General
-
Target
8c3eb0472652b5462616b11c07844f77_JaffaCakes118
-
Size
596KB
-
Sample
240811-2g2rnasbnn
-
MD5
8c3eb0472652b5462616b11c07844f77
-
SHA1
e579c03b3cc8cba626873786aa4a5dd84e6e3a8a
-
SHA256
69f25865872f994878482e280078d7e7fe15e810ff9f10910e6f0ec23e71095d
-
SHA512
66039f1fe4242e0aac47a88a83dafeb8e12a5a912bde18e7d38c9aaed712b285472ebd87e04d2ab2916a7f5700dddc73cf085dd3a064916f247c4136f39f5986
-
SSDEEP
12288:rPTJS+naeW9kclFEcMWbHdxZ7GkR2fV/6y9P/YAh7Dxu9hc7L:DTJfrW99q4bHdxZ7G1fVFND4XcP
Behavioral task
behavioral1
Sample
8c3eb0472652b5462616b11c07844f77_JaffaCakes118
Resource
ubuntu2204-amd64-20240611-en
Malware Config
Extracted
xorddos
http://full.dsaj2a.org/b/u.php
gh.dsaj2a1.org:2885
8uc.q77y.com:2885
23.234.24.20:2885
-
crc_polynomial
EDB88320
Targets
-
-
Target
8c3eb0472652b5462616b11c07844f77_JaffaCakes118
-
Size
596KB
-
MD5
8c3eb0472652b5462616b11c07844f77
-
SHA1
e579c03b3cc8cba626873786aa4a5dd84e6e3a8a
-
SHA256
69f25865872f994878482e280078d7e7fe15e810ff9f10910e6f0ec23e71095d
-
SHA512
66039f1fe4242e0aac47a88a83dafeb8e12a5a912bde18e7d38c9aaed712b285472ebd87e04d2ab2916a7f5700dddc73cf085dd3a064916f247c4136f39f5986
-
SSDEEP
12288:rPTJS+naeW9kclFEcMWbHdxZ7GkR2fV/6y9P/YAh7Dxu9hc7L:DTJfrW99q4bHdxZ7G1fVFND4XcP
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-