General

  • Target

    638aca9fff2d46005788673bd1d2fb91_JaffaCakes118

  • Size

    647KB

  • Sample

    240729-1363tstapm

  • MD5

    638aca9fff2d46005788673bd1d2fb91

  • SHA1

    c6f30789ff4b852efaeba52186126cc97d0a409a

  • SHA256

    b4c493433d7ac154d8ab0676aaf81cbb7f8109e481cd621d87e4dbbd99b53cf0

  • SHA512

    ae6360323a6aaa36e43adfbbd52cdc960438242ae6eb6d5a79ecd8b68458f867b5e98aa84e6f177ec648763137ac0d039e029028617e3918c7c8926f0ad65c4a

  • SSDEEP

    12288:RBRO1UmJJ0nHgBL9YfJip2qm+x4h1Tonjp6y07l7mtBDvnD/u9hMHDB:RBRpmJ+HyL9AiAqm+x4h1mj6wvnDWXMN

Malware Config

Extracted

Family

xorddos

C2

http://info1.3000uc.com/b/u.php

linux.bc5j.com:2897

122.114.191.78:2897

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      638aca9fff2d46005788673bd1d2fb91_JaffaCakes118

    • Size

      647KB

    • MD5

      638aca9fff2d46005788673bd1d2fb91

    • SHA1

      c6f30789ff4b852efaeba52186126cc97d0a409a

    • SHA256

      b4c493433d7ac154d8ab0676aaf81cbb7f8109e481cd621d87e4dbbd99b53cf0

    • SHA512

      ae6360323a6aaa36e43adfbbd52cdc960438242ae6eb6d5a79ecd8b68458f867b5e98aa84e6f177ec648763137ac0d039e029028617e3918c7c8926f0ad65c4a

    • SSDEEP

      12288:RBRO1UmJJ0nHgBL9YfJip2qm+x4h1Tonjp6y07l7mtBDvnD/u9hMHDB:RBRpmJ+HyL9AiAqm+x4h1mj6wvnDWXMN

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Writes memory of remote process

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Matrix

Tasks