Analysis
-
max time kernel
149s -
max time network
155s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20240523-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
29-07-2024 22:11
Behavioral task
behavioral1
Sample
638aca9fff2d46005788673bd1d2fb91_JaffaCakes118
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
638aca9fff2d46005788673bd1d2fb91_JaffaCakes118
-
Size
647KB
-
MD5
638aca9fff2d46005788673bd1d2fb91
-
SHA1
c6f30789ff4b852efaeba52186126cc97d0a409a
-
SHA256
b4c493433d7ac154d8ab0676aaf81cbb7f8109e481cd621d87e4dbbd99b53cf0
-
SHA512
ae6360323a6aaa36e43adfbbd52cdc960438242ae6eb6d5a79ecd8b68458f867b5e98aa84e6f177ec648763137ac0d039e029028617e3918c7c8926f0ad65c4a
-
SSDEEP
12288:RBRO1UmJJ0nHgBL9YfJip2qm+x4h1Tonjp6y07l7mtBDvnD/u9hMHDB:RBRpmJ+HyL9AiAqm+x4h1mj6wvnDWXMN
Malware Config
Extracted
xorddos
http://info1.3000uc.com/b/u.php
linux.bc5j.com:2897
122.114.191.78:2897
-
crc_polynomial
EDB88320
Signatures
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload 1 IoCs
Processes:
resource yara_rule /usr/lib/udev/udev family_xorddos -
Writes memory of remote process 2 IoCs
Processes:
638aca9fff2d46005788673bd1d2fb91_JaffaCakes118pid process 2830 638aca9fff2d46005788673bd1d2fb91_JaffaCakes118 2849 -
Loads a kernel module 64 IoCs
Loads a Linux kernel module, potentially to achieve persistence
Processes:
638aca9fff2d46005788673bd1d2fb91_JaffaCakes118pid process 2830 638aca9fff2d46005788673bd1d2fb91_JaffaCakes118 2831 2834 2835 2841 2835 2849 2850 2835 2853 2854 2831 2835 2835 2854 2854 2854 2854 2854 2854 2854 2854 2849 2835 2835 2856 2854 2854 2857 2849 2835 2835 2854 2857 2857 2849 2857 2857 2849 2857 2857 2857 2857 2835 2835 2857 2857 2859 2860 2835 2835 2857 2860 2860 2860 2860 2849 2860 2860 2849 2849 2860 2860 2849 -
Unexpected DNS network traffic destination 20 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223B
MD5b791b087b1795e3674a9aa765c76fc04
SHA1b53f478234ae97f3cdbf2e7fe7ec68d687feb7c1
SHA2561c1e9b69cf8021bf7ce1f60dcaa2d31c1e21ed4b6e474f3571da81ffd5a9b69e
SHA5122dcc2e478c51cf8118306fd5c744aad7147e368cbc4329db1cc5fac52088a7f3354079ae2b582b270495789e4fb4591538ec88bb5ea40eec646f360bac33bbb2
-
Filesize
32B
MD52de8c4bfa522b52600a260ce03393427
SHA1c1ba3552a46f222cdc49f46452d2e1be54877e08
SHA256141278c941abd57ea250632fa787e050de9d3ceeb84adf6fd5a5b426f7fd6b29
SHA512ffdc7046e2b78f2b3cc9dc1a6467ed4e4b0dfe6454fb9490e068b8dbc3da96d9823f77d366be33f31a0ead51d8aca4b7923cd5f9db05af08b3e91868d78f3590
-
Filesize
647KB
MD5638aca9fff2d46005788673bd1d2fb91
SHA1c6f30789ff4b852efaeba52186126cc97d0a409a
SHA256b4c493433d7ac154d8ab0676aaf81cbb7f8109e481cd621d87e4dbbd99b53cf0
SHA512ae6360323a6aaa36e43adfbbd52cdc960438242ae6eb6d5a79ecd8b68458f867b5e98aa84e6f177ec648763137ac0d039e029028617e3918c7c8926f0ad65c4a