General
-
Target
e40d4ba6f6aee3acd39faf65f471894a.bin
-
Size
251KB
-
Sample
240401-cbnkeaad4v
-
MD5
e8122ab913893dd5594568f00ff0c0bf
-
SHA1
acb039c26b4da1d264478e7bc70ceb0fd6610b56
-
SHA256
e06b85ee493c8edf8011f891bcbce0aa008738927416f284052c2c4a9a6bc9ec
-
SHA512
74a2e8c00a2fe9e4f72c74ad4dc4935219f73d50b7d7b013c24ccda1bfda488e79bcb0538c5992025d7f330cd3f77e0fa055045fcdc8293b4a88698e5eb628cb
-
SSDEEP
6144:w2n+rWd61oU5RplsPHqg3W5TmsuqO43VdjlrIta+0nFKoYK+dGQ:/n+Q62UL/syrkrI8k+DoYDV
Behavioral task
behavioral1
Sample
0e817a2325c215997de15851152a66924874739eeff5da4b434e5d36c83a76eb.elf
Resource
ubuntu2004-amd64-20240221-en
Malware Config
Extracted
xorddos
http://ww.wowapplecar.com/config.rar
dd.vvbb321.com:1430
dd.jjkk567.com:1430
dd.nnmm234.com:1430
dd.aass654.com:1430
dd.xxcc789.com:1430
-
crc_polynomial
EDB88320
Targets
-
-
Target
0e817a2325c215997de15851152a66924874739eeff5da4b434e5d36c83a76eb.elf
-
Size
542KB
-
MD5
e40d4ba6f6aee3acd39faf65f471894a
-
SHA1
7de3d9b9905cc4fde29d37ca73e2ffcf7bbb0eab
-
SHA256
0e817a2325c215997de15851152a66924874739eeff5da4b434e5d36c83a76eb
-
SHA512
2479a64b2cdcff25f87725f6541921fbb4590725f2a8ba7b4827a706ac326fb6124b6c10ea2635502a79081aa2d6b2a29ffeaaa269d320e281e26bb68a30a88f
-
SSDEEP
12288:VB2bw1CH/FwznbIU9sE8c8lqd49N94wT4JXQLLp6yWrk3:VB2WCH/eMU9Uc8gd49N94BJXQLL4ru
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE
-
Reads EFI boot settings
Reads EFI boot settings from the efivars filesystem, may contain security secrets or sensitive data.
-
Checks CPU configuration
Checks CPU information which indicate if the system is a virtual machine.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Hijack Execution Flow
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Hijack Execution Flow
1Scheduled Task/Job
1