General

  • Target

    ea1eefeca5af73afad4f6ca0284da736_JaffaCakes118

  • Size

    605KB

  • Sample

    240918-2tnqkaxcqf

  • MD5

    ea1eefeca5af73afad4f6ca0284da736

  • SHA1

    12cd4bffb129f91370d1edcf94747de3bdcb3305

  • SHA256

    834eb864a29471d0abe178068c259470e4403eb546554247e2f5832acf9586ab

  • SHA512

    43fcdd9c79d9c90b5e34242e5293565905ca20f3d1f486f7d5b02f4e90f7c5b6f92c6dbce84ebf96f77e5a70d031a4593202a75ff948e3b683e10b42d44e0ff1

  • SSDEEP

    12288:IB7tZvFfN5nyhPR6SVsqrcdfUBFLlGNZBjHoPEh6y/KD0lwMogq3whrAZ2:IB7Jfryh5dsqifUBFLlGNZpVlW0lMgqg

Malware Config

Extracted

Family

xorddos

C2

103.25.9.245:3502

103.240.141.50:3502

66.102.253.30:3502

ndns.dsaj2a1.org:3502

ndns.dsaj2a.org:3502

ndns.hcxiaoao.com:3502

ndns.dsaj2a.com:3502

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      ea1eefeca5af73afad4f6ca0284da736_JaffaCakes118

    • Size

      605KB

    • MD5

      ea1eefeca5af73afad4f6ca0284da736

    • SHA1

      12cd4bffb129f91370d1edcf94747de3bdcb3305

    • SHA256

      834eb864a29471d0abe178068c259470e4403eb546554247e2f5832acf9586ab

    • SHA512

      43fcdd9c79d9c90b5e34242e5293565905ca20f3d1f486f7d5b02f4e90f7c5b6f92c6dbce84ebf96f77e5a70d031a4593202a75ff948e3b683e10b42d44e0ff1

    • SSDEEP

      12288:IB7tZvFfN5nyhPR6SVsqrcdfUBFLlGNZBjHoPEh6y/KD0lwMogq3whrAZ2:IB7Jfryh5dsqifUBFLlGNZpVlW0lMgqg

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Writes memory of remote process

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Matrix

Tasks