General

  • Target

    2004f9f08f281f8d4ea7c913573dd6cc_JaffaCakes118

  • Size

    611KB

  • Sample

    240507-j91qysbc52

  • MD5

    2004f9f08f281f8d4ea7c913573dd6cc

  • SHA1

    50203908a2e3a384375e459dd5888e2b44c83ee8

  • SHA256

    edaca7753735c2306a34fd55f5064777b0d0d5569042c453e7344013224d72d0

  • SHA512

    0cd47747cbc895919d15597ab6b25900fb0ffdbb04cc6c4dfc53152b575aa190508cacc694ee0cade4dff797017803ae6a40ea5d867cc0e2551527549d5d2bbd

  • SSDEEP

    12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrr3T6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNN3BVEBl/91h

Malware Config

Extracted

Family

xorddos

C2

http://aa.finance1num.org/config.rar

cdn.netflix2cdn.com:3308

cdn.finance1num.com:3308

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      2004f9f08f281f8d4ea7c913573dd6cc_JaffaCakes118

    • Size

      611KB

    • MD5

      2004f9f08f281f8d4ea7c913573dd6cc

    • SHA1

      50203908a2e3a384375e459dd5888e2b44c83ee8

    • SHA256

      edaca7753735c2306a34fd55f5064777b0d0d5569042c453e7344013224d72d0

    • SHA512

      0cd47747cbc895919d15597ab6b25900fb0ffdbb04cc6c4dfc53152b575aa190508cacc694ee0cade4dff797017803ae6a40ea5d867cc0e2551527549d5d2bbd

    • SSDEEP

      12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrr3T6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNN3BVEBl/91h

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Executes dropped EXE

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

MITRE ATT&CK Enterprise v15

Tasks