Resubmissions

27-04-2024 19:52

240427-yldzlsff2s 10

27-04-2024 19:40

240427-ydkgeseh65 10

Analysis

  • max time kernel
    29s
  • max time network
    32s
  • platform
    ubuntu-20.04_amd64
  • resource
    ubuntu2004-amd64-20240418-en
  • resource tags

    arch:amd64arch:i386image:ubuntu2004-amd64-20240418-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system
  • submitted
    27-04-2024 19:52

General

  • Target

    fb18a78ab398c101ec335992020bdbf6ca35db5d74b6c708d126cf4d4ebf289d.elf

  • Size

    549KB

  • MD5

    450cea21132fad13be77c7030d2a9e9d

  • SHA1

    e0fdfb05fb79f5ba1cafc69b78a50a0eed6eeedb

  • SHA256

    fb18a78ab398c101ec335992020bdbf6ca35db5d74b6c708d126cf4d4ebf289d

  • SHA512

    6d282ecf3df15592a2e000906e5aca9665421309a35b31d7aed3cedcc0f46b2f7b6db2426afa7a02f49173b59b9be5c6089dbd0f8a4da8e962ca254e00854f49

  • SSDEEP

    12288:VeRvuKqiVZ4En5drNK0pPEfJKlHZ8mG97Qxee6yzmx:VIv/qiVNHNDEfJKHZ8mG9QeeO

Malware Config

Extracted

Family

xorddos

C2

user.myserv012.com:123

user.search2c.com:123

http://qq.com/lib.asp

Attributes
  • crc_polynomial

    CDB88320

xor.plain

Signatures

  • XorDDoS

    Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

  • XorDDoS payload 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Deletes itself 36 IoCs
  • Executes dropped EXE 36 IoCs
  • Unexpected DNS network traffic destination 64 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Creates/modifies Cron job 1 TTPs 1 IoCs

    Cron allows running tasks on a schedule, and is commonly used for malware persistence.

  • Modifies init.d 1 TTPs 1 IoCs

    Adds/modifies system service, likely for persistence.

  • Write file to user bin folder 1 TTPs 38 IoCs
  • Reads runtime system information 2 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to shm directory 2 IoCs

    Malware can drop malicious files in the shm directory which will run directly from RAM.

Processes

  • /tmp/fb18a78ab398c101ec335992020bdbf6ca35db5d74b6c708d126cf4d4ebf289d.elf
    /tmp/fb18a78ab398c101ec335992020bdbf6ca35db5d74b6c708d126cf4d4ebf289d.elf
    1⤵
    • Write file to user bin folder
    • Reads runtime system information
    PID:1494
  • /usr/bin/uqgzbyvriie
    /usr/bin/uqgzbyvriie
    1⤵
    • Executes dropped EXE
    • Creates/modifies Cron job
    • Modifies init.d
    • Write file to user bin folder
    • Reads runtime system information
    • Writes file to shm directory
    PID:1507
  • /usr/bin/khkzindyujf
    /usr/bin/khkzindyujf -d 1508
    1⤵
    • Executes dropped EXE
    PID:1520
  • /usr/bin/vhstgurm
    /usr/bin/vhstgurm -d 1508
    1⤵
    • Executes dropped EXE
    PID:1525
  • /usr/bin/qazcwzgjjh
    /usr/bin/qazcwzgjjh -d 1508
    1⤵
    • Executes dropped EXE
    PID:1532
  • /usr/bin/iggpsdphbrs
    /usr/bin/iggpsdphbrs -d 1508
    1⤵
    • Executes dropped EXE
    PID:1536
  • /usr/bin/knsiwfrmkt
    /usr/bin/knsiwfrmkt -d 1508
    1⤵
    • Executes dropped EXE
    PID:1549
  • /usr/bin/fjsecbx
    /usr/bin/fjsecbx -d 1508
    1⤵
    • Executes dropped EXE
    PID:1603
  • /usr/bin/vrgtfs
    /usr/bin/vrgtfs -d 1508
    1⤵
    • Executes dropped EXE
    PID:1606
  • /usr/bin/rfnirbwliwj
    /usr/bin/rfnirbwliwj -d 1508
    1⤵
    • Executes dropped EXE
    PID:1609
  • /usr/bin/mvqksa
    /usr/bin/mvqksa -d 1508
    1⤵
    • Executes dropped EXE
    PID:1612
  • /usr/bin/uhffcqrwaagi
    /usr/bin/uhffcqrwaagi -d 1508
    1⤵
    • Executes dropped EXE
    PID:1615
  • /usr/bin/mgoighfwv
    /usr/bin/mgoighfwv -d 1508
    1⤵
    • Executes dropped EXE
    PID:1699
  • /usr/bin/yvojxtec
    /usr/bin/yvojxtec -d 1508
    1⤵
    • Executes dropped EXE
    PID:1702
  • /usr/bin/vjjizytnmb
    /usr/bin/vjjizytnmb -d 1508
    1⤵
    • Executes dropped EXE
    PID:1705
  • /usr/bin/jfvgeonk
    /usr/bin/jfvgeonk -d 1508
    1⤵
    • Executes dropped EXE
    PID:1708
  • /usr/bin/wihcrprtipd
    /usr/bin/wihcrprtipd -d 1508
    1⤵
    • Executes dropped EXE
    PID:1711
  • /usr/bin/okldpqxovx
    /usr/bin/okldpqxovx -d 1508
    1⤵
    • Executes dropped EXE
    PID:1716
  • /usr/bin/xsnnkoxnvglhh
    /usr/bin/xsnnkoxnvglhh -d 1508
    1⤵
    • Executes dropped EXE
    PID:1719
  • /usr/bin/xonesysf
    /usr/bin/xonesysf -d 1508
    1⤵
    • Executes dropped EXE
    PID:1722
  • /usr/bin/ywevkzuhxnwm
    /usr/bin/ywevkzuhxnwm -d 1508
    1⤵
    • Executes dropped EXE
    PID:1725
  • /usr/bin/klmfrxo
    /usr/bin/klmfrxo -d 1508
    1⤵
    • Executes dropped EXE
    PID:1728
  • /usr/bin/soqnwi
    /usr/bin/soqnwi -d 1508
    1⤵
    • Executes dropped EXE
    PID:1731
  • /usr/bin/ydgwdrp
    /usr/bin/ydgwdrp -d 1508
    1⤵
    • Executes dropped EXE
    PID:1734
  • /usr/bin/zxctjevooj
    /usr/bin/zxctjevooj -d 1508
    1⤵
    • Executes dropped EXE
    PID:1737
  • /usr/bin/axvkspak
    /usr/bin/axvkspak -d 1508
    1⤵
    • Executes dropped EXE
    PID:1740
  • /usr/bin/wuiwzoucgkhfj
    /usr/bin/wuiwzoucgkhfj -d 1508
    1⤵
    • Executes dropped EXE
    PID:1743
  • /usr/bin/luucmks
    /usr/bin/luucmks -d 1508
    1⤵
    • Executes dropped EXE
    PID:1746
  • /usr/bin/pjsviolnwfeeo
    /usr/bin/pjsviolnwfeeo -d 1508
    1⤵
    • Executes dropped EXE
    PID:1749
  • /usr/bin/dztgssvpegja
    /usr/bin/dztgssvpegja -d 1508
    1⤵
    • Executes dropped EXE
    PID:1751
  • /usr/bin/vkcebn
    /usr/bin/vkcebn -d 1508
    1⤵
    • Executes dropped EXE
    PID:1755
  • /usr/bin/zymkljrsnhp
    /usr/bin/zymkljrsnhp -d 1508
    1⤵
    • Executes dropped EXE
    PID:1757
  • /usr/bin/flmbkvece
    /usr/bin/flmbkvece -d 1508
    1⤵
    • Executes dropped EXE
    PID:1761
  • /usr/bin/oxahcrk
    /usr/bin/oxahcrk -d 1508
    1⤵
    • Executes dropped EXE
    PID:1766
  • /usr/bin/hoggtsmyp
    /usr/bin/hoggtsmyp -d 1508
    1⤵
    • Executes dropped EXE
    PID:1764
  • /usr/bin/ngvdodwhsuwgi
    /usr/bin/ngvdodwhsuwgi -d 1508
    1⤵
    • Executes dropped EXE
    PID:1772
  • /usr/bin/aoxhalimgo
    /usr/bin/aoxhalimgo -d 1508
    1⤵
    • Executes dropped EXE
    PID:1770

