General
-
Target
01942bbe326395e8bf8312c304b30c21_JaffaCakes118
-
Size
247KB
-
Sample
240328-knyvxaed32
-
MD5
01942bbe326395e8bf8312c304b30c21
-
SHA1
b8a481e91c77631aa74b8188b17166d9861dfde0
-
SHA256
9c7e43e5212142a195a794486b13efcc9779f9c0742b608c66c18937856bb452
-
SHA512
914224281378d60adca99c34848485550c1eb29f95a6755d83d10d9a55ea21fb6e973fc5bb144a20b3ebd25b8a8cdc8b5aa819aa2f345c3dada5d39d9c2d1b7b
-
SSDEEP
6144:nSDFOrnwRgUbMisI6sdkH+M6hWOcy5KOZW7U6NCPhhhR//mqYi:mZRgUY/fsJcO1KOiXOhhhBei
Behavioral task
behavioral1
Sample
01942bbe326395e8bf8312c304b30c21_JaffaCakes118
Resource
ubuntu2004-amd64-20240221-en
Malware Config
Extracted
xorddos
-
crc_polynomial
EDB88320
Targets
-
-
Target
01942bbe326395e8bf8312c304b30c21_JaffaCakes118
-
Size
247KB
-
MD5
01942bbe326395e8bf8312c304b30c21
-
SHA1
b8a481e91c77631aa74b8188b17166d9861dfde0
-
SHA256
9c7e43e5212142a195a794486b13efcc9779f9c0742b608c66c18937856bb452
-
SHA512
914224281378d60adca99c34848485550c1eb29f95a6755d83d10d9a55ea21fb6e973fc5bb144a20b3ebd25b8a8cdc8b5aa819aa2f345c3dada5d39d9c2d1b7b
-
SSDEEP
6144:nSDFOrnwRgUbMisI6sdkH+M6hWOcy5KOZW7U6NCPhhhR//mqYi:mZRgUY/fsJcO1KOiXOhhhBei
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
Executes dropped EXE
-
Reads EFI boot settings
Reads EFI boot settings from the efivars filesystem, may contain security secrets or sensitive data.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-