General

  • Target

    9a15e92854143e58f3adf74cc9956042_JaffaCakes118

  • Size

    611KB

  • Sample

    240815-pzbxqswgnj

  • MD5

    9a15e92854143e58f3adf74cc9956042

  • SHA1

    a6821803ff1dcb7ea567f67dbf5ac9f878dada48

  • SHA256

    b5af6310e833e227562ece7d24dbb628a7717b91a0cb67ec2036dd1776fb1b45

  • SHA512

    78cdd01c9b4cf5f30a4c2f5a2e2b1093de2805ef90f9e34051f2ad18145fa2e57e1d795b51a557b706b44f77ac93b6b462e2b53411df41baff7aee311e120c35

  • SSDEEP

    12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrr+T6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNN+BVEBl/91h

Malware Config

Extracted

Family

xorddos

C2

http://www.s9xk32c.com/config.rar

ww.s9xk32c.com:23

ww.s9xk32a.com:23

ww.s9xk32b.com:23

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      9a15e92854143e58f3adf74cc9956042_JaffaCakes118

    • Size

      611KB

    • MD5

      9a15e92854143e58f3adf74cc9956042

    • SHA1

      a6821803ff1dcb7ea567f67dbf5ac9f878dada48

    • SHA256

      b5af6310e833e227562ece7d24dbb628a7717b91a0cb67ec2036dd1776fb1b45

    • SHA512

      78cdd01c9b4cf5f30a4c2f5a2e2b1093de2805ef90f9e34051f2ad18145fa2e57e1d795b51a557b706b44f77ac93b6b462e2b53411df41baff7aee311e120c35

    • SSDEEP

      12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrr+T6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNN+BVEBl/91h

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Writes memory of remote process

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

MITRE ATT&CK Matrix

Tasks