General
-
Target
616b7d37976b466c6c4ca41909d35f6d_JaffaCakes118
-
Size
611KB
-
Sample
240729-1cg11s1fmr
-
MD5
616b7d37976b466c6c4ca41909d35f6d
-
SHA1
87cb885c92d7d0ba78b21cf474637cedbdcbd155
-
SHA256
891b01d92d0366fbb4af44135cfb9b4b9f9d2b28cc052f70cb9724ef30545608
-
SHA512
b3feb38b198a5574f317f18736dc653034689e177deca12278dcb8330fa6eb08281cd1b69183f5da2d15d84faa33711dd18f002da851bb52bed6d2941fa00154
-
SSDEEP
12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrLT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNLBVEBl/91h
Behavioral task
behavioral1
Sample
616b7d37976b466c6c4ca41909d35f6d_JaffaCakes118
Resource
ubuntu2404-amd64-20240523-en
Malware Config
Extracted
xorddos
http://www1.gggatat456.com/dd.rar
ppp.gggatat456.com:1524
ppp.xxxatat456.com:1524
ddd.dddgata789.com:1524
-
crc_polynomial
EDB88320
Targets
-
-
Target
616b7d37976b466c6c4ca41909d35f6d_JaffaCakes118
-
Size
611KB
-
MD5
616b7d37976b466c6c4ca41909d35f6d
-
SHA1
87cb885c92d7d0ba78b21cf474637cedbdcbd155
-
SHA256
891b01d92d0366fbb4af44135cfb9b4b9f9d2b28cc052f70cb9724ef30545608
-
SHA512
b3feb38b198a5574f317f18736dc653034689e177deca12278dcb8330fa6eb08281cd1b69183f5da2d15d84faa33711dd18f002da851bb52bed6d2941fa00154
-
SSDEEP
12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrLT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNLBVEBl/91h
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Writes memory of remote process
-