General

  • Target

    5f2f8a05ed17c6b47a6a9655fc2f6f6a_JaffaCakes118

  • Size

    611KB

  • Sample

    240520-p5n49acb8s

  • MD5

    5f2f8a05ed17c6b47a6a9655fc2f6f6a

  • SHA1

    33d601611a87847e75f54b037df1ff48c1dbc248

  • SHA256

    68b77d35f6976c67767fa4358c6e5677261fbed28b14a340f1a7294e329fd0f9

  • SHA512

    ecfd1a0363cc27a43910bd040e278f3e346883476b450aa8b314c3cd04e91316932d14d5e42a331b9053ffe2658f6080c41f97195c474815edf54c5208dab6f8

  • SSDEEP

    12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrdT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNdBVEBl/91h

Malware Config

Extracted

Family

xorddos

C2

http://aa.hostasa.org/config.rar

cdn.cloud2cdn.com:23

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      5f2f8a05ed17c6b47a6a9655fc2f6f6a_JaffaCakes118

    • Size

      611KB

    • MD5

      5f2f8a05ed17c6b47a6a9655fc2f6f6a

    • SHA1

      33d601611a87847e75f54b037df1ff48c1dbc248

    • SHA256

      68b77d35f6976c67767fa4358c6e5677261fbed28b14a340f1a7294e329fd0f9

    • SHA512

      ecfd1a0363cc27a43910bd040e278f3e346883476b450aa8b314c3cd04e91316932d14d5e42a331b9053ffe2658f6080c41f97195c474815edf54c5208dab6f8

    • SSDEEP

      12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrdT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNdBVEBl/91h

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Executes dropped EXE

    • Reads EFI boot settings

      Reads EFI boot settings from the efivars filesystem, may contain security secrets or sensitive data.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

MITRE ATT&CK Enterprise v15

Tasks