General
-
Target
8ba5afdd3b19b7a6f7c94332472d6688_JaffaCakes118
-
Size
611KB
-
Sample
240811-xzzmsstelr
-
MD5
8ba5afdd3b19b7a6f7c94332472d6688
-
SHA1
0d25545b1153eeefe48aa9bc370523c86269b88e
-
SHA256
e08910543e9be6e2f415f4bc61fcb5e6e54b87b1b5fe982959116a7aced8e2ca
-
SHA512
a05ccd44190368c1938a3decf5172d3a09071e97d36266481496e444b5f84978d56465738a41da562ba22b2fdeaf14439b8b79a03f8650476dedb64f74404a53
-
SSDEEP
12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrr4T6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNN4BVEBl/91h
Behavioral task
behavioral1
Sample
8ba5afdd3b19b7a6f7c94332472d6688_JaffaCakes118
Resource
ubuntu2204-amd64-20240729-en
Malware Config
Extracted
xorddos
http://www.gzcfr5axf6.com/config.rar
bbb.wordpressau.com:3009
-
crc_polynomial
EDB88320
Targets
-
-
Target
8ba5afdd3b19b7a6f7c94332472d6688_JaffaCakes118
-
Size
611KB
-
MD5
8ba5afdd3b19b7a6f7c94332472d6688
-
SHA1
0d25545b1153eeefe48aa9bc370523c86269b88e
-
SHA256
e08910543e9be6e2f415f4bc61fcb5e6e54b87b1b5fe982959116a7aced8e2ca
-
SHA512
a05ccd44190368c1938a3decf5172d3a09071e97d36266481496e444b5f84978d56465738a41da562ba22b2fdeaf14439b8b79a03f8650476dedb64f74404a53
-
SSDEEP
12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrr4T6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNN4BVEBl/91h
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Executes dropped EXE
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Write file to user bin folder
-