General

  • Target

    854f9f0fd26d823d0b678b7228154138_JaffaCakes118

  • Size

    596KB

  • Sample

    240810-jjt6gsvgqe

  • MD5

    854f9f0fd26d823d0b678b7228154138

  • SHA1

    ebaed77107d5ba6ff3d45155232d3c3e9fe34373

  • SHA256

    42629d9d813e59c3d2b7aac0da644ddb1824a8b286b39393ad50a945d51ab363

  • SHA512

    217d5d6d7436c98ea7b89d008fb1fd671ca327ba8b61edd48a5507a15717f105ab4d4ace798a90afffcb8ae0062041005777fd6bfd1f31dc014a7ccf9e9d6497

  • SSDEEP

    12288:bfTGy+n69+5rTlFEcMWbHvx5SGEuWdMF6yxm9Ah7Dxu9hc7L:rTG/0+5dq4bHvx5SGodMLTD4XcP

Malware Config

Extracted

Family

xorddos

C2

http://info1.3000uc.com/b/u.php

gh.dsaj2a1.org:2849

173.247.233.58:2849

iosapp.servegame.com:2849

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      854f9f0fd26d823d0b678b7228154138_JaffaCakes118

    • Size

      596KB

    • MD5

      854f9f0fd26d823d0b678b7228154138

    • SHA1

      ebaed77107d5ba6ff3d45155232d3c3e9fe34373

    • SHA256

      42629d9d813e59c3d2b7aac0da644ddb1824a8b286b39393ad50a945d51ab363

    • SHA512

      217d5d6d7436c98ea7b89d008fb1fd671ca327ba8b61edd48a5507a15717f105ab4d4ace798a90afffcb8ae0062041005777fd6bfd1f31dc014a7ccf9e9d6497

    • SSDEEP

      12288:bfTGy+n69+5rTlFEcMWbHvx5SGEuWdMF6yxm9Ah7Dxu9hc7L:rTG/0+5dq4bHvx5SGodMLTD4XcP

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Writes memory of remote process

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Matrix

Tasks