General
-
Target
5a5fbd54bcfacae5b6b7ba089e7ff543_JaffaCakes118
-
Size
537KB
-
Sample
240729-xte17sveqr
-
MD5
5a5fbd54bcfacae5b6b7ba089e7ff543
-
SHA1
b92b3bf25c0a8246355177bfac4aba5831893827
-
SHA256
8990c690ba23b4aa59e900084dd27c71b59728857dc30626892d495487791cb3
-
SHA512
53c36bdd8f2d228e4a4014eb42e982cc32047ea8651912c7dc7926c697df0fbe9fd54df3b9c80a445f0c786d46f3a33b976c21c1ff109b34233035971a5a0b80
-
SSDEEP
12288:ISraVbNYn/gpq5xnFeEu1eZ1gVcxfwbuHvh3u6yp5k:Im8bKEWt0EucZ1gVcxfwa53U
Behavioral task
behavioral1
Sample
5a5fbd54bcfacae5b6b7ba089e7ff543_JaffaCakes118
Resource
ubuntu2004-amd64-20240611-en
Malware Config
Extracted
xorddos
topbannersun.com:5414
wowapplecar.com:5414
-
crc_polynomial
CDB88320
Targets
-
-
Target
5a5fbd54bcfacae5b6b7ba089e7ff543_JaffaCakes118
-
Size
537KB
-
MD5
5a5fbd54bcfacae5b6b7ba089e7ff543
-
SHA1
b92b3bf25c0a8246355177bfac4aba5831893827
-
SHA256
8990c690ba23b4aa59e900084dd27c71b59728857dc30626892d495487791cb3
-
SHA512
53c36bdd8f2d228e4a4014eb42e982cc32047ea8651912c7dc7926c697df0fbe9fd54df3b9c80a445f0c786d46f3a33b976c21c1ff109b34233035971a5a0b80
-
SSDEEP
12288:ISraVbNYn/gpq5xnFeEu1eZ1gVcxfwbuHvh3u6yp5k:Im8bKEWt0EucZ1gVcxfwa53U
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Deletes itself
-
Executes dropped EXE
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-