General
-
Target
00e7122e581622802dab4d3e4ac463b8
-
Size
596KB
-
Sample
240826-qsbh3axdmp
-
MD5
00e7122e581622802dab4d3e4ac463b8
-
SHA1
430442cc603d4a6fb331bf165c2e507aef2bb03e
-
SHA256
1dc964938e1e3401092f6872bd053a99b2154b8ca481ea8dcd5f9d23781f5a11
-
SHA512
4e421c59008ccccc67cada14800bc885f138fdaebe0f0cbd9ae7d398bc1babd1831807752e290ff410993e890d265e14e6867e4040aedc6cd5f54f6692a10557
-
SSDEEP
12288:vPTJS+naeW9kclFEcMWbHdxZ7GkR2fh/6y9P/YAh7Dxu9hc78:nTJfrW99q4bHdxZ7G1fhFND4Xc4
Behavioral task
behavioral1
Sample
00e7122e581622802dab4d3e4ac463b8
Resource
ubuntu2404-amd64-20240523-en
Malware Config
Extracted
xorddos
http://full.dsaj2a.org/b/u.php
v8602.xffer.pw:60002
-
crc_polynomial
EDB88320
Targets
-
-
Target
00e7122e581622802dab4d3e4ac463b8
-
Size
596KB
-
MD5
00e7122e581622802dab4d3e4ac463b8
-
SHA1
430442cc603d4a6fb331bf165c2e507aef2bb03e
-
SHA256
1dc964938e1e3401092f6872bd053a99b2154b8ca481ea8dcd5f9d23781f5a11
-
SHA512
4e421c59008ccccc67cada14800bc885f138fdaebe0f0cbd9ae7d398bc1babd1831807752e290ff410993e890d265e14e6867e4040aedc6cd5f54f6692a10557
-
SSDEEP
12288:vPTJS+naeW9kclFEcMWbHdxZ7GkR2fh/6y9P/YAh7Dxu9hc78:nTJfrW99q4bHdxZ7G1fhFND4Xc4
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Writes memory of remote process
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-