General
-
Target
36387ccda369530bc9a4a68e15b1f199_JaffaCakes118
-
Size
611KB
-
Sample
240729-d4cjaavhmd
-
MD5
36387ccda369530bc9a4a68e15b1f199
-
SHA1
939076b798f41b89579e5d5d6eaccca4d2851f65
-
SHA256
157781a6029821c39137ffc702f9418e1e230e654f23afe3c429c539baff2b27
-
SHA512
30918fdf1eec8c9f87f9506353f3d1e4f07837a2516c41cee17ac2c2f147f4625410995582ac6cc6023b7efccf8d325f4656a6cb734424acd502198bb7610dc4
-
SSDEEP
12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrnT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNnBVEBl/91h
Behavioral task
behavioral1
Sample
36387ccda369530bc9a4a68e15b1f199_JaffaCakes118
Resource
ubuntu2204-amd64-20240729-en
Malware Config
Extracted
xorddos
http://www1.gggatat456.com/dd.rar
ppp.gggatat456.com:6002
ppp.xxxatat456.com:6002
ddd.dddgata789.com:6002
-
crc_polynomial
EDB88320
Targets
-
-
Target
36387ccda369530bc9a4a68e15b1f199_JaffaCakes118
-
Size
611KB
-
MD5
36387ccda369530bc9a4a68e15b1f199
-
SHA1
939076b798f41b89579e5d5d6eaccca4d2851f65
-
SHA256
157781a6029821c39137ffc702f9418e1e230e654f23afe3c429c539baff2b27
-
SHA512
30918fdf1eec8c9f87f9506353f3d1e4f07837a2516c41cee17ac2c2f147f4625410995582ac6cc6023b7efccf8d325f4656a6cb734424acd502198bb7610dc4
-
SSDEEP
12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrnT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNnBVEBl/91h
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Executes dropped EXE
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-