General
-
Target
d5c672e7727b4e57143b3f2032d159c5_JaffaCakes118
-
Size
544KB
-
Sample
240909-g2bqravemq
-
MD5
d5c672e7727b4e57143b3f2032d159c5
-
SHA1
66fb6f627f9da433a851d4c782bfcc5486bfc881
-
SHA256
9b406407b0987f4d6eb84e8dc3ed65cc27e36626729db7d6e9e5899df11a9b22
-
SHA512
8e14a9fc159dfb0c2a2afb7373be35b2cf45a1c576d8ab7fc4db444984b6d05c7059239b3bbf7315cbeb2399a79fdc605488bacfb0b26f187be1f93ec72f1be4
-
SSDEEP
12288:JbinNy0Y1nvEtXBx6DkkJmAGyPexU279WnjVZ6ySWK:1iNy0evmxvkJmApPexUm9cVE
Behavioral task
behavioral1
Sample
d5c672e7727b4e57143b3f2032d159c5_JaffaCakes118
Resource
ubuntu2204-amd64-20240522.1-en
Malware Config
Extracted
xorddos
topbannersun.com:3306
wowapplecar.com:3306
-
crc_polynomial
CDB88320
Targets
-
-
Target
d5c672e7727b4e57143b3f2032d159c5_JaffaCakes118
-
Size
544KB
-
MD5
d5c672e7727b4e57143b3f2032d159c5
-
SHA1
66fb6f627f9da433a851d4c782bfcc5486bfc881
-
SHA256
9b406407b0987f4d6eb84e8dc3ed65cc27e36626729db7d6e9e5899df11a9b22
-
SHA512
8e14a9fc159dfb0c2a2afb7373be35b2cf45a1c576d8ab7fc4db444984b6d05c7059239b3bbf7315cbeb2399a79fdc605488bacfb0b26f187be1f93ec72f1be4
-
SSDEEP
12288:JbinNy0Y1nvEtXBx6DkkJmAGyPexU279WnjVZ6ySWK:1iNy0evmxvkJmApPexUm9cVE
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Deletes itself
-
Executes dropped EXE
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Scheduled Task/Job
1Cron
1