General
-
Target
12580ef9ea8263664f1347834c162e98_JaffaCakes118
-
Size
596KB
-
Sample
240728-lbag8asfnc
-
MD5
12580ef9ea8263664f1347834c162e98
-
SHA1
d44055754ad40c523f1a16e616813e43c3fb5808
-
SHA256
af8039032cc60ca4205c1bd471009977e331ca4926bf9d5203fca3ec30a5ba45
-
SHA512
eba7c3de269317baf6d5e6ee73607b110563e620ada6c3924bd82fef7599637fc6db92629b55a9e1273d77a2f006c56267488b50c33e0953bb4ac0c38ef161fc
-
SSDEEP
12288:bfTGy+n69+5rTlFEcMWbHvx5SGEuWd1F6yxm9Ah7Dxu9hc7L:rTG/0+5dq4bHvx5SGod1LTD4XcP
Behavioral task
behavioral1
Sample
12580ef9ea8263664f1347834c162e98_JaffaCakes118
Resource
ubuntu2204-amd64-20240729-en
Malware Config
Extracted
xorddos
http://info1.3000uc.com/b/u.php
gh.dsaj2a1.org:2854
103.24.3.11:2854
102.fwq.me:2854
-
crc_polynomial
EDB88320
Targets
-
-
Target
12580ef9ea8263664f1347834c162e98_JaffaCakes118
-
Size
596KB
-
MD5
12580ef9ea8263664f1347834c162e98
-
SHA1
d44055754ad40c523f1a16e616813e43c3fb5808
-
SHA256
af8039032cc60ca4205c1bd471009977e331ca4926bf9d5203fca3ec30a5ba45
-
SHA512
eba7c3de269317baf6d5e6ee73607b110563e620ada6c3924bd82fef7599637fc6db92629b55a9e1273d77a2f006c56267488b50c33e0953bb4ac0c38ef161fc
-
SSDEEP
12288:bfTGy+n69+5rTlFEcMWbHvx5SGEuWd1F6yxm9Ah7Dxu9hc7L:rTG/0+5dq4bHvx5SGod1LTD4XcP
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-