General
-
Target
3b68ff7b7620057a246d81f646d41287_JaffaCakes118
-
Size
611KB
-
Sample
240729-hnhgta1hkg
-
MD5
3b68ff7b7620057a246d81f646d41287
-
SHA1
ae0d33b69684d2e095c4b5622344f69dd12ca553
-
SHA256
8ed19e85a5cd5fb0106e4066523fed1f8b100ef0ad557198fba10749cafabf1e
-
SHA512
08b0029b7a7a805b4500dd12753afc0ad3a6be494d8d29a560567692ac1e841a7117ccfb70d643df469147dd42200372ade6a403c004bb07c3093de1136dd31a
-
SSDEEP
12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrruT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNuBVEBl/91h
Behavioral task
behavioral1
Sample
3b68ff7b7620057a246d81f646d41287_JaffaCakes118
Resource
ubuntu2204-amd64-20240729-en
Malware Config
Extracted
xorddos
http://www1.gggatat456.com/dd.rar
ppp.gggatat456.com:6001
ppp.xxxatat456.com:6001
ddd.dddgata789.com:6001
-
crc_polynomial
EDB88320
Targets
-
-
Target
3b68ff7b7620057a246d81f646d41287_JaffaCakes118
-
Size
611KB
-
MD5
3b68ff7b7620057a246d81f646d41287
-
SHA1
ae0d33b69684d2e095c4b5622344f69dd12ca553
-
SHA256
8ed19e85a5cd5fb0106e4066523fed1f8b100ef0ad557198fba10749cafabf1e
-
SHA512
08b0029b7a7a805b4500dd12753afc0ad3a6be494d8d29a560567692ac1e841a7117ccfb70d643df469147dd42200372ade6a403c004bb07c3093de1136dd31a
-
SSDEEP
12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrruT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNuBVEBl/91h
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Executes dropped EXE
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-