General

  • Target

    https://github.com/palahsu/DDoS-Ripper

  • Sample

    240328-1wt5pahf9s

Malware Config

Targets

    • Target

      https://github.com/palahsu/DDoS-Ripper

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Reads user data of web browsers

      Reads stored browser data which can include saved credentials.

    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Legitimate hosting services abused for malware hosting/C2

    • Reads CPU attributes

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Network Service Discovery

1
T1046

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks