General

  • Target

    12d5d743f029662fa0d4c7d224d2f117_JaffaCakes118

  • Size

    611KB

  • Sample

    240728-lj666azckk

  • MD5

    12d5d743f029662fa0d4c7d224d2f117

  • SHA1

    edd29da20cd95e494e8bfc84b6905a79505fb207

  • SHA256

    c98669337e18ede65029f72655341a23d999a72966ce6c89ac813b2ffcf02ad3

  • SHA512

    bcaff169cb7c0303fd399f14284647195d4bac54cc4d84814b2c70f379e7ea75605d9ce5fb2b64b49ecd61745ccbe65415cdd30b4ecf82f9e6ac90dd3d4f3959

  • SSDEEP

    12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrr1T6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNN1BVEBl/91h

Malware Config

Extracted

Family

xorddos

C2

http://www.s9xk32c.com/config.rar

ww.s9xk32c.com:8000

ww.s9xk32a.com:8000

ww.s9xk32b.com:8000

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      12d5d743f029662fa0d4c7d224d2f117_JaffaCakes118

    • Size

      611KB

    • MD5

      12d5d743f029662fa0d4c7d224d2f117

    • SHA1

      edd29da20cd95e494e8bfc84b6905a79505fb207

    • SHA256

      c98669337e18ede65029f72655341a23d999a72966ce6c89ac813b2ffcf02ad3

    • SHA512

      bcaff169cb7c0303fd399f14284647195d4bac54cc4d84814b2c70f379e7ea75605d9ce5fb2b64b49ecd61745ccbe65415cdd30b4ecf82f9e6ac90dd3d4f3959

    • SSDEEP

      12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrr1T6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNN1BVEBl/91h

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Executes dropped EXE

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

MITRE ATT&CK Enterprise v15

Tasks