General
-
Target
ea1eefeca5af73afad4f6ca0284da736_JaffaCakes118
-
Size
605KB
-
Sample
240918-2tnqkaxcqf
-
MD5
ea1eefeca5af73afad4f6ca0284da736
-
SHA1
12cd4bffb129f91370d1edcf94747de3bdcb3305
-
SHA256
834eb864a29471d0abe178068c259470e4403eb546554247e2f5832acf9586ab
-
SHA512
43fcdd9c79d9c90b5e34242e5293565905ca20f3d1f486f7d5b02f4e90f7c5b6f92c6dbce84ebf96f77e5a70d031a4593202a75ff948e3b683e10b42d44e0ff1
-
SSDEEP
12288:IB7tZvFfN5nyhPR6SVsqrcdfUBFLlGNZBjHoPEh6y/KD0lwMogq3whrAZ2:IB7Jfryh5dsqifUBFLlGNZpVlW0lMgqg
Behavioral task
behavioral1
Sample
ea1eefeca5af73afad4f6ca0284da736_JaffaCakes118
Resource
ubuntu2404-amd64-20240523-en
Malware Config
Extracted
xorddos
103.25.9.245:3502
103.240.141.50:3502
66.102.253.30:3502
ndns.dsaj2a1.org:3502
ndns.dsaj2a.org:3502
ndns.hcxiaoao.com:3502
ndns.dsaj2a.com:3502
-
crc_polynomial
EDB88320
Targets
-
-
Target
ea1eefeca5af73afad4f6ca0284da736_JaffaCakes118
-
Size
605KB
-
MD5
ea1eefeca5af73afad4f6ca0284da736
-
SHA1
12cd4bffb129f91370d1edcf94747de3bdcb3305
-
SHA256
834eb864a29471d0abe178068c259470e4403eb546554247e2f5832acf9586ab
-
SHA512
43fcdd9c79d9c90b5e34242e5293565905ca20f3d1f486f7d5b02f4e90f7c5b6f92c6dbce84ebf96f77e5a70d031a4593202a75ff948e3b683e10b42d44e0ff1
-
SSDEEP
12288:IB7tZvFfN5nyhPR6SVsqrcdfUBFLlGNZBjHoPEh6y/KD0lwMogq3whrAZ2:IB7Jfryh5dsqifUBFLlGNZpVlW0lMgqg
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Writes memory of remote process
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-