5.2017fly.com:53
p5.2017fly.com:80
p5.2018fly.com:53
p5.2018fly.com:80
p5.sb1024.net:53
p5.sb1024.net:80
http://fuck.2017fly.com/i.php
-
crc_polynomial
CDB88320
Signatures
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload 2 IoCs
Processes:
resource yara_rule /tmp/uyuvhgclc family_xorddos /bin/uesvptaa family_xorddos -
Deletes itself 34 IoCs
Processes:
pid 1568 1574 1577 1580 1582 1586 1589 1592 1595 1597 1602 1604 1608 1610 1613 1618 1620 1624 1627 1629 1636 1639 1642 1645 1647 1651 1653 1656 1660 1662 1668 1671 1673 1676 -
Executes dropped EXE 35 IoCs
Processes:
wjnwiuzdulthwjepjwqpiupuaheiwxtkplspneivcollddvxcfowhycqwtslrhisxsksjkggvpweewrpngoygjuptmoxgozrygyygapmbsuxfducokinrisekiqefydlauzborlzuibiujxmtsxkcnohozfotiulriludjwreuesvptaakrygwjenpdrjyfhayayajcgnnhcespjcdjgvhtdgxmhnghlgqnpfjirygadlljucntfvstefamhscunrvqxsmrjjwcmrcwrawuclzgfoxagxeopqagdmabfeyyhwuifymzdhdgvljywtcxizzrjudmpfgxfuwbqzmbzjvdndqqkgioc pid process /bin/wjnwiuzdulthwj 1566 wjnwiuzdulthwj /bin/epjwqpiu 1572 epjwqpiu /bin/puaheiwx 1575 puaheiwx /bin/tkplspneivcoll 1578 tkplspneivcoll /bin/ddvxcfowhycqw 1581 ddvxcfowhycqw /bin/tslrhisxsks 1584 tslrhisxsks /bin/jkggvpweew 1587 jkggvpweew /bin/rpngoy 1590 rpngoy /bin/gjuptmo 1593 gjuptmo /bin/xgozrygy 1596 xgozrygy /bin/ygapmbsu 1600 ygapmbsu /bin/xfducokinrise 1603 xfducokinrise /bin/kiqefydlauzbo 1606 kiqefydlauzbo /bin/rlzuibiujxmt 1609 rlzuibiujxmt /bin/sxkcnoho 1612 sxkcnoho /bin/zfotiu 1616 zfotiu /bin/lriludjwre 1619 lriludjwre /bin/uesvptaa 1622 uesvptaa /bin/krygwjenpdrj 1625 krygwjenpdrj /bin/yfhaya 1628 yfhaya /bin/yajcgnnhcesp 1634 yajcgnnhcesp /bin/jcdjgvht 1637 jcdjgvht /bin/dgxmhnghlgqnpf 1640 dgxmhnghlgqnpf /bin/jirygadllj 1643 jirygadllj /bin/ucntfvstefam 1646 ucntfvstefam /bin/hscunrvqx 1649 hscunrvqx /bin/smrjjwcm 1652 smrjjwcm /bin/rcwrawu 1655 rcwrawu /bin/clzgfoxagxeopq 1658 clzgfoxagxeopq /bin/agdmabfeyyhwui 1661 agdmabfeyyhwui /bin/fymzdhdgvljywt 1666 fymzdhdgvljywt /bin/cxizzrjudmp 1669 cxizzrjudmp /bin/fgxfuw 1672 fgxfuw /bin/bqzmbzjv 1675 bqzmbzjv /bin/dndqqkg 1678 dndqqkg -
Unexpected DNS network traffic destination 64 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
Processes:
description ioc File opened for modification /etc/cron.hourly/uyuvhgclc.sh -
Processes:
description ioc File opened for modification /etc/init.d/uyuvhgclc -
Writes file to system bin folder 1 TTPs 35 IoCs
Processes:
description ioc File opened for modification /bin/ddvxcfowhycqw File opened for modification /bin/clzgfoxagxeopq File opened for modification /bin/smrjjwcm File opened for modification /bin/agdmabfeyyhwui File opened for modification /bin/tkplspneivcoll File opened for modification /bin/xfducokinrise File opened for modification /bin/kiqefydlauzbo File opened for modification /bin/rlzuibiujxmt File opened for modification /bin/yajcgnnhcesp File opened for modification /bin/yfhaya File opened for modification /bin/jcdjgvht File opened for modification /bin/fgxfuw File opened for modification /bin/tslrhisxsks File opened for modification /bin/jkggvpweew File opened for modification /bin/xgozrygy File opened for modification /bin/sxkcnoho File opened for modification /bin/zfotiu File opened for modification /bin/gjuptmo File opened for modification /bin/jirygadllj File opened for modification /bin/ucntfvstefam File opened for modification /bin/rcwrawu File opened for modification /bin/wjnwiuzdulthwj File opened for modification /bin/krygwjenpdrj File opened for modification /bin/dndqqkg File opened for modification /bin/puaheiwx File opened for modification /bin/ygapmbsu File opened for modification /bin/uesvptaa File opened for modification /bin/cxizzrjudmp File opened for modification /bin/fymzdhdgvljywt File opened for modification /bin/bqzmbzjv File opened for modification /bin/epjwqpiu File opened for modification /bin/rpngoy File opened for modification /bin/lriludjwre File opened for modification /bin/dgxmhnghlgqnpf File opened for modification /bin/hscunrvqx -
Writes file to shm directory 2 IoCs
Malware can drop malicious files in the shm directory which will run directly from RAM.
