General

  • Target

    616b7d37976b466c6c4ca41909d35f6d_JaffaCakes118

  • Size

    611KB

  • Sample

    240729-1cg11s1fmr

  • MD5

    616b7d37976b466c6c4ca41909d35f6d

  • SHA1

    87cb885c92d7d0ba78b21cf474637cedbdcbd155

  • SHA256

    891b01d92d0366fbb4af44135cfb9b4b9f9d2b28cc052f70cb9724ef30545608

  • SHA512

    b3feb38b198a5574f317f18736dc653034689e177deca12278dcb8330fa6eb08281cd1b69183f5da2d15d84faa33711dd18f002da851bb52bed6d2941fa00154

  • SSDEEP

    12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrLT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNLBVEBl/91h

Malware Config

Extracted

Family

xorddos

C2

http://www1.gggatat456.com/dd.rar

ppp.gggatat456.com:1524

ppp.xxxatat456.com:1524

ddd.dddgata789.com:1524

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      616b7d37976b466c6c4ca41909d35f6d_JaffaCakes118

    • Size

      611KB

    • MD5

      616b7d37976b466c6c4ca41909d35f6d

    • SHA1

      87cb885c92d7d0ba78b21cf474637cedbdcbd155

    • SHA256

      891b01d92d0366fbb4af44135cfb9b4b9f9d2b28cc052f70cb9724ef30545608

    • SHA512

      b3feb38b198a5574f317f18736dc653034689e177deca12278dcb8330fa6eb08281cd1b69183f5da2d15d84faa33711dd18f002da851bb52bed6d2941fa00154

    • SSDEEP

      12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrLT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNLBVEBl/91h

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Writes memory of remote process

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

MITRE ATT&CK Matrix

Tasks