General
-
Target
6f651328b7088ae6460724a40faa6c21_JaffaCakes118
-
Size
647KB
-
Sample
240730-p3kn2syhnp
-
MD5
6f651328b7088ae6460724a40faa6c21
-
SHA1
8631258fff9828f96629eeaa4fc262b4fabded79
-
SHA256
fe7c764a7458591fe29e52bf96c74e02fc4fee3d09b455fd67e8c6adb178cf21
-
SHA512
94566e144586eee595647f27a4ea2ff9cf96a7805b9bf6d6af545ef6613fc7bd05846d31cf544c47a7d59954ffe8b134673746dfa2b8d3cb4c218f212996b912
-
SSDEEP
12288:RBRO1UmJJ0nHgBL9YfJip2qm+x4h1Tonfp6y07l7mtBDvnD/u9hMHDB:RBRpmJ+HyL9AiAqm+x4h1mf6wvnDWXMN
Behavioral task
behavioral1
Sample
6f651328b7088ae6460724a40faa6c21_JaffaCakes118
Resource
ubuntu2204-amd64-20240611-en
Malware Config
Extracted
xorddos
http://info1.3000uc.com/b/u.php
tt1.v5zz.com:3560
192.168.1.131:3826
abcd.com:8080
-
crc_polynomial
EDB88320
Targets
-
-
Target
6f651328b7088ae6460724a40faa6c21_JaffaCakes118
-
Size
647KB
-
MD5
6f651328b7088ae6460724a40faa6c21
-
SHA1
8631258fff9828f96629eeaa4fc262b4fabded79
-
SHA256
fe7c764a7458591fe29e52bf96c74e02fc4fee3d09b455fd67e8c6adb178cf21
-
SHA512
94566e144586eee595647f27a4ea2ff9cf96a7805b9bf6d6af545ef6613fc7bd05846d31cf544c47a7d59954ffe8b134673746dfa2b8d3cb4c218f212996b912
-
SSDEEP
12288:RBRO1UmJJ0nHgBL9YfJip2qm+x4h1Tonfp6y07l7mtBDvnD/u9hMHDB:RBRpmJ+HyL9AiAqm+x4h1mf6wvnDWXMN
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Deletes itself
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-