General
-
Target
d24e975bd11c5e17ce8fa6a5b8ab52ca_JaffaCakes118
-
Size
596KB
-
Sample
240907-teq85stflc
-
MD5
d24e975bd11c5e17ce8fa6a5b8ab52ca
-
SHA1
e83557dce06c238a6c2d04ec7da00d908c90c82e
-
SHA256
a52428f16f891e1a17375cbee34fdb68c83632988e7b1ae1590bacda2724cc0b
-
SHA512
16cb95f72708869d75c9e4f63d1cb5fa95ccddb9460fc6a4bc8c3837e46df512a8e4e87bf24e7e9ae9b44357536694fa96308a1436cdb7e6ac1609f192f3dc60
-
SSDEEP
12288:rPTJS+naeW9kclFEcMWbHdxZ7GkR2fo/6y9P/YAh7Dxu9hc7L:DTJfrW99q4bHdxZ7G1foFND4XcP
Behavioral task
behavioral1
Sample
d24e975bd11c5e17ce8fa6a5b8ab52ca_JaffaCakes118
Resource
ubuntu2404-amd64-20240523-en
Malware Config
Extracted
xorddos
http://full.dsaj2a.org/b/u.php
gh.dsaj2a1.org:2415
pengpenga.xicp.net:2415
61.174.49.203:2415
-
crc_polynomial
EDB88320
Targets
-
-
Target
d24e975bd11c5e17ce8fa6a5b8ab52ca_JaffaCakes118
-
Size
596KB
-
MD5
d24e975bd11c5e17ce8fa6a5b8ab52ca
-
SHA1
e83557dce06c238a6c2d04ec7da00d908c90c82e
-
SHA256
a52428f16f891e1a17375cbee34fdb68c83632988e7b1ae1590bacda2724cc0b
-
SHA512
16cb95f72708869d75c9e4f63d1cb5fa95ccddb9460fc6a4bc8c3837e46df512a8e4e87bf24e7e9ae9b44357536694fa96308a1436cdb7e6ac1609f192f3dc60
-
SSDEEP
12288:rPTJS+naeW9kclFEcMWbHdxZ7GkR2fo/6y9P/YAh7Dxu9hc7L:DTJfrW99q4bHdxZ7G1foFND4XcP
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Writes memory of remote process
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-