Processes:
description ioc File opened for modification /dev/shm/sem.nvuwfs File opened for modification /dev/shm/sem.jYFQYe -
Writes file to tmp directory 2 IoCs
Malware often drops required files in the /tmp directory.
Processes:
description ioc File opened for modification /tmp/uyuvhgclc File opened for modification /tmp/uyuvhgclc.sh
Processes
-
/tmp/clcghvuyu/tmp/clcghvuyu1⤵PID:1561
-
/bin/wjnwiuzdulthwj/bin/wjnwiuzdulthwj -d 15621⤵
- Executes dropped EXE
PID:1566
-
/bin/epjwqpiu/bin/epjwqpiu -d 15621⤵
- Executes dropped EXE
PID:1572
-
/bin/puaheiwx/bin/puaheiwx -d 15621⤵
- Executes dropped EXE
PID:1575
-
/bin/tkplspneivcoll/bin/tkplspneivcoll -d 15621⤵
- Executes dropped EXE
PID:1578
-
/bin/ddvxcfowhycqw/bin/ddvxcfowhycqw -d 15621⤵
- Executes dropped EXE
PID:1581
-
/bin/tslrhisxsks/bin/tslrhisxsks -d 15621⤵
- Executes dropped EXE
PID:1584
-
/bin/jkggvpweew/bin/jkggvpweew -d 15621⤵
- Executes dropped EXE
PID:1587
-
/bin/rpngoy/bin/rpngoy -d 15621⤵
- Executes dropped EXE
PID:1590
-
/bin/gjuptmo/bin/gjuptmo -d 15621⤵
- Executes dropped EXE
PID:1593
-
/bin/xgozrygy/bin/xgozrygy -d 15621⤵
- Executes dropped EXE
PID:1596
-
/bin/ygapmbsu/bin/ygapmbsu -d 15621⤵
- Executes dropped EXE
PID:1600
-
/bin/xfducokinrise/bin/xfducokinrise -d 15621⤵
- Executes dropped EXE
PID:1603
-
/bin/kiqefydlauzbo/bin/kiqefydlauzbo -d 15621⤵
- Executes dropped EXE
PID:1606
-
/bin/rlzuibiujxmt/bin/rlzuibiujxmt -d 15621⤵
- Executes dropped EXE
PID:1609
-
/bin/sxkcnoho/bin/sxkcnoho -d 15621⤵
- Executes dropped EXE
PID:1612
-
/bin/zfotiu/bin/zfotiu -d 15621⤵
- Executes dropped EXE
PID:1616
-
/bin/lriludjwre/bin/lriludjwre -d 15621⤵
- Executes dropped EXE
PID:1619
-
/bin/uesvptaa/bin/uesvptaa -d 15621⤵
- Executes dropped EXE
PID:1622
-
/bin/krygwjenpdrj/bin/krygwjenpdrj -d 15621⤵
- Executes dropped EXE
PID:1625
-
/bin/yfhaya/bin/yfhaya -d 15621⤵
- Executes dropped EXE
PID:1628
-
/bin/yajcgnnhcesp/bin/yajcgnnhcesp -d 15621⤵
- Executes dropped EXE
PID:1634
-
/bin/jcdjgvht/bin/jcdjgvht -d 15621⤵
- Executes dropped EXE
PID:1637
-
/bin/dgxmhnghlgqnpf/bin/dgxmhnghlgqnpf -d 15621⤵
- Executes dropped EXE
PID:1640
-
/bin/jirygadllj/bin/jirygadllj -d 15621⤵
- Executes dropped EXE
PID:1643
-
/bin/ucntfvstefam/bin/ucntfvstefam -d 15621⤵
- Executes dropped EXE
PID:1646
-
/bin/hscunrvqx/bin/hscunrvqx -d 15621⤵
- Executes dropped EXE
PID:1649
-
/bin/smrjjwcm/bin/smrjjwcm -d 15621⤵
- Executes dropped EXE
PID:1652
-
/bin/rcwrawu/bin/rcwrawu -d 15621⤵
