General
-
Target
63f286aa32a4baaa8b0dd137eb4b3361_JaffaCakes118
-
Size
611KB
-
Sample
240729-18altatcqj
-
MD5
63f286aa32a4baaa8b0dd137eb4b3361
-
SHA1
b86e0d99d5a399c0785017938bd4573f7f61f825
-
SHA256
acbccef76341af012bdf8f0022b302c08c72c6911631f98de8d9f694b3460e25
-
SHA512
6796de3c76d7d8c302b24b0bbf2e66d1aabcd6cfba4f50d19626e1737bc41dd6650318fcd003617dc2f5a2c1c395a872ed0830629c8f4920613112cfde711335
-
SSDEEP
12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrVT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNVBVEBl/91h
Behavioral task
behavioral1
Sample
63f286aa32a4baaa8b0dd137eb4b3361_JaffaCakes118
Resource
ubuntu2204-amd64-20240611-en
Malware Config
Extracted
xorddos
http://aa.hostasa.org/config.rar
ns3.hostasa.org:4307
ns4.hostasa.org:4307
ns1.hostasa.org:4307
ns2.hostasa.org:4307
-
crc_polynomial
EDB88320
Targets
-
-
Target
63f286aa32a4baaa8b0dd137eb4b3361_JaffaCakes118
-
Size
611KB
-
MD5
63f286aa32a4baaa8b0dd137eb4b3361
-
SHA1
b86e0d99d5a399c0785017938bd4573f7f61f825
-
SHA256
acbccef76341af012bdf8f0022b302c08c72c6911631f98de8d9f694b3460e25
-
SHA512
6796de3c76d7d8c302b24b0bbf2e66d1aabcd6cfba4f50d19626e1737bc41dd6650318fcd003617dc2f5a2c1c395a872ed0830629c8f4920613112cfde711335
-
SSDEEP
12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrVT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNVBVEBl/91h
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Executes dropped EXE
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-