General

  • Target

    a609138f0791ce100bd2ad8efa1f74b2_JaffaCakes118

  • Size

    611KB

  • Sample

    240818-j5anzaxcpr

  • MD5

    a609138f0791ce100bd2ad8efa1f74b2

  • SHA1

    c8348ea38b3871218f305a382a9738cf9b3d59c9

  • SHA256

    3cfc749a10fb708aac1b255d0fd2fb0fe3bcff19adb638421aab8fabb6621852

  • SHA512

    6f5dd1f7e9781701e87b858ae138e930a2f32aa2e0c80fea81e3b2919788260173c6eeb486e6b8aa347830721e5fbd77d6753cbac56936a65e56eec5a3d55399

  • SSDEEP

    12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrgT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNgBVEBl/91h

Malware Config

Extracted

Family

xorddos

C2

http://aa.hostasa.org/config.rar

ns3.hostasa.org:4306

ns4.hostasa.org:4306

ns1.hostasa.org:4306

ns2.hostasa.org:4306

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      a609138f0791ce100bd2ad8efa1f74b2_JaffaCakes118

    • Size

      611KB

    • MD5

      a609138f0791ce100bd2ad8efa1f74b2

    • SHA1

      c8348ea38b3871218f305a382a9738cf9b3d59c9

    • SHA256

      3cfc749a10fb708aac1b255d0fd2fb0fe3bcff19adb638421aab8fabb6621852

    • SHA512

      6f5dd1f7e9781701e87b858ae138e930a2f32aa2e0c80fea81e3b2919788260173c6eeb486e6b8aa347830721e5fbd77d6753cbac56936a65e56eec5a3d55399

    • SSDEEP

      12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrgT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNgBVEBl/91h

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Executes dropped EXE

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

MITRE ATT&CK Enterprise v15

Tasks