General
-
Target
rgseznyhpumsr.elf
-
Size
549KB
-
Sample
240323-sxga8aha54
-
MD5
455b46bf3f93b8853137de2b99ef0f4c
-
SHA1
99387d92aee1ad50c8af0a5192f651ad8021d1d4
-
SHA256
76741721aede86e5d9a78da5dd349cc7f418a993eba77457c00b27aa627f9882
-
SHA512
a43cc62e55da2d23f2f57bffc3e2f3e406e41b0e1ba24b38d274a12e25d87d005f89f03e98c4fbf91622b75a4009c38033ea9d74316696469d26f9ea3a3237fa
-
SSDEEP
12288:VeRvuKqiVZ4En5drNK0pPEfJKlHZ8mG97Qxee6yzmx6:VIv/qiVNHNDEfJKHZ8mG9QeeO6
Behavioral task
behavioral1
Sample
rgseznyhpumsr.elf
Resource
ubuntu1804-amd64-20240226-en
Malware Config
Extracted
xorddos
bb.markerbio.com:13307
bb.myserv012.com:13307
http://qq.com/lib.asp
-
crc_polynomial
CDB88320
Targets
-
-
Target
rgseznyhpumsr.elf
-
Size
549KB
-
MD5
455b46bf3f93b8853137de2b99ef0f4c
-
SHA1
99387d92aee1ad50c8af0a5192f651ad8021d1d4
-
SHA256
76741721aede86e5d9a78da5dd349cc7f418a993eba77457c00b27aa627f9882
-
SHA512
a43cc62e55da2d23f2f57bffc3e2f3e406e41b0e1ba24b38d274a12e25d87d005f89f03e98c4fbf91622b75a4009c38033ea9d74316696469d26f9ea3a3237fa
-
SSDEEP
12288:VeRvuKqiVZ4En5drNK0pPEfJKlHZ8mG97Qxee6yzmx6:VIv/qiVNHNDEfJKHZ8mG9QeeO6
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Deletes itself
-
Executes dropped EXE
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder
-