General
-
Target
84d952648c8b04ae92d8ae5c590bb796_JaffaCakes118
-
Size
549KB
-
Sample
240810-fdyd6szhjb
-
MD5
84d952648c8b04ae92d8ae5c590bb796
-
SHA1
226678d94699643f98278f12fc75ee2e91cb35ca
-
SHA256
26afd8aa5395d48d260804313103452ffe2248d7820d0c688f19b9e2532f86d2
-
SHA512
c5eade8014054e73800aa2776509eef9a851f61c34fca60132f1db534706a7cccbff2ed4a21d10b2a39602a3843f24792a8bf362b1655a88048af740a84b2f60
-
SSDEEP
12288:VeRvuKqiVZ4En5drNK0pPEfJKlHZ8mG97Qxee6yzmx:VIv/qiVNHNDEfJKHZ8mG9QeeO
Behavioral task
behavioral1
Sample
84d952648c8b04ae92d8ae5c590bb796_JaffaCakes118
Resource
ubuntu2004-amd64-20240729-en
Malware Config
Extracted
xorddos
p6.2017fly.com:21
p6.2017fly.com:80
p6.2018fly.com:21
p6.2018fly.com:80
p6.sb1024.net:21
p6.sb1024.net:80
http://fuck.2017fly.com/i.php
-
crc_polynomial
CDB88320
Targets
-
-
Target
84d952648c8b04ae92d8ae5c590bb796_JaffaCakes118
-
Size
549KB
-
MD5
84d952648c8b04ae92d8ae5c590bb796
-
SHA1
226678d94699643f98278f12fc75ee2e91cb35ca
-
SHA256
26afd8aa5395d48d260804313103452ffe2248d7820d0c688f19b9e2532f86d2
-
SHA512
c5eade8014054e73800aa2776509eef9a851f61c34fca60132f1db534706a7cccbff2ed4a21d10b2a39602a3843f24792a8bf362b1655a88048af740a84b2f60
-
SSDEEP
12288:VeRvuKqiVZ4En5drNK0pPEfJKlHZ8mG97Qxee6yzmx:VIv/qiVNHNDEfJKHZ8mG9QeeO
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Deletes itself
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-