Resubmissions

02-05-2024 02:32

240502-c1bbdagg32 10

02-05-2024 00:34

240502-aw2awsbf8z 10

General

  • Target

    1.txt

  • Size

    535KB

  • Sample

    240502-c1bbdagg32

  • MD5

    f075a45d0f9159aca526e13870de7b28

  • SHA1

    1f74f062b39def7ba488b1e5dfcd56fcb87c5768

  • SHA256

    a544fa8b34122876e3e0140c480c967aad0b26d84823ae6fdd1bc961e47d8b15

  • SHA512

    a8f3035f3b88f3c4250fc869b4890b4a5d3bcf1333c2a13a43c8f2a1775b828173787fc65ff04e48b9984e10f601a30c25a6c32a7114166e0b91ba14f3be3f50

  • SSDEEP

    12288:4Ufrcn+vwK5ripVU4tdZ1pNL/pVbzD66ySjQn36Eoj:/fUywKQ7Fb1pNL/p5DfjQn36Eu

Malware Config

Extracted

Family

xorddos

C2

https://ww.aass654.com/config.rar

ff.aass654.com:1522

ff.xxcc789.com:1522

ff.vvbb321.com:1522

ff.jjkk567.com:1522

ff.nnmm234.com:1522

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      1.txt

    • Size

      535KB

    • MD5

      f075a45d0f9159aca526e13870de7b28

    • SHA1

      1f74f062b39def7ba488b1e5dfcd56fcb87c5768

    • SHA256

      a544fa8b34122876e3e0140c480c967aad0b26d84823ae6fdd1bc961e47d8b15

    • SHA512

      a8f3035f3b88f3c4250fc869b4890b4a5d3bcf1333c2a13a43c8f2a1775b828173787fc65ff04e48b9984e10f601a30c25a6c32a7114166e0b91ba14f3be3f50

    • SSDEEP

      12288:4Ufrcn+vwK5ripVU4tdZ1pNL/pVbzD66ySjQn36Eoj:/fUywKQ7Fb1pNL/p5DfjQn36Eu

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Deletes itself

    • Executes dropped EXE

    • Reads EFI boot settings

      Reads EFI boot settings from the efivars filesystem, may contain security secrets or sensitive data.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks