General
-
Target
638aca9fff2d46005788673bd1d2fb91_JaffaCakes118
-
Size
647KB
-
Sample
240729-1363tstapm
-
MD5
638aca9fff2d46005788673bd1d2fb91
-
SHA1
c6f30789ff4b852efaeba52186126cc97d0a409a
-
SHA256
b4c493433d7ac154d8ab0676aaf81cbb7f8109e481cd621d87e4dbbd99b53cf0
-
SHA512
ae6360323a6aaa36e43adfbbd52cdc960438242ae6eb6d5a79ecd8b68458f867b5e98aa84e6f177ec648763137ac0d039e029028617e3918c7c8926f0ad65c4a
-
SSDEEP
12288:RBRO1UmJJ0nHgBL9YfJip2qm+x4h1Tonjp6y07l7mtBDvnD/u9hMHDB:RBRpmJ+HyL9AiAqm+x4h1mj6wvnDWXMN
Behavioral task
behavioral1
Sample
638aca9fff2d46005788673bd1d2fb91_JaffaCakes118
Resource
ubuntu2404-amd64-20240523-en
Malware Config
Extracted
xorddos
http://info1.3000uc.com/b/u.php
linux.bc5j.com:2897
122.114.191.78:2897
-
crc_polynomial
EDB88320
Targets
-
-
Target
638aca9fff2d46005788673bd1d2fb91_JaffaCakes118
-
Size
647KB
-
MD5
638aca9fff2d46005788673bd1d2fb91
-
SHA1
c6f30789ff4b852efaeba52186126cc97d0a409a
-
SHA256
b4c493433d7ac154d8ab0676aaf81cbb7f8109e481cd621d87e4dbbd99b53cf0
-
SHA512
ae6360323a6aaa36e43adfbbd52cdc960438242ae6eb6d5a79ecd8b68458f867b5e98aa84e6f177ec648763137ac0d039e029028617e3918c7c8926f0ad65c4a
-
SSDEEP
12288:RBRO1UmJJ0nHgBL9YfJip2qm+x4h1Tonjp6y07l7mtBDvnD/u9hMHDB:RBRpmJ+HyL9AiAqm+x4h1mj6wvnDWXMN
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Writes memory of remote process
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-