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /dev/shm/sem.DXoct2

    Filesize

    16B

    MD5

    076933ff9904d1110d896e2c525e39e5

    SHA1

    4188442577fa77f25820d9b2d01cc446e30684ac

    SHA256

    4cbbd8ca5215b8d161aec181a74b694f4e24b001d5b081dc0030ed797a8973e0

    SHA512

    6fcee9a7b7a7b821d241c03c82377928bc6882e7a08c78a4221199bfa220cdc55212273018ee613317c8293bb8d1ce08d1e017508e94e06ab85a734c99c7cc34

  • /etc/cron.hourly/eiirvybzgqu.sh

    Filesize

    160B

    MD5

    b4fa77a8b1af281a2b7ca703b9cdeba2

    SHA1

    1edbdc4bb48dbd07b1b55b4f47b466278fbd5320

    SHA256

    bb0f3e9386eb009a2d7ce8f40c12ae1c4ca69425f57f1d65603ad33e01d20015

    SHA512

    0ab0350b82a88dad9f05d6ac9ff15a7937b34e5c76e0d661bb61a5a794a696666c47d19221c13788027a7455f197acec89ea5550b619d3ab455d62a1b0d6ceb9

  • /etc/daemon.cfg

    Filesize

    32B

    MD5

    dd3a9d8e3dd2fc1de1a41467af0da1d8

    SHA1

    0de8c8510ea7251b3afced94d8636ee01f8247be

    SHA256

    5e46f097dfce3cf2d5f1bf573f1c85f9671cca43bd65495cc8dca7dae685c09e

    SHA512

    7aabaa6dcd0dc2f754e586d95b346461e14a5afc04c280f239e7e4ccbedf85af5c61b02a1e336250c121f71c953ff57c67eac8eb75bd019d17f0cd9e270dfd40

  • /etc/init.d/eiirvybzgqu

    Filesize

    351B

    MD5

    d4b124ec20e2206aa7b27a642a5cb181

    SHA1

    36eead902c57eb8c1efca7532aa3becf1539eb94

    SHA256

    2c072e3644f2857df3414a4f953dbc48675cb31471ef266137ac2c7fa654d610

    SHA512

    d32c74dffed0f968739d1650b598e9db07c05c886820532e4a2a54a185f403641b3792f2ac494ce3e93064c457c4565949ba576c89d24f304efcf02720a794a7

  • /usr/bin/uqgzbyvriie

    Filesize

    549KB

    MD5

    0fb6d6fffc40d9fe2cca8af68aa25952

    SHA1

    08a6569ef372c3057df1fd401d5a5c9f14168885

    SHA256

    213102a3010629b242d6feaca1636d58cee2e595e98f5d4d829888f84ab01d09

    SHA512

    267bd90c320da9ef3228dd51822ecc9e5c3a5c367c12d657c40523aa0804a4acc18081531a3bcc04b80aa6a4e037fe4b8a6c59b2bb72679a83906241f7b012af