General

  • Target

    42ba80053b0e744346236592b01949d0_JaffaCakes118

  • Size

    611KB

  • Sample

    240514-x926nsdb79

  • MD5

    42ba80053b0e744346236592b01949d0

  • SHA1

    0095a358c84054c75840a20468aaa0a18bca7621

  • SHA256

    1a0aa7fcea196af6d24df531da131833b4b13b3e629e15d1b346062d7ec259e6

  • SHA512

    3186e5b9a9d6ff202cf479451ff3d98329357375876b000869b282947d82ff9df974845e509a143cac6ce3919e674a9b95ee769f0662cac0e867966a57bcc54d

  • SSDEEP

    12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrsT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNsBVEBl/91h

Malware Config

Extracted

Family

xorddos

C2

http://aa.finance1num.org/config.rar

cdn.netflix2cdn.com:3307

cdn.finance1num.com:3307

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      42ba80053b0e744346236592b01949d0_JaffaCakes118

    • Size

      611KB

    • MD5

      42ba80053b0e744346236592b01949d0

    • SHA1

      0095a358c84054c75840a20468aaa0a18bca7621

    • SHA256

      1a0aa7fcea196af6d24df531da131833b4b13b3e629e15d1b346062d7ec259e6

    • SHA512

      3186e5b9a9d6ff202cf479451ff3d98329357375876b000869b282947d82ff9df974845e509a143cac6ce3919e674a9b95ee769f0662cac0e867966a57bcc54d

    • SSDEEP

      12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrsT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNsBVEBl/91h

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Executes dropped EXE

    • Reads EFI boot settings

      Reads EFI boot settings from the efivars filesystem, may contain security secrets or sensitive data.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

MITRE ATT&CK Enterprise v15

Tasks