General
-
Target
39ffc090c3be8b2e3835c5c887d05573_JaffaCakes118
-
Size
538KB
-
Sample
240729-ggkg6awbjk
-
MD5
39ffc090c3be8b2e3835c5c887d05573
-
SHA1
70f4f7f0a05b934fe7bd709ab6341d1d7c133105
-
SHA256
02663b6c8c7738fdc443491983ea3f5d7e7ea91a784a9cb006b0b4ded0a737f4
-
SHA512
a14cebafb26bb11c242974142bfbcf7bd8308c0ded4dd95e525f8390ab47561a7452b6b1351553eae87c37c630d958ef28321dba7d060eb9ae96bca8cc222f95
-
SSDEEP
12288:fB+OFJ52snwnBrHnL0iTwseG3vtxaYEM/tiL6yXZ:JzL5ZyrIiTNeG3vtxaYEwiL
Behavioral task
behavioral1
Sample
39ffc090c3be8b2e3835c5c887d05573_JaffaCakes118
Resource
ubuntu2204-amd64-20240729-en
Malware Config
Extracted
xorddos
topbannersun.com:5212
wowapplecar.com:5212
-
crc_polynomial
CDB88320
Targets
-
-
Target
39ffc090c3be8b2e3835c5c887d05573_JaffaCakes118
-
Size
538KB
-
MD5
39ffc090c3be8b2e3835c5c887d05573
-
SHA1
70f4f7f0a05b934fe7bd709ab6341d1d7c133105
-
SHA256
02663b6c8c7738fdc443491983ea3f5d7e7ea91a784a9cb006b0b4ded0a737f4
-
SHA512
a14cebafb26bb11c242974142bfbcf7bd8308c0ded4dd95e525f8390ab47561a7452b6b1351553eae87c37c630d958ef28321dba7d060eb9ae96bca8cc222f95
-
SSDEEP
12288:fB+OFJ52snwnBrHnL0iTwseG3vtxaYEM/tiL6yXZ:JzL5ZyrIiTNeG3vtxaYEwiL
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Deletes itself
-
Executes dropped EXE
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-