- Executes dropped EXE
PID:1655
-
/bin/clzgfoxagxeopq/bin/clzgfoxagxeopq -d 15621⤵
- Executes dropped EXE
PID:1658
-
/bin/agdmabfeyyhwui/bin/agdmabfeyyhwui -d 15621⤵
- Executes dropped EXE
PID:1661
-
/bin/fymzdhdgvljywt/bin/fymzdhdgvljywt -d 15621⤵
- Executes dropped EXE
PID:1666
-
/bin/cxizzrjudmp/bin/cxizzrjudmp -d 15621⤵
- Executes dropped EXE
PID:1669
-
/bin/fgxfuw/bin/fgxfuw -d 15621⤵
- Executes dropped EXE
PID:1672
-
/bin/bqzmbzjv/bin/bqzmbzjv -d 15621⤵
- Executes dropped EXE
PID:1675
-
/bin/dndqqkg/bin/dndqqkg -d 15621⤵
- Executes dropped EXE
PID:1678
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
549KB
MD528b4ebfb4029dd7bcd14760911094992
SHA12f31b951bb2ccdbccb0be20f8a55522e679d7395
SHA256451c302a6d4b51b299f06bc41f95ac079cf1785fe7c38d0323b2bb9a7b4ab3e7
SHA51265ae367f6bf1620ff945be35e214e9d4a9fa66cc6ea836a304e82112bbf9922793380d3fd053374a5259f11cfb4231b6dbb06883adfc1758f7bc7b83a9e89204
-
Filesize
515KB
MD567c218300b5a57ed0ce04e0157bce84d
SHA107c3887bbd31ed030ff62c44556da85bd375a095
SHA2562681863e4735ee8df320f4fa3b7d7635daa4c856ef9cdcc98c66c1a0d6e960d4
SHA5122611e900f002b4844f13aad4539e163f12456e03bcce07c0eae3d0bcccaa45a92c5d4951d67144fe1f57686be51646c5c6168eb3a1831a735eacd7b3d06030a1
-
Filesize
146B
MD5262c48254a5478bdeaad1b3e74a353ac
SHA19ba8cd273c367b0828f9a1b84e6d6551e860618c
SHA256301cba26ab4fd0639f803b83587ad66842b2546232b29a78afd03c680b7a4f32
SHA5121a146d3033dbc43288a3692acb18f1661150e775c7b8ecc18a3ed4a130bfa1c6769c82818c97ebb49dde4367de4e3d36a0768a1473384eb4188139e549799976
-
Filesize
32B
MD5c5616ee3e1d98bf4b00f9c74b7756ed4
SHA1d99a26853a3a534c3f1a67bc02a3cbea48c1b0e1
SHA2564040a10324a0b65f81a7116f493bd4b8dea8d39cd13619e095e0aadb25c77c53
SHA5127baaadef0c2f5fdfbe2645bab31601ba53e03f53e0d27e0de51cbe5573f0940948c18f88898d181de935c110a4092aae6e0938824c021818fd89ba7594f188ab
-
Filesize
333B
MD52c2cc298640da2ce7b96929a709436e4
SHA1173284f1c56cf26ea9210503b9f7ceac764dba0b
SHA2569bb1d8774ec3024ba69b11e417005444461571285985a53bddae5eb35ba1e182
SHA5126efabe8d6288ef44b499f5789041f767955cf99e4bad51395f237eadf27e65729be184330bf5fb0fae74dbdfd4cbe86654460d27d09471952733c6ef3517531d
-
Filesize
549KB
MD5c57833b58d55d499ef46663216a196d6
SHA1f9c5672d95b40c4c4ed68269c3b55035aa29d830
SHA256ae30644277ee1b1352839d218becb0f4cc18dedc62615600ab8c57a01ba5753c
SHA5121b9f920ad78813c5aaf1a2345439e8630033582568a2dadf9665c183b7a1c8a7cd08212a86568ab41dcc94c958ee092d76d53836c085ce988c2e4f154cbf9e55