General
-
Target
a609138f0791ce100bd2ad8efa1f74b2_JaffaCakes118
-
Size
611KB
-
Sample
240818-j5anzaxcpr
-
MD5
a609138f0791ce100bd2ad8efa1f74b2
-
SHA1
c8348ea38b3871218f305a382a9738cf9b3d59c9
-
SHA256
3cfc749a10fb708aac1b255d0fd2fb0fe3bcff19adb638421aab8fabb6621852
-
SHA512
6f5dd1f7e9781701e87b858ae138e930a2f32aa2e0c80fea81e3b2919788260173c6eeb486e6b8aa347830721e5fbd77d6753cbac56936a65e56eec5a3d55399
-
SSDEEP
12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrgT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNgBVEBl/91h
Behavioral task
behavioral1
Sample
a609138f0791ce100bd2ad8efa1f74b2_JaffaCakes118
Resource
ubuntu2204-amd64-20240611-en
Malware Config
Extracted
xorddos
http://aa.hostasa.org/config.rar
ns3.hostasa.org:4306
ns4.hostasa.org:4306
ns1.hostasa.org:4306
ns2.hostasa.org:4306
-
crc_polynomial
EDB88320
Targets
-
-
Target
a609138f0791ce100bd2ad8efa1f74b2_JaffaCakes118
-
Size
611KB
-
MD5
a609138f0791ce100bd2ad8efa1f74b2
-
SHA1
c8348ea38b3871218f305a382a9738cf9b3d59c9
-
SHA256
3cfc749a10fb708aac1b255d0fd2fb0fe3bcff19adb638421aab8fabb6621852
-
SHA512
6f5dd1f7e9781701e87b858ae138e930a2f32aa2e0c80fea81e3b2919788260173c6eeb486e6b8aa347830721e5fbd77d6753cbac56936a65e56eec5a3d55399
-
SSDEEP
12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrgT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNgBVEBl/91h
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Executes dropped EXE
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-