General
-
Target
5f2f8a05ed17c6b47a6a9655fc2f6f6a_JaffaCakes118
-
Size
611KB
-
Sample
240520-p5n49acb8s
-
MD5
5f2f8a05ed17c6b47a6a9655fc2f6f6a
-
SHA1
33d601611a87847e75f54b037df1ff48c1dbc248
-
SHA256
68b77d35f6976c67767fa4358c6e5677261fbed28b14a340f1a7294e329fd0f9
-
SHA512
ecfd1a0363cc27a43910bd040e278f3e346883476b450aa8b314c3cd04e91316932d14d5e42a331b9053ffe2658f6080c41f97195c474815edf54c5208dab6f8
-
SSDEEP
12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrdT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNdBVEBl/91h
Behavioral task
behavioral1
Sample
5f2f8a05ed17c6b47a6a9655fc2f6f6a_JaffaCakes118
Resource
ubuntu2004-amd64-20240508-en
Malware Config
Extracted
xorddos
http://aa.hostasa.org/config.rar
cdn.cloud2cdn.com:23
-
crc_polynomial
EDB88320
Targets
-
-
Target
5f2f8a05ed17c6b47a6a9655fc2f6f6a_JaffaCakes118
-
Size
611KB
-
MD5
5f2f8a05ed17c6b47a6a9655fc2f6f6a
-
SHA1
33d601611a87847e75f54b037df1ff48c1dbc248
-
SHA256
68b77d35f6976c67767fa4358c6e5677261fbed28b14a340f1a7294e329fd0f9
-
SHA512
ecfd1a0363cc27a43910bd040e278f3e346883476b450aa8b314c3cd04e91316932d14d5e42a331b9053ffe2658f6080c41f97195c474815edf54c5208dab6f8
-
SSDEEP
12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrdT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNdBVEBl/91h
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Executes dropped EXE
-
Reads EFI boot settings
Reads EFI boot settings from the efivars filesystem, may contain security secrets or sensitive data.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-