General

  • Target

    63f286aa32a4baaa8b0dd137eb4b3361_JaffaCakes118

  • Size

    611KB

  • Sample

    240729-18altatcqj

  • MD5

    63f286aa32a4baaa8b0dd137eb4b3361

  • SHA1

    b86e0d99d5a399c0785017938bd4573f7f61f825

  • SHA256

    acbccef76341af012bdf8f0022b302c08c72c6911631f98de8d9f694b3460e25

  • SHA512

    6796de3c76d7d8c302b24b0bbf2e66d1aabcd6cfba4f50d19626e1737bc41dd6650318fcd003617dc2f5a2c1c395a872ed0830629c8f4920613112cfde711335

  • SSDEEP

    12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrVT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNVBVEBl/91h

Malware Config

Extracted

Family

xorddos

C2

http://aa.hostasa.org/config.rar

ns3.hostasa.org:4307

ns4.hostasa.org:4307

ns1.hostasa.org:4307

ns2.hostasa.org:4307

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      63f286aa32a4baaa8b0dd137eb4b3361_JaffaCakes118

    • Size

      611KB

    • MD5

      63f286aa32a4baaa8b0dd137eb4b3361

    • SHA1

      b86e0d99d5a399c0785017938bd4573f7f61f825

    • SHA256

      acbccef76341af012bdf8f0022b302c08c72c6911631f98de8d9f694b3460e25

    • SHA512

      6796de3c76d7d8c302b24b0bbf2e66d1aabcd6cfba4f50d19626e1737bc41dd6650318fcd003617dc2f5a2c1c395a872ed0830629c8f4920613112cfde711335

    • SSDEEP

      12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrVT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNVBVEBl/91h

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Executes dropped EXE

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

MITRE ATT&CK Enterprise v15

Tasks