General

  • Target

    83eea5625ca2affd3e841d3b374e88eb_JaffaCakes118

  • Size

    611KB

  • Sample

    240809-27cv8atgmn

  • MD5

    83eea5625ca2affd3e841d3b374e88eb

  • SHA1

    dca946f677a1be95fb3ef6adc950730b4736a405

  • SHA256

    fd6060b963d1b5ca7a07b5a283ad99105298a6708e44d286440a506738a17e34

  • SHA512

    a856a78004812a5aa75f52ecaa3690d5edfc98179b4c34f23434cd9d60e0a0ea7dc6e3ab30e311f7da088267de026552155c9a46cc3c3dda99544e67969e3a1c

  • SSDEEP

    12288:UB1tATMVAqnf+ExxBHYpmA38X8LYkCW6Tipx6yB1/iGK4UlUuTh1AG:UB1BVpmExDYp38X8LYTWhpfNiGQl/91h

Malware Config

Extracted

Family

xorddos

C2

http://aa.hostasa.org/game.rar

ns3.hostasa.org:3310

ns4.hostasa.org:3310

ns1.hostasa.org:3310

ns2.hostasa.org:3310

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      83eea5625ca2affd3e841d3b374e88eb_JaffaCakes118

    • Size

      611KB

    • MD5

      83eea5625ca2affd3e841d3b374e88eb

    • SHA1

      dca946f677a1be95fb3ef6adc950730b4736a405

    • SHA256

      fd6060b963d1b5ca7a07b5a283ad99105298a6708e44d286440a506738a17e34

    • SHA512

      a856a78004812a5aa75f52ecaa3690d5edfc98179b4c34f23434cd9d60e0a0ea7dc6e3ab30e311f7da088267de026552155c9a46cc3c3dda99544e67969e3a1c

    • SSDEEP

      12288:UB1tATMVAqnf+ExxBHYpmA38X8LYkCW6Tipx6yB1/iGK4UlUuTh1AG:UB1BVpmExDYp38X8LYTWhpfNiGQl/91h

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Writes memory of remote process

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

MITRE ATT&CK Matrix

Tasks