General

  • Target

    8c3eb0472652b5462616b11c07844f77_JaffaCakes118

  • Size

    596KB

  • Sample

    240811-2g2rnasbnn

  • MD5

    8c3eb0472652b5462616b11c07844f77

  • SHA1

    e579c03b3cc8cba626873786aa4a5dd84e6e3a8a

  • SHA256

    69f25865872f994878482e280078d7e7fe15e810ff9f10910e6f0ec23e71095d

  • SHA512

    66039f1fe4242e0aac47a88a83dafeb8e12a5a912bde18e7d38c9aaed712b285472ebd87e04d2ab2916a7f5700dddc73cf085dd3a064916f247c4136f39f5986

  • SSDEEP

    12288:rPTJS+naeW9kclFEcMWbHdxZ7GkR2fV/6y9P/YAh7Dxu9hc7L:DTJfrW99q4bHdxZ7G1fVFND4XcP

Malware Config

Extracted

Family

xorddos

C2

http://full.dsaj2a.org/b/u.php

gh.dsaj2a1.org:2885

8uc.q77y.com:2885

23.234.24.20:2885

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      8c3eb0472652b5462616b11c07844f77_JaffaCakes118

    • Size

      596KB

    • MD5

      8c3eb0472652b5462616b11c07844f77

    • SHA1

      e579c03b3cc8cba626873786aa4a5dd84e6e3a8a

    • SHA256

      69f25865872f994878482e280078d7e7fe15e810ff9f10910e6f0ec23e71095d

    • SHA512

      66039f1fe4242e0aac47a88a83dafeb8e12a5a912bde18e7d38c9aaed712b285472ebd87e04d2ab2916a7f5700dddc73cf085dd3a064916f247c4136f39f5986

    • SSDEEP

      12288:rPTJS+naeW9kclFEcMWbHdxZ7GkR2fV/6y9P/YAh7Dxu9hc7L:DTJfrW99q4bHdxZ7G1fVFND4XcP

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

MITRE ATT&CK Enterprise v15

Tasks