General

  • Target

    36387ccda369530bc9a4a68e15b1f199_JaffaCakes118

  • Size

    611KB

  • Sample

    240511-yehn8aha35

  • MD5

    36387ccda369530bc9a4a68e15b1f199

  • SHA1

    939076b798f41b89579e5d5d6eaccca4d2851f65

  • SHA256

    157781a6029821c39137ffc702f9418e1e230e654f23afe3c429c539baff2b27

  • SHA512

    30918fdf1eec8c9f87f9506353f3d1e4f07837a2516c41cee17ac2c2f147f4625410995582ac6cc6023b7efccf8d325f4656a6cb734424acd502198bb7610dc4

  • SSDEEP

    12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrnT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNnBVEBl/91h

Malware Config

Extracted

Family

xorddos

C2

http://www1.gggatat456.com/dd.rar

ppp.gggatat456.com:6002

ppp.xxxatat456.com:6002

ddd.dddgata789.com:6002

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      36387ccda369530bc9a4a68e15b1f199_JaffaCakes118

    • Size

      611KB

    • MD5

      36387ccda369530bc9a4a68e15b1f199

    • SHA1

      939076b798f41b89579e5d5d6eaccca4d2851f65

    • SHA256

      157781a6029821c39137ffc702f9418e1e230e654f23afe3c429c539baff2b27

    • SHA512

      30918fdf1eec8c9f87f9506353f3d1e4f07837a2516c41cee17ac2c2f147f4625410995582ac6cc6023b7efccf8d325f4656a6cb734424acd502198bb7610dc4

    • SSDEEP

      12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrnT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNnBVEBl/91h

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Executes dropped EXE

    • Reads EFI boot settings

      Reads EFI boot settings from the efivars filesystem, may contain security secrets or sensitive data.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

1
T1574

Privilege Escalation

Scheduled Task/Job

1
T1053

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

1
T1574

Defense Evasion

Hijack Execution Flow

1
T1574

Virtualization/Sandbox Evasion

1
T1497

Discovery

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

1
T1082

Tasks